Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/AI Index
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Generative AI
      • Partners Ecosystem
      • Process Mining
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Summits
      • Roundtables
      • Video Moments
    • By Vendors
      • All Vendors
      • AI/Hyperautomation
      • Cloud
      • Cybersecurity
      • Data
  • Courses
    • Cloud Wars Top 10
    • Selling AI, Cloud, Data & Cybersecurity
    • The Demise of Traditional Go-To-Market Strategies
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • Courses
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/AI Index
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Generative AI
          • Partners Ecosystem
          • Process Mining
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Summits
          • Roundtables
          • Video Moments
        • By Vendors
          • All Vendors
          • AI/Hyperautomation
          • Cloud
          • Cybersecurity
          • Data
  • Courses
    • Cloud Wars Top 10
    • Selling AI, Cloud, Data & Cybersecurity
    • The Demise of Traditional Go-To-Market Strategies
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » Navigating the Impact of SEC Cybersecurity Rules on Businesses and Investors
Cybersecurity as a Business Enabler

Navigating the Impact of SEC Cybersecurity Rules on Businesses and Investors

Chris HughesBy Chris HughesAugust 24, 2023Updated:August 24, 20234 Mins Read
Facebook Twitter LinkedIn Email
sec cybersecurity rules 2023
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

If you’ve been paying attention to technology news lately, you’ve likely heard rumblings about the Securities and Exchange Commission (SEC) rule changes that occurred in July. You may be wondering what all the fuss is about, what led to these rule changes, and what these changes mean moving forward.

I’m going to unpack all of it here for you, so buckle up!

How Did the SEC Get Here?

It’s no secret that people and the businesses that serve them are undergoing rapid digital transformations. One can see this shift in various facets of life, from personal leisure activities to business operations. Even critical infrastructure, which is essential for the functioning of a society, now relies heavily on digital advances.

The SEC acknowledged this new reality when implementing its cybersecurity rule changes, citing factors such as business operations becoming more reliant on software; increased adoption of remote work; and rising occurrences of cybersecurity incidents, as well as financial gains from cybercrime activities. All these factors culminated in calls for bolstering the rules for publicly traded companies to enhance market and investor transparency. These demands align with similar themes of transparency from federal agencies and the White House, including the Cybersecurity Executive Order.

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

How Have SEC Cybersecurity Rules Changed?

The final rules included two key components. The first focuses on enhancing transparency around cybersecurity incidents, particularly those deemed “material.” Material has been defined as something that a reasonable shareholder would consider important, such as incidents that could have ramifications for customers, revenue, and so on.

These incidents will be disclosed on a new Item 1.05 Form 8K. The disclosure must describe information such as the incident’s nature, scope, timing, and also material impact on the organization and its associated operations. This would be of interest to existing and potential investors and stakeholders in an organization due to the potential financial impact of cybersecurity incidents.

The incident disclosure must occur four days following its discovery and once it has been deemed to be a material incident. Some caveats here include the U.S. attorney general’s ability to delay disclosures if they could have an impact on national security or public safety. There is also the reality that organizations rarely identify an incident immediately upon its occurrence and there is often a period of “dwell time,” which is the time that malicious actors may dwell in an environment prior to their nefarious activities being discovered. The median dwell time as reported by groups such as Mandiant is around three weeks, but it can be as high as several hundreds of days as well.

The second component of the SEC’s rules is S-K Item 106, which requires organizations to disclose their processes for identifying, assessing, and managing material risks related to cybersecurity threats. S-K Item 106 also requires organizations to disclose board- and management-level oversight of risks related to cybersecurity threats, as well as management’s role and expertise in assessing these cybersecurity threats. These rules are important for a variety of reasons, including the fact that organizations can’t identify and disclose material cybersecurity incidents effectively without established processes and capabilities. Proper oversight must start at the top. 

Cybersecurity Governance and Board Accountability

The originally proposed rules included requirements for firms to disclose any cybersecurity expertise on the board. This information would be valuable to some investors and shareholders who might have used the information either to rally around firms with solid cybersecurity leadership or used it as part of an incident post-mortem to see if the firm had appropriate leadership providing cybersecurity oversight. It likely would have encouraged firms to include cybersecurity expertise in the boardroom.

Some have argued that the final version of the rules that got accepted let the board off the hook with regard to cybersecurity governance and oversight. That said, few are arguing that the final rules aren’t, at minimum, a step in the right direction.

Final Thoughts

If you’re looking for a quick summary of the rule changes directly from the SEC, it published a concise two-page document that helps lay out the background, the rule changes, and what comes next.

The SEC’s final rule changes for cybersecurity make it clear that regulators are increasingly acknowledging the role it plays in today’s economy. “We aren’t a technology company” is a phrase that has fallen by the wayside, as nearly every organization is wielding technology to effectively serve its customers and run business operations — all of which must be underpinned by the cybersecurity of that digital infrastructure.

It’s safe to say that these won’t be the last rules that add requirements related to cybersecurity for publicly traded companies, so stay tuned!


for more cybersecurity insights, visit the cybersecurity channel

Board of Directors Cybersecurity featured governance software
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CISO & Co-Founder
Aquia

Areas of Expertise
  • Cybersecurity
  • LinkedIn

Chris Hughes is an Acceleration Economy Analyst focusing on Cybersecurity. Chris currently serves as the Co-Founder and CISO of Aquia. Chris has nearly 20 years of IT/Cybersecurity experience. This ranges from active duty time with the U.S. Air Force, a Civil Servant with the U.S. Navy and General Services Administration (GSA)/FedRAMP as well as time as a consultant in the private sector. In addition, he also is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and University of Maryland Global Campus. Chris also participates in industry Working Groups such as the Cloud Security Alliances Incident Response Working Group and serves as the Membership Chair for Cloud Security Alliance D.C. Chris also co-hosts the Resilient Cyber Podcast. Chris holds various industry certifications such as the CISSP/CCSP from ISC2 as holding both the AWS and Azure security certifications. He regularly consults with IT and Cybersecurity leaders from various industries to assist their organizations with their Cloud migration journeys while keeping Security a core component of that transformation.

  Contact Chris Hughes ...

Related Posts

SAP’s Juergen Mueller on GenAI Revolution, Future of Cloud Innovation | Cloud Wars Live

September 25, 2023

Oracle Execs Vow No Price Hikes for GenAI; Premium Pricing ‘Silly’

September 25, 2023

On Location at Automation Anywhere Imagine 2023: Accelerating Industries Through Intelligent Automation

Sponsored ContentSeptember 25, 2023

GenAI Price War?: SFDC, NOW, SAP Boost Prices; Oracle Does Not

September 25, 2023
Add A Comment

Comments are closed.

Recent Posts
  • SAP’s Juergen Mueller on GenAI Revolution, Future of Cloud Innovation | Cloud Wars Live
  • Oracle Execs Vow No Price Hikes for GenAI; Premium Pricing ‘Silly’
  • On Location at Automation Anywhere Imagine 2023: Accelerating Industries Through Intelligent Automation
  • GenAI Price War?: SFDC, NOW, SAP Boost Prices; Oracle Does Not
  • How Generative AI Is Impacting Organizational Roles and Structures

  • 2X a week
  • Analyst Videos & Articles
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

The State of Process Mining 2023: Unlocking Efficiency and Driving Customer Satisfaction

July 31, 2023

How Workday Creates Agile Monetization Opportunities for CFOs

June 21, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023

The Ethical and Workforce Impacts of Generative AI

May 26, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
  • Do not sell my information
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.