{{item.title}}
{{item.text}}
{{item.title}}
{{item.text}}
Calendar year-end companies have made a significant effort to comply with the new SEC cybersecurity rules. The first wave of disclosures in Form 10-K have resulted in greater overall transparency on cybersecurity risk management, strategy and governance practices compared to disclosures in annual reports from previous years.
As expected, given the expanded disclosure requirements, nearly all companies disclosed more details on key components of cyber leadership and management roles, management strategy of third-party risk, board cyber risk oversight responsibilities and incident response protocols.
To help current and future filers enhance their understanding of how the disclosures can benefit their reporting and capabilities assessments, PwC conducted detailed research and analysis of an initial set of 10-K filings.
A new disclosure requirement in the 10-K is intended to provide investors transparency into the filer’s strategy and process for managing cybersecurity risks.
We previously highlighted the capabilities that should align with SEC disclosure requirements in the following PwC framework. These are core tenets of a cybersecurity program.
Here’s what we’ve learned so far on how program disclosures of capabilities match up with our framework and recommendations.
Initial filings reveal that over 80% of companies included details on how cyber risk and enterprise-wide risk management are integrated. Organizations also disclosed risk assessment standards they have adopted, cybersecurity frameworks used, resilience efforts and how cybersecurity fits more broadly with enterprise-wide risk management (ERM) assessment processes.
Disclosure patterns we’re seeing:
What it all means
Filers are disclosing that they’re following leading cybersecurity standards and practices to guide their strategies, processes, technologies and controls.
10-K disclosures don’t require specific details on the implementation or effectiveness of these practices — or if there are areas of the standards that haven’t been fully implemented. However, cross-functional coordination, monitoring and reporting of risk management practices can help companies assess the state of their cyber program.
It’s critical that the effectiveness of outlined practices be tested and verified to uphold cyber resilience posture. These standards can not only drive a collective ability to quickly respond to cyber risks and threats, but also help programs stay current and keep investors informed.
When it comes to cyber resilience, the majority of filers have focused and prioritized information around their recovery plan and execution tactics for incident response and recovery. This can include details on who oversees the incident response program.
Disclosure patterns we’re seeing:
What it all means
It’s not only important to design, create and assess incident response and recovery playbooks, but to test them to truly gauge effectiveness.
Filers are confirming that they’re not only testing but also evaluating their methods for tracking and reporting incidents — priorities we identified as baseline actions for reducing the impact of cybersecurity disruption and maintaining resilience.
With an evolving threat landscape where threats and threat actor tactics constantly change, response and recovery plans need to evolve at the same pace. Regular testing through tabletop exercises and updating to account for threat identification, containment and remediation steps contribute to risk mitigation.
Board oversight of cyber risk management remains critical. The disclosures are consistent with observed trends in practice of the board or a designated committee taking an active role in overseeing the company’s management of cyber risks.
Disclosure patterns we’re seeing:
What it all means
The final SEC rule requires a description of the board’s oversight of cybersecurity risks in the 10-K, so seeing filers describe how the board or committee is involved isn’t surprising. However, the level of detail in certain disclosures did stand out, particularly how the board is educated and keeps up with cyber risks and trends.
As outlined in the PwC framework, a robust board reporting and oversight structure plays an important role in effective cyber risk management programs. Given the dynamic threat landscape, boards should continue to request updated insights and information from company management and outside parties.
Although disclosing board expertise details isn’t a specific requirement, board-level upskilling and awareness remain crucial parts of effective cyber risk governance, and insights into those activities are beneficial to investors.
The initial sample revealed reminders for future filers that they can apply (or confirm) depending on where they are in the filing cycle. Companies filing later ultimately disclosed more details about their cybersecurity programs, perhaps indicating a benefit from observing the types of responses in the disclosures from earlier filers and the chance to align closely with SEC elements.
It’s important for companies that haven’t filed yet to keep in mind that this is a reference point of disclosures so far. A more complete view of disclosures is still emerging after a full reporting cycle and potentially further SEC guidance. It’s also important to remember that this is not a stagnant disclosure. As companies continue to modify their cyber risk management and governance practices, they should update their disclosures to reflect significant changes.
Establish a reporting baseline
As a general way to determine disclosure standards, especially accounting for industry and potentially sector similarities, there are several examples from initial filers on what to potentially avoid:
Deliver complete and accurate program disclosures
As part of your disclosure controls and procedures, have processes in place to confirm the accuracy and completeness of disclosures, and to confirm that the disclosures do not include any inconsistencies due to:
Keep disclosures and internal practices consistent
It’s also important not to overrepresent current cyber risk resiliency and capabilities. In speeches and public statements, senior SEC officials have expressed concern over companies whose disclosures regarding risk management are inconsistent with messaging inside the organization.
Disclosures regarding cyber risk management and governance practices should be objectively verifiable, such that if the disclosures are subsequently challenged, a reasonable third party should arrive at the same conclusions.
Make sure you’re asking the right questions:
Earlier filers laid the groundwork for disclosures that registrants can more confidently benchmark with their peers. However, this is a consistent priority. All filers (current and future) should continue to reflect on the robustness of not only their disclosures but also their programs to determine any gaps as well as where enhanced transparency may benefit their stakeholders.
This cross-industry analysis of companies of different sizes is an ongoing effort and the first in a series of additional perspectives to come from PwC on 10-K cyber disclosures.
Research methods and objectives
This is an early stage proof of concept of over 200 filers that will scale up with additional registrant filings. This analysis was initially conducted through automated crawling and ingestion of filings and the use of a custom-developed prompts with PwC’s in-house generative AI model implementation.
These methods enabled us to efficiently parse filings against 100+ relevant data points based on PwC's SEC cyber disclosure readiness methodology — data points that are commonly sourced when supporting clients in their SEC cyber disclosure readiness efforts.