New SEC Cybersecurity Reporting Rules Take Effect

In the press release announcing the new cybersecurity rules, SEC Chairman Gary Gensler said,.
Whether a company loses a factory in a fire - or millions of files in a cybersecurity incident - it may be material to investors.
Currently, many public companies provide cybersecurity disclosure to investors.
I think companies and investors alike would benefit if this disclosure were made in a more consistent, comparable, and decision-useful way.
Through helping to ensure that companies disclose material cybersecurity information, today's rules will benefit investors, companies, and the markets connecting them.
According to analyst Frederick Havemeyer, the new SEC rules align with current cyber insurance trends that reward more transparent risk reporting with lower premiums on policies or better coverage.
The new rules cover both US public companies and foreign private issuers.
Disclosure of material cybersecurity incidents within four business days of determining that a breach is material.
FPIs use Form 6-K. Annual disclosure of cybersecurity risk management, strategy, and governance.
This disclosure is done on the company's annual report, Form 10-K for domestic public companies, Form 20-F for foreign entities.
Whether or not something is material is heavily dependent on the context of the company in question.
Something that's material for a company with $20 million in sales might not be material for a company with $2 billion in sales.
Increasing reliance on electronic systems coupled with a rise in cybersecurity incidents make transparency in cybersecurity more important.
Evidence suggests companies are underreporting cybersecurity incidents.
The best way to prevent the new SEC incident reporting requirement from adversely impacting your stock valuation is to adopt strong cyber protections that safeguard your organization from cyberattacks that you'd need to report.
The Ericom Cloud Security Platform provides a unified, Zero Trust cloud-based solution that makes it simple to upgrade to a state-of-the-art approach to cybersecurity.
Its clientless Zero Trust Network Access solution secures company applications from the growing risks posed by unmanaged devices used by work-from-home employees and 3rd party contractors.
The new reporting requirements provide investors with greater transparency regarding cybersecurity risk management.
Investors and potential investors will feel comfortable knowing your company's digital assets are protected by the only security approach that provides Zero Trust protection against internet-delivered threats.
Contact us to learn more about how easy it is to upgrade to Zero Trust isolation-based cybersecurity.


This Cyber News was published on securityboulevard.com. Publication date: Tue, 02 Jan 2024 22:43:05 +0000


Cyber News related to New SEC Cybersecurity Reporting Rules Take Effect

Understanding the New SEC Rules for Disclosing Cybersecurity Incidents - The U.S. Securities and Exchange Commission recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. "Currently, many public companies provide cybersecurity disclosure ...
1 year ago Feeds.dzone.com
Securities and Exchange Commission Cyber Disclosure Rules: How to Prepare for December Deadlines - Starting Dec. 18, publicly traded companies will need to report material cyber threats to the SEC. Deloitte offers business leaders tips on how to prepare for these new SEC rules. The U.S. Securities and Exchange Commission’s new rules around ...
1 year ago Techrepublic.com
What Are Firewall Rules? Ultimate Guide - Firewall rules are preconfigured, logical computing controls that give a firewall instructions for permitting and blocking network traffic. Network admins must configure firewall rules that protect their data and applications from threat actors. ...
1 year ago Esecurityplanet.com
Bringing Composability to Firewalls with Runtime Protection Rules - Rule control - Customers could not easily write their own firewall rules because of the use of proprietary languages that most teams weren't familiar with unless they received specialized training, or behind walled gardens only accessible by vendor ...
1 year ago Securityboulevard.com
Biden veto waiting for bill to kill SEC breach report rule The Register - The Biden administration has expressed to congressional representatives its strong opposition to undoing the Securities and Exchange Commission's strict data breach reporting rule. The joint resolution, along with House Joint Resolution 100, ...
1 year ago Go.theregister.com
MeridianLink confirms cyberattack after ransomware gang claims to report company to SEC - Financial software company MeridianLink confirmed that it is dealing with a cyberattack after the hackers behind the incident took extraordinary measures to pressure the company into paying a ransom. MeridianLink, which reported more than $76 million ...
1 year ago Therecord.media
New SEC Cybersecurity Reporting Rules Take Effect - In the press release announcing the new cybersecurity rules, SEC Chairman Gary Gensler said,. Whether a company loses a factory in a fire - or millions of files in a cybersecurity incident - it may be material to investors. Currently, many public ...
1 year ago Securityboulevard.com
What Do CISOs Have to Do to Meet New SEC Regulations? - Ilona Cohen, Chief Legal and Policy Officer, HackerOne: It is never an easy time to be a chief information security officer, but the past few months have felt particularly challenging. The recent charges from the US Security and Exchange Commission ...
1 year ago Darkreading.com
CVE-2023-52998 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
SEC Shares Important Clarifications as New Cyber Incident Disclosure Rules Come Into Effect - The US Securities and Exchange Commission has shared some important clarifications on its new cyber incident disclosure requirements, which come into effect on Monday, December 18. The SEC announced in late July that it had adopted new cybersecurity ...
1 year ago Securityweek.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
8 months ago Cyberdefensemagazine.com Akira
SEC to require financial firms to have data breach incident plans - The Securities and Exchange Commission announced new rules on Thursday requiring certain kinds of financial institutions to have well-defined plans for what to do when a data breach involving customer information occurs. The rules - pushed through as ...
1 year ago Therecord.media
SEC to require financial firms to have data breach incident plans - The Securities and Exchange Commission announced new rules on Thursday requiring certain kinds of financial institutions to have well-defined plans for what to do when a data breach involving customer information occurs. The rules - pushed through as ...
1 year ago Therecord.media
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
1 year ago Feeds.fortinet.com
CISOs on alert following SEC charges against SolarWinds - While the outcome of the Security and Exchange Commission's complaint against SolarWinds remains to be seen, infosec experts say the charges are likely to have a major impact on the role of the CISO going forward. In late October, the SEC charged ...
1 year ago Techtarget.com
Student Cybersecurity Clubs: Fostering Online Safety - Student cybersecurity clubs are playing a crucial role in promoting online safety among students. Student cybersecurity clubs play a vital role in this regard, as they provide a platform for students to learn about the latest threats, share best ...
1 year ago Securityzap.com
How To Use YARA Rules To Identify Financial Sector Targeted Attacks - By analyzing multiple samples from the same malware family, security teams can create YARA rules that identify various iterations of the threat, even as attackers attempt to modify their code to evade detection. By scanning network traffic for ...
2 months ago Cybersecuritynews.com Hunters
Understanding The Impact of The SEC's Cybersecurity Disclosure Regulations - Corporate security and compliance teams are scrambling to understand the implications of the U.S. Security and Exchange Commission's recently announced cybersecurity disclosure and reporting regulations. While the need to report 'material ...
1 year ago Cyberdefensemagazine.com
What CISOs Should Exclude From SEC Cybersecurity Filings - As enterprises continue to weigh which security incidents constitute something material enough to be reported under the Securities and Exchange Commission's new rules, CISOs face the challenge of deciding which details to report and, far more ...
1 year ago Darkreading.com
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
11 months ago Techtarget.com
Cybersecurity Curriculum Development Tips for Schools - With the constant threat of cyber attacks, schools must prioritize the development of a robust cybersecurity curriculum to equip students with the necessary skills and knowledge. This article provides valuable insights and tips for schools aiming to ...
1 year ago Securityzap.com
Tell the FCC It Must Clarify Its Rules to Prevent Loopholes That Will Swallow Net Neutrality Whole - The Federal Communications Commission has released draft rules to reinstate net neutrality, with a vote on adopting the rules to come on the 25th of April. The FCC needs to close some loopholes in the draft rules before then. Net neutrality is the ...
1 year ago Eff.org
SEC Cyber Incident Reporting Rules Pressure IT Security Leaders - As the Security and Exchange Commission gets tough on businesses' cybersecurity posture, IT security leaders will need to beef up incident response plans-a notable challenge for organizations currently lacking in this area. The rules also require ...
1 year ago Securityboulevard.com
What the cybersecurity workforce can expect in 2024 - For cybersecurity professionals, 2023 was a mixed bag of opportunities and concerns. The good news is that the number of people in cybersecurity jobs has reached its highest number ever: 5.5 million, according to the 2023 ISC2 Global Workforce Study. ...
1 year ago Securityintelligence.com
Growing threats outpace cybersecurity workforce - The cybersecurity skills shortage threatens the well-being and even survival of numerous businesses as cybersecurity threats grow more numerous, sophisticated, and dangerous to the point that cybersecurity groups have vowed not to pay ransom demands. ...
1 year ago Legal.thomsonreuters.com