Governance, Risk & Compliance

Change is Coming to the SEC’s Proposed Infosec Rules

The Security and Exchange Commission (SEC)’s proposed changes could have a substantive impact on how companies describe and project their cybersecurity readiness. This SEC Fact Sheet tells us that the proposed rules are to “enhance and standardize disclosures regarding cybersecurity risk management, strategy, governance and incident reporting by public companies.” Clearly, the SEC’s intent is to standardize information flowing from companies and ensure it is available to all investors, via public filing.

SEC Chair Gary Gensler said, “Over the years, our disclosure regime has evolved to reflect evolving risks and investor needs. Today, cybersecurity is an emerging risk with which public issuers increasingly must contend. Investors want to know more about how issuers are managing those growing risks. A lot of issuers already provide cybersecurity disclosure to investors. I think companies and investors alike would benefit if this information were required in a consistent, comparable, and decision-useful manner. I am pleased to support this proposal because, if adopted, it would strengthen investors’ ability to evaluate public companies’ cybersecurity practices and incident reporting.”

The meat and potatoes of the proposal will require:

  • Cybersecurity incidents to be reported via Form 8-K
  • Periodic disclosures regarding:
    • Policies and procedures to identify and manage cybersecurity risks
    • Management’s role in implementing cybersecurity policies and procedures
    • Board of directors’ cybersecurity expertise, if any, and its oversight of cybersecurity risk
    • Updates on previously reported incidents

For some, these requirements will be a light lift; for others, it will constitute a sea change. The board of directors’ composition will be reviewed and the more astute members will ensure that cybersecurity expertise is present, knowledgeable and has appropriate oversight review of any CSO/CISO efforts to manage the cybersecurity risk exposure of the company.

Similarly, the proposed need to report incidents within four days of when the “registrant determines it has experienced a material cybersecurity incident” will ensure that every company’s playbook is augmented to document how and why an incident is determined to be “material” or “immaterial” and defend that position. If responsibility and accountability are not currently well defined, they soon will be.

Perhaps the most impactful proposed change by the SEC is to require companies to “describe its policies and procedures, if any, for the identification and management of risks from cybersecurity threats, including whether the registrant considers cybersecurity as part of its business strategy, financial planning and capital allocation.”

On this latter point, regarding the sharing of the description of one’s policies and procedures, Tim Williams, CISO at Docebo, Inc. observed, “Information security policy documents should be clear, communicative, and transparent. Organizations should be held accountable for how effectively they comply with their own published policies. Being on public display will help drive that accountability.”

Williams said he believed that transparency is a good thing, and added that the SEC’s recommendations could be improved with a “Regulatory requirement to benchmark an organization’s infosec program against recognized industry standards. The results of these benchmarks and audit reports should be shared within the annual reporting process.”

CISOs should absorb the proposed changes, discuss the changes internally and with the board of directors, identify the impact and changes required and, if appropriate, engage in the SEC process with public comment in support (or not) of the proposed changes.

Christopher Burgess

Christopher Burgess (@burgessct) is a writer, speaker and commentator on security issues. He is a former Senior Security Advisor to Cisco and served 30+ years within the CIA which awarded him the Distinguished Career Intelligence Medal upon his retirement. Christopher co-authored the book, “Secrets Stolen, Fortunes Lost, Preventing Intellectual Property Theft and Economic Espionage in the 21st Century”. He also founded the non-profit: Senior Online Safety.

Recent Posts

Baby ASO: A Minimal Viable Transformation for Your SOC

Vaguely relevant but very cyber image from Dall-EOne pattern I spotted after looking at the evolution of IT and security organizations…

5 hours ago

LabHost Phishing Platform is Latest Target of International Law Agencies

The takedown this week of a massive phishing-as-a-service (PhaaS) operation spanned law enforcement agencies from both sides of the Atlantic…

8 hours ago

Choosing SOC Tools? Read This First [2024 Guide]

Security operations centers (SOCs) are the front lines in the battle against cyber threats. They use a diverse array of…

9 hours ago

USENIX Security ’23 – GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation

Authors/Presenters: *Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez* Many thanks to USENIX for publishing their outstanding USENIX Security…

9 hours ago

SafeBreach Coverage for AA24-109A (Akira Ransomware)

FBI, CISA, EC3, and NCSC-NL issued an urgent advisory highlighting the use of new TTPs and IOCs by the Akira…

9 hours ago

Taking Time to Understand NIS2 Reporting Requirements

The newest version of the European Union Network and Information Systems directive, or NIS2, came into force in January 2023.…

10 hours ago