Legal Alert
SEC Adopts New Cybersecurity Risk Rules for Public Companies
August 1, 2023
The U.S. Securities and Exchange Commission voted on July 26 to require public companies to disclose material cybersecurity incidents they experience and, each year, disclose information about their cybersecurity risk management, strategy, and governance.
The new incident disclosure requirements will be applicable to material incidents—defined below—occurring after Dec. 18, 2023. Smaller reporting companies have an additional 180 days before they need to comply with this requirement. Most companies will need to file annual reports in accordance with the new rule starting Dec. 15, 2023, with certain smaller companies commencing reporting on June 15, 2024.
What Do I Need to Disclose?
The definition of a cybersecurity incident includes "a series of related unauthorized occurrences." "Related" events include those orchestrated by the same threat vector or the exploitation of the same vulnerability. Identifying "related" cyber occurrences requires a robust cybersecurity infrastructure.
The incident response plan, the forensics team, and legal counsel play an important role in determining whether incidents are "related." Periodic (at least once a year) table-top exercises should be conducted in order to make sure the organization is prepared to deal with an incident.
Using Form 8-K, companies must disclose the material aspects of any incident, including its nature, scope, and timing, as well as the incident's material impact or the material impact that is reasonably likely.
How Quickly Do I Need to Disclose a Cybersecurity Incident?
The SEC emphasized the importance of timely disclosure once a breach is determined to be "material." Barring a delay arising from national security or public safety concerns, companies will now be required to disclose material breaches in a Form 8-K within four business days from the time of determination, rather than from the initial discovery of the breach.
A quick determination of whether a cybersecurity incident is "material" can be tough to make. To meet this requirement, companies must have robust cyber detection and response capabilities along with effective, up-to-date supply chain management practices. This entails having in place proper incident detection tools (such as those aligned with the National Institute of Science and Technology Cybersecurity Framework), relevant policies and procedures (such as an IT policy, incident response plan, information security policy, and supply chain management protocols), competent legal counsel, and proven forensic capabilities to assist in quickly making the right determinations.
All the material aspects of the incident should be identified in the incident response plan, and the disclosure should follow the information contained in the plan.
Third-Party Breaches
Public companies must pay attention not only to their own cybersecurity incidents but those experienced by entities in their supply chain to determine if any cause them a material impact, in which case the above disclosure requirements apply.
This requires periodic review of the company's current supply chain management practices. Companies should ensure that they have the right to conduct periodic audits and other assessments.
Annual Disclosure Requirements
In addition to disclosing incidents in real time, companies will be required to describe their processes for assessing, identifying, and managing material risks from cybersecurity threats in their annual reports on Form 10-K or Form 20-F, as applicable. Companies are not required to disclose specifics regarding their cybersecurity incident response plans or detailed information around their cybersecurity infrastructure, networks, or vulnerabilities if such disclosure is likely to hinder their ability to effectively address and resolve cybersecurity incidents.
Adhering to the NIST Cybersecurity Framework or another well-known and respected cybersecurity framework can help facilitate these processes.
Do I Still Need Experts on My Board of Directors?
The SEC's final rule no longer requires the identification of board members with cybersecurity expertise. Instead, it instructs companies to disclose the relevant expertise of any members of management or committees responsible for assessing and managing registrants' material cyber risks.
This elevates the importance of having a chief information security officer (CISO) who reports to the board. The CISO should have proven experience in managing cybersecurity incidents.
We Can Help
Maslon can assist your company in improving its cybersecurity game to ensure it is aligned with the SEC's vision. Contact us with questions or concerns.