Transparency in the disclosure of cybersecurity incidents for public companies is no longer good practice – it’s now a regulatory necessity. The imminent requirement for public companies to disclose current material cybersecurity incidents is set to reshape the disclosure landscape for public companies. It brings forth a myriad of considerations that Chief Information Security Officers (CISOs) and cybersecurity professionals need to be aware of.
In this blog, I’ll dissect the important nuances of the rule and outline five key things things that CISO’s need to know about the SEC’s cybersecurity disclosure requirements – particularly focusing on the incident disclosure requirements. From the SEC’s definition of what constitutes a cybersecurity incident, it’s effective date, and the impact on existing disclosure requirements, these are the key facts and vital information needed to navigate this new regulatory terrain.
The rule applies to public companies that are subject to the reporting requirements of the Securities Exchange Act of 1934. Public companies, irrespective of their size, must:
The final rule on Cybersecurity Risk Management, Strategy, Governance, and Incident Response was released by the SEC on July 26, 2023. The final rule became effective on September 5, 2023. Phased enforcement of specific regulations begins in December 2023 as laid out in Table 1 below.
Type of Disclosure | Effective Date | Applicability |
Annual disclosure on cybersecurity risk management processes (Item 106 of Regulation S-K and item 16K of Form 20-F) |
December 15, 2023 | All public companies |
Material Incident Disclosures (Item 1.05 of Form 8-K and in Form 6-K) |
December 18, 2023 | Public companies (excluding smaller reporting companies) |
December 18, 2023 | Foreign Private Insurer filing on Domestic Forms | |
June 15, 2024 | Smaller reporting companies | |
Responsive annual disclosure in Inline XBRL (Item 106 of Regulation S-K and item 16K of Form 20-F) |
December 15, 2024 | All public companies |
Responsive material incident disclosure in Inline XBRL (Item 1.05 of Form 8-K and in Form 6-K) |
December 18, 2024 | All public companies |
As CISOs gear up for compliance, it’s imperative to note the various compliance of the rule’s effective compliance enforcement dates above, particularly the imminent requirement for disclosure of Material Incidents.
As the SEC Cyber Disclosure Rule comes into focus, one of the central concepts that CISOs must grapple with is the nuanced definition of a “cybersecurity incident” laid out by the SEC. Understanding this definition and its implications is crucial for accurately gauging reporting obligations and ensuring compliance post incident.
Cybersecurity incident means an unauthorized occurrence, or a series of related unauthorized occurrences, on or conducted through a registrant’s information systems that jeopardizes the confidentiality, integrity, or availability of a registrant’s information systems or any information residing therein.
https://www.sec.gov/files/rules/final/2023/33-11216.pdf
Breaking down the definition into various elements is important to highlight the broadness of this definition.
an authorized occurence, or a series of related unauthorized occurrences, | The focus on unauthorized occurrences, including related occurrences ensures that this definition is not limited to malicious attacks or threats, but includes every occurence or event that was unauthorized and ensures they must be assessed in isolation and in aggregate. |
on or conducted through a registrant’s information systems | It is further clarified that the occurence can be on or conducted through the organization’s systems. This could require organizations to consider network based events. |
that jeopardizes | The use of the word jeopardizes expands the assessment from actual impact to potential impact from the unauthorized occurence. This is particularly important when considering the materiality of the incidents. |
the confidentiality, integrity, or availability | The inclusion of the three tenets of security (Confidentiality, Integrity or Availability), ensures that the definition encompasses a wide range of cyber threats, from data breaches and ransomware attacks to system disruptions and unauthorized access, credential compromise, as well as unauthorized changes to systems or data. |
of a registrant’s information systems | Hidden within this scope is a defined term for information systems that clearly indicates it is not only resources that are owned, but also used by the registrant. Crucially, this expands the rule beyond a company’s internal systems. CISOs need to consider not only the security of their own infrastructure but also the potential impact on or from third-party systems used by the registrant. |
or any information residing therein. | The inclusion of any information residing on systems means that any data accessible on the systems in scope should be considered. |
The expansive definition of a cybersecurity incident reflects the dynamic and evolving nature of cyber threats. CISOs should adopt a proactive stance, continuously reassessing their cybersecurity posture and incident response capabilities to align with this broad definition.
As CISOs delve into the intricacies of the SEC Cyber Disclosure Rule, a critical aspect to navigate is how this regulation interfaces with existing disclosure requirements. The SEC Cyber Disclosure Rule enhances and supplements existing disclosure obligations rather than replaces them.
Public companies must still adhere to their pre-existing disclosure obligations under securities laws, privacy laws, CIRCIA and other regulations. The new rule acts as a complementary framework, specifically addressing the unique challenges posed by cybersecurity and particularly cybersecurity incidents. CISOs must carefully assess these additional requirements and integrate them seamlessly into their existing disclosure processes. This may involve enhancements to incident response plans, communication strategies, and collaboration with legal and compliance teams.
The clock for disclosing an cybersecurity incident begins ticking once an organization determines that a cybersecurity incident is material. Within four business days, a registrant must file an Item 1.05 Form 8-K with the SEC. This timeframe can be relaxed in exceptional circumstances. Most notably, the SEC rule indicates that in situations where the United States Attorney General determines that immediate disclosure would pose a substantial risk to national security or public safety, registrants may delay filing.
Given this tight timeframe, swift action is paramount. Organizations can not delay making a determination of materiality to avoid disclosure. The SEC specifically cautions against “unreasonable delay.” More interesting however is the potential for cybercriminals to weaponize the SEC whistleblower rules. In fact, We have already seen an example of a ransomware group breaching a company, and reporting them to SEC for failure to disclose.
“We want to bring to your attention a concerning issue regarding MeridianLink’s compliance with the recently adopted cybersecurity incident disclosure rules (SEC 106). It has come to our attention that MeridianLink, in light of a significant breach compromising customer data and operational information, has failed to file the requisite disclosure under Item 1.05 of Form 8-K within the stipulated four business days, as mandated by the new SEC rules.”
https://www.databreaches.net/alphv-files-an-sec-complaint-against-meridianlink-for-not-disclosing-a-breach-to-the-sec/
The disclosure journey also doesn’t end with the initial filing. Amendments to prior disclosures must be made to include any information that was not determined or was unavailable at initial filing. This continuous disclosure ensures that stakeholders receive comprehensive and up-to-date information as the incident unfolds and more details become available.
The limitation of disclosure to cybersecurity incidents determined to be material stands as a linchpin for CISOs when evaluating whether to disclose a cybersecurity incident. Rather than attempting to define a prescriptive statement of what a material cybersecurity incident could be, the SEC wisely wisely defaulted to the precedents set in cases such as TSC Industries Inc., Basic Inc., and Matrixx Initiatives Inc.
The SEC Cyber Disclosure Rule underscores that information about a cybersecurity incident is deemed “material”, if there is a substantial likelihood that a reasonable shareholder would consider it important when making an investment decision. Material information, as per these precedents, is that which could significantly alter the “total mix” of information available to shareholders. While the Final Rules reference “financial condition and results of operations” as one of the tests for materiality, it is essential to recognize that financial metrics alone do not encapsulate the entirety of material information. CISOs should expand their assessment to encompass qualitative impacts that extend beyond the balance sheet.
Materiality in the cybersecurity context may manifest in various qualitative impacts, broadening the scope of what is considered significant. Beyond financial metrics, considerations may include:
Regardless of the approach used to determine materiality, it is essential that organization have proactively defined and documented their policies and practices for determining materiality, considering both quantitative and qualitative measures. Understanding what makes an incident material requires a comprehensive approach to quickly assess quantitative and qualitative measures against predefined thresholds of materiality, including :
The underlying principle is clear. Inform shareholders and the public as quickly as possible to make informed investment decisions.
It is clear that organization’s now have limited time to prepare. To meet the stringent timelines outlined by the SEC Cyber Disclosure Rule, organizations should already have :
The path forward is clear: proactive preparedness, a nuanced understanding of materiality, and a commitment to transparent communication. CISOs are not just guardians of data but increasingly stewards of organizational resilience and stock market transparency.
The post Navigating Public Company Cybersecurity Disclosures appeared first on Symmetry Systems.
*** This is a Security Bloggers Network syndicated blog from Symmetry Systems authored by claude.mandy. Read the original post at: https://www.symmetry-systems.com/blog/sec-final-rules-cybersecurity-disclosure/