The surge in cybersecurity incidents across industries has heightened concern among investors, senior management and boards of directors as they continue to pose threats to business growth and the international economy. The costs of cybersecurity incidents can be material and potentially catastrophic.
In response to growing concerns, the Securities and Exchange Committee (SEC) developed and proposed rules that clarify current required disclosures of cybersecurity incidents. They also added disclosure requirements for cybersecurity risk management and governance activities. These regulations are complex and warrant deeper exploration. Let’s dive into their implications.
The disclosure rules were finalized in July 2023. As expected, the final regulations are similar in their purpose and scope to those proposed in March 2022. Key elements of the final rule include:
The disclosure rules are focused on domestic issuers only. It covers the compliance timeline, content and timing for disclosing material cybersecurity incidents, and content required for informing cybersecurity risk management, strategy and governance processes annually.
The cybersecurity disclosure rules become effective 30 days after they are published in the Federal Register. Based on the SEC’s release notes, the compliance timeline is as follows: `
For most public companies, material incident disclosure requirements on Form 8-K start by December 18, 2023 and 90 days after publication in the Federal Register.
Smaller companies are eligible and may file for extension of the 8-K incident disclosure requirements until June 15, 2024 and 270 days after publication in the Federal Register.
All domestic issuers must comply with the new annual disclosure requirements regarding processes in place for
1) cybersecurity risk management and strategy,
2) managing cybersecurity threats,
3) risks from cybersecurity threats that have materially affected the company, and,
4) the company’s cybersecurity governance.
In the final rule, cybersecurity incidents must be disclosed on Form 8-K and filed with the SEC. The cybersecurity incident disclosure requirements address the content and timeliness of reporting to shareholders. The SEC is now focused on the impact, not the incident’s details. Disclosure of the incident should include the material aspects of the nature, scope and timing of the incident, as well as the material impact or likely material impacts to the company.
When determining materiality, companies must consider qualitative and quantitative factors such as reputation risk, customer or vendor relationship risks, potential litigation and regulatory actions—the key to determining whether a reasonable investor would consider the incident’s impact material.
Disclosure requirements are not exempt from disclosure incidents that occur on third-party systems. This is in consideration of the reliance many companies place on cloud computing.
In addition, any subsequent information that was either unavailable or not yet determined during the initial required filing should subsequently be disclosed through amended Form 8-Ks within a span of four business days after the company, without unreasonable delay, determines such information, or within four business days of its availability.
All material incidents must be disclosed within four days of the incident being determined as material. This does not mean companies can take their time to make such a determination. The SEC emphasizes that although a company may not have complete information regarding the incident, there may be enough information to make a determination. For example, unauthorized access or exfiltration of customer records would be enough to determine without unreasonable delay. To further clarify, the SEC provides examples like the below that should not delay the determination of materiality:
The SEC has allowed for some delays in filing the 8-K disclosure of the incident based on a narrow criterion. Specifically, filing may be delayed if the Attorney General (AG) determines the exposure poses a substantial risk to national security or public safety.
To delay disclosure, the AG must notify the SEC (and the company) of such a determination in writing. Disclosure may be delayed for up to 30 days following the date when the exposure would have been required to be provided. Moreover, the delay may be extended for up to 30 days if the AG determines that disclosure continues to pose a substantial risk to national security or public safety and notifies the SEC (and company) of such a determination in writing.
In addition to disclosing material cybersecurity incidents, companies are obligated to report their approach to implementing cybersecurity risk management and governance procedures.
Companies must disclose annually as part of filing Form 10-K.
The final rule requires a description of the company’s processes for identifying, assessing and managing material risks resulting from cybersecurity threats in sufficient detail so that a reasonable investor can understand those processes. At a minimum, the expectation is that a company has a risk management program that identifies potential cybersecurity risks and has procedures in place to assess, identify and manage material cybersecurity threats. The disclosure requirements include:
In the final rule, the SEC retracted their initial disclosure proposal, opting for a less detailed approach. However, the purpose of the disclosure requirements is to help current and future shareholders make informed investment decisions by understanding the nature and extent to which companies have addressed cybersecurity risk management. As a result, companies must disclose:
Companies must also describe management’s role in assessing and managing material risks from cybersecurity threats, including:
Companies must ensure that they have processes in place to:
1) Assess the material impact of a cybersecurity event and document with sufficient detail needed to meet the final rule’s content requirements
2) Verify the adequacy of their cybersecurity risk management and governance processes to meet the requirements noted above.
For cybersecurity incident disclosure, for example, companies need to update their incident response procedures and playbooks to include:
The members and roles of the cross-functional team for each cybersecurity incident decide the material impact, define the content to be disclosed and is accountable for meeting the four-day period on disclosure of material incidents.
Companies must review their cybersecurity risk management and governance activities to identify gaps based on the disclosure requirements. For example:
There’s limited time for remediation activities. Large companies must disclose material cybersecurity incidents by December 18, 2023 and 90 days after publication in the Federal Register. As a priority, companies should review and improve the management processes and controls in place to ensure proper disclosure of material cybersecurity incidents as needed. It would be reasonable to expect filers to be required on December 31, 2023, to demonstrate that these disclosure controls are in place as part of a 2023 annual external audit. For small, the disclosure requirements are due in 2024.
All companies will need to comply with the annual disclosure of cybersecurity risk management and governance processes in their annual 10-K filing. For large companies, exposure could be as early as their 2023 10-K for December 31, 2023 filers and be included in the scope of the 2023 external audit.
If you need help to comply with the new cybersecurity disclosure rules, Sikich has the expertise to evaluate, recommend and define solutions to help meet these requirements. If you would like more information or have questions, please reach out to Earl Potjeau or contact us here.
This publication contains general information only and Sikich is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or any other professional advice or services. This publication is not a substitute for such professional advice or services, nor should you use it as a basis for any decision, action or omission that may affect you or your business. Before making any decision, taking any action or omitting an action that may affect you or your business, you should consult a qualified professional advisor. In addition, this publication may contain certain content generated by an artificial intelligence (AI) language model. You acknowledge that Sikich shall not be responsible for any loss sustained by you or any person who relies on this publication.