Decoding new SEC Regulations: A CISO's Guide to DOs and DON'Ts in Cybersecurity
U.S. Securities and Exchange Commission (SEC) is the latest federal agency putting a spotlight on U.S. companies’ cybersecurity practices and pushing boards and executive management teams to place a greater focus on their cyber risk management. On July 26, 2023, the U.S. Securities and Exchange Commission (SEC) adopted amendments (SEC.gov | SEC Adopts Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies) to its rules to enhance disclosures regarding material cybersecurity incidents and cybersecurity risk management, strategy and governance processes by registrants.
“Whether a company loses a factory in a fire — or millions of files in a cybersecurity incident — it may be material to investors,” said SEC Chair Gary Gensler. “Currently, many public companies provide cybersecurity disclosure to investors. I think companies and investors alike, however, would benefit if this disclosure were made in a more consistent, comparable, and decision-useful way. Through helping to ensure that companies disclose material cybersecurity information, today’s rules will benefit investors, companies, and the markets connecting them.”
Prior SEC rules and guidance already covered cybersecurity disclosure, but the SEC viewed these as being inadequate and needing an update for two key reasons. First, the prior policies resulted in inconsistent disclosure practices across issuers, making it difficult for investors to assess a company’s cyber risk and, worse yet, was likely leading public companies to underreport cybersecurity incidents. Second, the SEC recognized the exponential rise in the cost and adverse impact of cybersecurity incidents on public companies and the economy more generally, which in turn fueled the need for more timely and standardized cybersecurity disclosures for the investing public.
New rule addresses concerns over investor access to timely and consistent information related to cybersecurity as a result of the widespread use of digital technologies and artificial intelligence, the shift to hybrid work environments, the rise in the use of crypto assets, and the increase in illicit profits from ransomware and stolen data, all of which continue to escalate cybersecurity risk and its related cost to registrants and investors.
The recent SEC cybersecurity disclosure rule represents a pivotal step towards safeguarding investors from the potential repercussions of cybersecurity breaches. In an era marked by the escalating frequency and gravity of such incidents, investors are rightfully demanding greater transparency from the companies they have vested their financial resources and trust in. With the introduction of this new regulation, the SEC is compelling companies to furnish investors with up-to-date, consistent, and genuinely informative insights into their approach to handling cyber risks.
I perceive this rule as a clarion call for action, effectively challenging enterprises to prepare for an enhanced level of disclosure concerning their strategies, governance processes, and overall management of cyber risks. While this may appear daunting for some, it's important to recognize that the task ahead might not be as formidable as it initially seems.
The core of the rule amendments require disclosure:
1. Cyber incident reporting
2. Cyber risk management and strategy
The new rules also add Regulation S-K Item 106, which will require registrants to describe their processes, if any, for assessing, identifying, and managing material risks from cybersecurity threats, as well as the material effects or reasonably likely material effects of risks from cybersecurity threats and previous cybersecurity incidents. Describe the company’s process, including:
3. Cyber governance
Describe the company’s governance of cybersecurity risks as it relates to:
Note: The final rules will become effective 30 days following publication of the adopting release in the Federal Register. The Form 10-K and Form 20-F disclosures will be due beginning with annual reports for fiscal years ending on or after December 15, 2023. The Form 8-K and Form 6-K disclosures will be due beginning the later of 90 days after the date of publication in the Federal Register or December 18, 2023. Smaller reporting companies will have an additional 180 days before they must begin providing the Form 8-K disclosure. With respect to compliance with the structured data requirements, all registrants must tag disclosures required under the final rules in Inline XBRL beginning one year after initial compliance with the related disclosure requirement.
The U.S. SEC’s new cybersecurity disclosure rules increase pressure on companies to solidify processes for identifying, assessing and managing material cybersecurity risks and reporting incidents. Disclosure with in 4 days!! 😊
In the wake of the SEC’s proposal, public companies are scrambling to address key questions such as:
While SEC released a new cyber disclosure rule requiring public companies to disclose information about their cybersecurity governance practices as well as impacts associated with material cyber incidents. While they include information on what is required to be disclosed, they don’t address how organizations might design their processes and controls to accurately address those disclosure requirements.
Common question that I get asked is "What should CISOs do and not do in response to the SEC’s rule amendments relating to incident reporting and cybersecurity governance and risk management?"
For some organizations, existing processes will require little or no enhancement to facilitate compliance with these SEC rule updates. However, few organizations have defined mechanisms by which corporate officers can make informed assessments of materiality and construct the required 8-K reports based on incident data.
Read my perspective on list of actions to verify the adequacy of processes and determine processes requiring creation or augmentation.
CISOs at respondent organizations must:
Recommended by LinkedIn
1. Know your process and assemble the data
2. Augment incident response governance
3. Report early and often
4. Provide updates on risk management
5. Define governance structures
6. Ensure that your cybersecurity monitoring infrastructure supports this type of assessment and reporting
DON’TS for CISOs at respondent organizations
CISO MUST AVOID certain actions to support established allocation of fiduciary reporting authority:
My Pro Tip and Perspective
1. Empower Executives in Cybersecurity:
Effective cybersecurity demands that executives and board members consider it a top strategic priority. It's crucial not to leave frontline professionals to handle cyber threats on their own. The solution lies in identifying an executive who comprehends the significance of cybersecurity and can articulate its strategic value to key decision-makers. Enterprises that seize this opportunity gain a competitive edge, ensuring resilience in an ever-evolving digital landscape.
2. Elevate Cybersecurity as a Strategic Priority:
Instead of viewing the new SEC rules as a burdensome requirement, enterprises should regard them as a chance to shift their perspective. This shift involves elevating cybersecurity to a critical strategic concern in the C-suite and boardroom. Enterprise leaders must lead discussions on cyber threats and consider cybersecurity a pivotal factor across the business. By establishing a robust governance structure, fostering transparent communication, providing forward-thinking oversight, and leveraging cybersecurity experts' skills, companies can not only comply with regulations but also chart a secure and prosperous path toward cyber resilience.
3. Timely Incident Disclosure:
The recent SEC regulations underscore the importance of promptly disclosing cybersecurity incidents. Clear and timely communication is vital for fostering trust and collaboration among various stakeholders, including employees, executives, board members, regulators, and the public. Taking responsibility and being accountable allows organizations to learn from each other's experiences and work together to strengthen their defense against cyber threats.
4. Embrace Transparency:
Transparency is now a fundamental expectation in the SECs cybersecurity rules. Organizations must acknowledge that no one is immune to cyber threats, emphasizing the need for prompt incident reporting. By implementing transparent disclosure policies, organizations can instill confidence among stakeholders and create a collaborative environment that enhances industry-wide resilience. This level of transparency also encourages active participation from all employees, making cybersecurity training more effective and promoting a cybersecurity-aware culture.
Summary
In the fast-evolving realm of cybersecurity, CISOs are at the forefront, grappling with transformative challenges driven by generative AI, stringent SEC regulations, and the relentless rise of advanced cyber threats. Their pivotal role involves articulating the consequences of cybersecurity incidents, encompassing both actual and foreseeable impacts, including potential financial implications. This shift in disclosure requirements underscores the significance of proactive governance and a well-structured mitigation plan seamlessly aligned with new guidelines. Strong cybersecurity governance serves as the cornerstone of comprehensive cybersecurity programs, building trust among stakeholders. In times of economic uncertainty, experienced cybersecurity experts on corporate boards prove invaluable, aiding CISOs in developing dynamic cybersecurity strategies. The provided DO's and DON'Ts offer CISOs a valuable framework for navigating cybersecurity incident disclosure and SEC compliance adeptly during this transformative era.
A timely and crucial topic! 🛡️ With the digital landscape evolving rapidly, it's paramount for organizations to stay updated with regulatory changes, especially when it comes to cybersecurity and #AI. CISOs play a pivotal role in navigating these regulations and ensuring compliance. A blend of advanced AI tools and human expertise can significantly aid in addressing these challenges. Thank you for the informative post Gaurav!