Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/AI Index
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Generative AI
      • Partners Ecosystem
      • Process Mining
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Summits
      • Roundtables
      • Video Moments
    • By Vendors
      • All Vendors
      • AI/Hyperautomation
      • Cloud
      • Cybersecurity
      • Data
  • Courses
    • Cloud Wars Top 10
    • Selling AI, Cloud, Data & Cybersecurity
    • The Demise of Traditional Go-To-Market Strategies
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • Courses
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/AI Index
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Generative AI
          • Partners Ecosystem
          • Process Mining
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Summits
          • Roundtables
          • Video Moments
        • By Vendors
          • All Vendors
          • AI/Hyperautomation
          • Cloud
          • Cybersecurity
          • Data
  • Courses
    • Cloud Wars Top 10
    • Selling AI, Cloud, Data & Cybersecurity
    • The Demise of Traditional Go-To-Market Strategies
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » How New SEC Rules on Incident Transparency Impact Cybersecurity Teams
Cybersecurity Minute

How New SEC Rules on Incident Transparency Impact Cybersecurity Teams

Chris HughesBy Chris HughesAugust 24, 2023Updated:August 24, 20231 Min Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In episode 108 of the Cybersecurity Minute, Chris Hughes discusses some new rules regarding cybersecurity from the Securities and Exchange Commission (SEC).

This episode is sponsored by “Selling to the New Executive Buying Committee,” an Acceleration Economy Course designed to help vendors, partners, and buyers understand the shifting sands of how mid-market and enterprise CXOs are making purchase decisions to modernize technology.

Highlights

00:26 — These rules haven’t taken effect yet, but they will in the coming months.

01:21 — One is around the transparency of cybersecurity incidents. Organizations will have four days to report incidents on Form 8-K. Practitioners point out that there’s often a dwell time that can impact reporting timelines. Also, there are likely to be cases where an incident may have been identified but its full scope has not been determined. Nonetheless, this report must be made within four days of identifying and deeming a cybersecurity incident material.

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

02:51 — There’s another SEC requirement around identifying, assessing, and managing material risks related to cybersecurity threats. It requires organizations to disclose to the board of directors and their management details of oversight of risk related to cybersecurity threats. It didn’t go quite as far as some in cybersecurity had originally hoped.

03:24 — It is calling for organizations to at least disclose that they have processes, policies, and procedures in place to understand cybersecurity threats and what role management has in overseeing them.


for more cybersecurity insights, visit the cybersecurity channel

Board of Directors Cybersecurity risk
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CISO & Co-Founder
Aquia

Areas of Expertise
  • Cybersecurity
  • LinkedIn

Chris Hughes is an Acceleration Economy Analyst focusing on Cybersecurity. Chris currently serves as the Co-Founder and CISO of Aquia. Chris has nearly 20 years of IT/Cybersecurity experience. This ranges from active duty time with the U.S. Air Force, a Civil Servant with the U.S. Navy and General Services Administration (GSA)/FedRAMP as well as time as a consultant in the private sector. In addition, he also is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and University of Maryland Global Campus. Chris also participates in industry Working Groups such as the Cloud Security Alliances Incident Response Working Group and serves as the Membership Chair for Cloud Security Alliance D.C. Chris also co-hosts the Resilient Cyber Podcast. Chris holds various industry certifications such as the CISSP/CCSP from ISC2 as holding both the AWS and Azure security certifications. He regularly consults with IT and Cybersecurity leaders from various industries to assist their organizations with their Cloud migration journeys while keeping Security a core component of that transformation.

  Contact Chris Hughes ...

Related Posts

AI Index: Dell Drives Generative AI; Thomson Reuters Acquires Casetext; Lookout’s Cybersecurity Assistant

August 30, 2023

Why Natural Language Processing (NLP), Large Language Models (LLMs) Require Guardrails

August 28, 2023

Navigating the Impact of SEC Cybersecurity Rules on Businesses and Investors

August 24, 2023

GitGuardian Strengthens Cybersecurity With Expanded Secrets Detection Functionality

August 24, 2023
Add A Comment

Comments are closed.

Recent Posts
  • How Copilots from Microsoft and ServiceNow Impact Your Business, Tech Competitors
  • Couchbase Speeds Development of Cloud Database Apps With Generative AI
  • Road to Oracle CloudWorld: Taco Bell’s Lesson for B2B and CX With Rob Tarkoff
  • Why Generative AI Startups Flock to Google Cloud
  • AI Index: Dell Drives Generative AI; Thomson Reuters Acquires Casetext; Lookout’s Cybersecurity Assistant

  • 2X a week
  • Analyst Videos & Articles
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

The State of Process Mining 2023: Unlocking Efficiency and Driving Customer Satisfaction

July 31, 2023

How Workday Creates Agile Monetization Opportunities for CFOs

June 21, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023

The Ethical and Workforce Impacts of Generative AI

May 26, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
  • Do not sell my information
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.