Cybersecurity disclosures and the role of internal audit

In this new era of cyber transparency, internal audit can anticipate how to provide independent perspectives into its company’s ability to make compliant disclosures
  • Management may make changes or introduce new processes and controls to comply with the new SEC cyber disclosure requirements.
  • Internal audit (IA) should anticipate how to assess newly designed and implemented controls that may be technically complex in nature and require cyber subject matter specialists to test.
  • In some cases, management may not have existing controls in place. IA needs to decide how it might work with the first and second lines to help get those controls in place.
  • With a narrow window to set up new procedures to achieve compliance on material cyber incident reporting in the specified form and within the timeframe in the new rule, IA’s engagement should be agile and fast-tracked.

The SEC released its final rule on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure on July 26, 2023.

With this new rule, the SEC puts the onus on companies to give investors current, consistent and “decision-useful” information about how they manage their cyber risks. The final rule requires that, in annual 10-K filings, all SEC registrants reporting under the Securities Exchange Act of 1934 describe the processes, if any, for assessing, identifying and managing material risks from cybersecurity threats. It also requires reporting on management’s role in assessing and managing those risks and the board of directors’ oversight of risks from cybersecurity threats.

It also establishes a defined timeline that requires disclosure of material cybersecurity incidents in Form 8-K within four business days of determining that an incident is material.

What is the primary role of internal audit with respect to the SEC cyber disclosure rule?

With a short time frame for compliance, boards and audit committees will turn to the internal audit function for an independent view on whether their company’s cyber risk mitigation strategies and programs are robust and fit for purpose, as well as to ascertain organizational readiness to comply with the new disclosure requirements.

IA acting as a strategic advisor to the business has never been more pivotal as boards seek to gain assurance over organizations’ cyber posture and to provide consistent and “decision useful” information to investors.

Many companies are not ready today to reveal information about their processes for assessing, identifying and managing material risks from cyber threats to the extent that the new rule requires. Management will likely want to reevaluate the processes underlying the required disclosures now that information will be publicly communicated to investors.

With a narrow window to achieve compliance, IA’s engagement needs to be agile and fast-tracked.

How prepared are you for compliance by the effective dates of the SEC cyber disclosure rule?

Timeline for IA PoV

What should the internal audit function do?

Internal audit can provide an independent assessment of your company’s readiness to respond to the SEC cyber disclosure rules by following these three steps:

1. Perform a current-state assessment of cyber incident and risk management processes and controls, and highlight current gaps and recommendations to management

Cyber risk has historically ranked high and has been an area of concern in internal audit risk assessments over the past decade. As such, it’s likely that your audit plan has evaluated some of these areas with a close nexus to the new reporting requirements. Given the short ramp-up time, though, an independent and holistic evaluation may be necessary to assess readiness both from a first- and second-line perspective. Here are a few topics worth considering:

  • Cyber governance: Disclosure management, board reporting and oversight.
  • Cyber risk management: Cyber risk assessment and scenario threat modeling; Key Risk Indicators (KRIs); cyber risk and control frameworks anchored to authoritative sources such as NIST CSF, NIST 800-53 and other sources; NIST CSF cyber program capability maturity assessment.
  • Cyber incident reporting: Process and controls and maturity assessments in the key areas of incident response management, security operations center (SOC), security incident information and event management (SIEM), technical and executive tabletops.

The new cyber disclosure rule requires even greater communication and connections among IT and security, finance, general counsel and ERM teams. Internal audit should coordinate with the cross-functional team as it does the assessments.

Coordination with SOX teams can also yield collaborative results. With the evolution of cyber risks, areas of common cyber exposure relative to financial reporting have caused auditors to scrutinize the potential impact of cyber risks on the financial statements more closely. Examples of such areas of common exposure include patch management, intrusion detection, backup and restoration of data, vendor management and wire processing.

2. Understand how management plans to comply with the new SEC cyber disclosure rule

Each component of the SEC rule will require cyber capabilities and controls to be demonstrably in place for management to provide investor-grade information in 10-K and 8-K disclosures.

The graphic below illustrates a full view of the interrelated areas where your management team might need to make changes or establish new procedures to comply with the SEC cyber disclosure rule. Internal audit can anticipate where it might provide strategic insights, both in an advisory or in an assurance capacity. Chief audit executives can right-size their engagement for the size of the company, its current cyber program maturity and ongoing work in this area.

Understanding materiality considerations is an area that IA should cover. Materiality assessments are top of mind for all organizations and the process for the assessment — including who is responsible for the ultimate determination — needs to be confirmed in every company. An important requirement for making materiality judgments is contemporaneous documentation of facts surrounding a cyber incident. IA should understand how management plans to conduct contemporaneous documentation and form an independent view of the sufficiency of the documentation.

A second area that IA should consider is participating in tabletops. IA’s independent perspectives and lessons learned through tabletop exercises can be valuable to enhancing stakeholder collaboration and processes.

A PwC framework: Opportunities for internal audit to help company compliance with the SEC cyber disclosure rule

3. Update your internal audit plan and controls based on management’s SEC disclosure compliance plan

  • Review your audit plan. Incorporate audits to independently assess the design and operating effectiveness of new or enhanced processes and controls that have been implemented by management. Consider evaluating management’s ability to promptly react to events, escalate responses and provide disclosures in line of incidents that may be considered material.
  • Review your risk register. If there are unremediated audit issues pertaining to the areas outlined in the framework noted above, engage with relevant stakeholders to help facilitate the development and execution of management remediation plans.
  • Engage with the second line. Understand the activities being undertaken to draft 10-K disclosures on the posture of cybersecurity risk management and the quality of the information that will be used.
  • Monitor developments with the first cyber disclosures in 10-Ks or 8-Ks under the new rule. Incorporate what you learn from investor feedback on cyber disclosures as well as from benchmarking against disclosures by peer companies.

Bottom line

Organizations that don’t comply with the new rule may face serious consequences, as recent SEC enforcement actions suggest. The commission has levied large fines against companies for not disclosing breaches sufficiently or in a timely manner. Enforcement has focused on two areas — first, that organizations have appropriate disclosures under the requirements, and second, that they have controls and procedures in place to escalate necessary items for determination of whether disclosures are required.

When integrated with the multifunctional team that’s working on the company’s compliance with the new SEC rule, internal audit can serve as an independent advisor — through oversight across all aspects of the disclosure requirements and the various stakeholder groups — to confirm preparedness and response.

Follow us

Required fields are marked with an asterisk(*)

By submitting your email address, you acknowledge that you have read the Privacy Statement and that you consent to our processing data in accordance with the Privacy Statement (including international transfers). If you change your mind at any time about wishing to receive the information from us, you can send us an email message using the Contact Us page.

Hide