First things first: Agree on a process for materiality determination in your company
Determining materiality should not be solely the responsibility of any one person. Taking these three steps now can help you avoid unpleasant surprises later.
1. Establish an organized process with the right people.
Among the essential groups that should establish an organized process for determining materiality: the team under the CISO, CIO, CTO; the CFO and finance team; and the General Counsel (GC) and legal team. The new rule will stress-test how efficiently these three functional teams communicate and coordinate.
Outline the responsibilities of each functional team in the determination and disclosure of a material cyber incident. Share foundational knowledge to bridge across the disciplines. The CISO, CIO, CTO will need information on materiality, while the CFO and finance team and GC will need information on incident response and cyber strategy.
Ask these questions to anticipate the processes that the company needs to establish or strengthen.
- On making the materiality judgment: What types of incidents would the company consider reasonably or likely to be material? What qualitative factors may be most relevant to investors in the event of a cyber incident and what mechanisms does the company have to evaluate their impact based on the perspectives of a reasonable investor?
- On the information needed to make a materiality judgment: What information is needed to review each incident and make a joint determination in an objective and factual way? How would we identify related occurrences that should be considered together? What information would be needed to disclose the nature, timing and scope of the incident as well as its impacts? What will our process be to accumulate the information required for disclosure and file the 8-K within the four business day timeline? Should external SEC legal counsel be consulted?
- A defined disclosure process: When should incidents be escalated and to whom? What process should be followed for disclosure drafting and review to meet the 4 business day reporting timeline upon a conclusion of materiality?
2. Confirm the information you need to collect to determine materiality
The CISO (or CIO, CTO) should collect the information that those ultimately responsible for the materiality determination need. Clarity on these questions will help: What is the relevant information that should be communicated based on the known and unknown facts and circumstances of the cyber incident? Can the CISO and team provide the information quickly enough and in the form that would be most useful in the materiality determination? Do they have appropriate relationships with third parties, such as forensic firms, if external expertise were required to collect critical information?
3. With each cyber incident, prepare to document contemporaneously.
The documentation of the company's process, who was involved and ultimately the conclusions reached, including the basis for such conclusions is critical. Is each team able to produce contemporaneous documentation of the facts — known and unknown — about an incident and the factors considered in assessing the materiality? The company would want the documentation ready if requested by the SEC.