Regulations
5
min read

Complying with New SEC Cybersecurity Regulations: The Role of Security Operations Maturity

Published on
March 2, 2023
July 31, 2023
Cydarm

Introduction

The U.S. Securities and Exchange Commission (SEC) has recently introduced new rules and amendments aimed at enhancing and standardizing disclosures related to cybersecurity risks and incidents by public companies. These changes have wide-ranging implications for cybersecurity operations, investor relations, and corporate governance. In this new environment, the importance of cybersecurity operations maturity is paramount.

Background and Historical Context

The SEC's cybersecurity disclosure guidelines have been evolving. In 2011, the SEC issued interpretive guidance (2011 Staff Guidance) stating that registrants must disclose material cybersecurity risks and incidents, even though no existing requirement explicitly mentioned them. This guidance was expanded in 2018 to stress the significance of cybersecurity policies and procedures and their relation to insider trading prohibitions (2018 Interpretive Release).

However, given the increasing dependence on electronic systems, the rise in cybersecurity incidents, and their escalating costs, the SEC recognized the need for more robust and timely information regarding companies' cybersecurity practices.

Detailed Explanation of New SEC Rules and Final Amendments

Regulation S-K Item 106(b)

Item 106(b) requires that registrants disclose their cybersecurity risk management policies and strategy, especially if cybersecurity risks materially affect their business. This illustrates the importance of having a robust cybersecurity risk management process tied to an organization's overall strategy and financial health.

Regulation S-K Item 106(c)

Item 106(c) mandates companies to reveal the board of director's cybersecurity expertise or measures taken to keep the board informed about cybersecurity risk management. This highlights the critical role of governance in managing material risks.

Form 8-K Item 1.05 and the Final Amendments

Item 1.05 requires disclosure of material cybersecurity incidents within four business days from when the incident is determined to be "material". This involves reporting when the incident was discovered, the nature and scope of the incident, whether any data were stolen or altered, the effect of the incident on operations, and the status of incident remediation. These requirements underline the need for organizations to enhance their security operations maturity. These public disclosures, now potentially more frequent and detailed, could significantly influence public perception and shareholder confidence.

Forms 20-F and 6-K

These forms impose the same disclosure requirements on foreign private issuers (FPIs), reflecting the global nature of cybersecurity risks.

The Importance of Security Operations Maturity

The disclosure requirements underscore the importance of security operations maturity. As part of these new regulations, companies are required to detail their processes for identifying, evaluating, and managing cybersecurity risks.

Moreover, they must disclose the potential or actual significant impact of these threats on their business strategy, operations, or financial stability. This public information provides insight into a company's ability to manage and mitigate cybersecurity issues effectively.

Investors will undoubtedly take this information into account when making investment decisions. As a result, organizations with insufficient security operations maturity could face a decrease in shareholder confidence and potential market devaluation. Therefore, it's necessary for companies to enhance their cybersecurity management capabilities.

The Increased Need for Compliant Cybersecurity Practices with Effective Management Tools

With the introduction of the new SEC rules, organizations would be well advised to implement processes and technologies that will:

  • Facilitate Timely Disclosures: Standardized processes and workflows expedite incident response, aiding in timely and accurate disclosures.
  • Strengthen Internal Security Operations: Dedicated support tools for incident responders foster a more comprehensive and proactive approach to cybersecurity management.
  • Demonstrate Compliance with Regulations: A system of record that captures actions and decisions acts as an audit-ready log, confirming adherence to the new disclosure requirements.
  • Streamline Reporting to the SEC: Efficient reporting features simplify the task of producing the required detailed reports, making regulatory reporting less of a burden.

Conclusion

The introduction of the new SEC rules presents a defined requirement for organizations to raise their security operations maturity. By effectively utilizing a Cyber Response Management platform, companies can better manage cybersecurity and non-compliance risks, ensuring they comply with the new requirements and maintain investor confidence. These practices can ultimately contribute to a more secure and trusted business environment.

Published
July 31, 2023
February 12, 2024
Category
Regulations
Author
Cydarm

Ready to step-up your cyber response management? Try the Cydarm platform.

Avoid the sales demo. Get your free 30-day trial.