SEC Cyber Incident Reporting Rules Pressure IT Security Leaders

As the Security and Exchange Commission gets tough on businesses' cybersecurity posture, IT security leaders will need to beef up incident response plans-a notable challenge for organizations currently lacking in this area.
The rules also require annual reporting on cybersecurity risk management, strategy and governance, all established to strengthen transparency for investors and regulators alike.
The four-day requirement, while controversial in the cybersecurity industry, is consistent with other material reporting requirements by the SEC, which include definitive agreements, bankruptcy and so on.
Dave Gerry, CEO at Bugcrowd, explained that this is an important point as it provides more time for organizations to truly understand the materiality and impact of the incident prior to disclosing it.
He added that while the SEC is creating rules around disclosure, it is still up to individual organizations to ensure their cybersecurity defense strategies are sufficient to manage their risk.
While many organizations have adopted vigorous cybersecurity processes and policies, this additional disclosure requirement coming from the SEC should lead to more robust practices overall.
From his perspective, organizations must proactively develop processes to comply, ensure they run regular training and tabletop exercises and have strong collaboration inside their organization.
This includes legal, PR, investor relations, product development, cybersecurity and back office teams.
Claude Mandy, chief evangelist, data security at Symmetry Systems, pointed out that organizations have already invested or are investing in measures to determine the potential materiality of an incident.
This means organizations must be able to swiftly determine the potential impact of a breach, even from the compromise of a single account.
Joseph Carson, chief security scientist and advisory CISO at Delinea, agreed that organizations must now be more proactive in determining the material impact of cybersecurity incidents to the business rather than discovering this later in the courts.
While most organizations have a significant amount of cybersecurity incidents every day, they will need to now ensure they clearly classify incidents that have a material impact.
He noted that cybersecurity is no longer just an IT or technical issue, but it has quickly developed into a business issue as more businesses are heavily dependent on their digital services.


This Cyber News was published on securityboulevard.com. Publication date: Mon, 08 Jan 2024 13:43:04 +0000


Cyber News related to SEC Cyber Incident Reporting Rules Pressure IT Security Leaders

Securities and Exchange Commission Cyber Disclosure Rules: How to Prepare for December Deadlines - Starting Dec. 18, publicly traded companies will need to report material cyber threats to the SEC. Deloitte offers business leaders tips on how to prepare for these new SEC rules. The U.S. Securities and Exchange Commission’s new rules around ...
1 year ago Techrepublic.com
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents - The U.S. Securities and Exchange Commission recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. "Currently, many public companies provide cybersecurity disclosure ...
1 year ago Feeds.dzone.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
8 months ago Cyberdefensemagazine.com Akira
Bringing Composability to Firewalls with Runtime Protection Rules - Rule control - Customers could not easily write their own firewall rules because of the use of proprietary languages that most teams weren't familiar with unless they received specialized training, or behind walled gardens only accessible by vendor ...
1 year ago Securityboulevard.com
Important details about CIRCIA ransomware reporting - This landmark legislation tasks the Cybersecurity and Infrastructure Security Agency to develop and implement regulations requiring covered entities to report covered cyber incidents and ransomware payments. Ransomware attacks have become ...
1 year ago Securityintelligence.com
What is digital forensics and incident response? - Digital forensics and incident response is a combined set of cybersecurity operations that incident response teams use to detect, investigate and respond to cybersecurity events. As the acronym implies, DFIR integrates digital forensics and incident ...
1 year ago Techtarget.com
MeridianLink confirms cyberattack after ransomware gang claims to report company to SEC - Financial software company MeridianLink confirmed that it is dealing with a cyberattack after the hackers behind the incident took extraordinary measures to pressure the company into paying a ransom. MeridianLink, which reported more than $76 million ...
1 year ago Therecord.media
Incident Response Plan: How to Build, Examples, Template - A strong incident response plan - guidance that dictates what to do in the event of a security incident - is vital to ensure organizations can recover from an attack or other cybersecurity event and minimize potential disruption to company ...
1 year ago Techtarget.com
Biden veto waiting for bill to kill SEC breach report rule The Register - The Biden administration has expressed to congressional representatives its strong opposition to undoing the Securities and Exchange Commission's strict data breach reporting rule. The joint resolution, along with House Joint Resolution 100, ...
1 year ago Go.theregister.com
What Are Firewall Rules? Ultimate Guide - Firewall rules are preconfigured, logical computing controls that give a firewall instructions for permitting and blocking network traffic. Network admins must configure firewall rules that protect their data and applications from threat actors. ...
1 year ago Esecurityplanet.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
1 year ago Securityzap.com
SEC Shares Important Clarifications as New Cyber Incident Disclosure Rules Come Into Effect - The US Securities and Exchange Commission has shared some important clarifications on its new cyber incident disclosure requirements, which come into effect on Monday, December 18. The SEC announced in late July that it had adopted new cybersecurity ...
1 year ago Securityweek.com
New Microsoft Incident Response team guide shares best practices for security teams and leaders - The incident response process can be a maze that security professionals must quickly learn to navigate-which is no easy task. Surprisingly, many organizations still lack a coordinated incident response plan, and even fewer consistently apply it. ...
1 year ago Microsoft.com
What Do CISOs Have to Do to Meet New SEC Regulations? - Ilona Cohen, Chief Legal and Policy Officer, HackerOne: It is never an easy time to be a chief information security officer, but the past few months have felt particularly challenging. The recent charges from the US Security and Exchange Commission ...
1 year ago Darkreading.com
How to Conduct Incident Response Tabletop Exercises - An incident response tabletop exercise is an activity that involves testing the processes outlined in an incident response plan. Attack simulations are run to ensure incident response team members know their roles and responsibilities - and whether ...
1 year ago Techtarget.com
CVE-2023-52998 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
How Digital Forensics Supports Incident Response: Insights For Security Leaders - This article explores how digital forensics enhances incident response, the essential techniques involved, and practical strategies for security leaders to implement robust DFIR capabilities. Digital forensics focused on the collection, preservation, ...
1 month ago Cybersecuritynews.com
A Heimdal MXDR Expert on Incident Response Best Practices and Myth Busting - I got to talk to Dragoș Roșioru, a seasoned MXDR expert, about incident response best practices and challenges. Get an in-depth understanding of the do's and don'ts in incident response as Dragoș explains how to avoid the most common mistakes ...
1 year ago Heimdalsecurity.com
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
2 months ago Cybersecuritynews.com
4 key steps to building an incident response plan - In this Help Net Security interview, Mike Toole, head of security and IT at Blumira, discusses the components of an effective security incident response strategy and how they work together to ensure organizations can address cybersecurity issues. An ...
11 months ago Helpnetsecurity.com
Fighting ransomware: A guide to getting the right cybersecurity insurance - While the cybersecurity risk insurance market has been around for more than 20 years, the rapidly changing nature of attacks and the rise in the ransomware epidemic has markedly changed the nature of cyber insurance in recent years. It's more ...
1 year ago Scmagazine.com
No one's happy with latest US cyber incident reporting plan The Register - Organizations that sell IT services to Uncle Sam are peeved at proposed changes to procurement rules that would require them to allow US government agencies full access to their systems in the event of a security incident. The rules were unveiled in ...
1 year ago Go.theregister.com
Why Security Leaders Are Turning to AI for Threat Detection - With cyber attacks growing in complexity, AI offers the ability to analyze vast amounts of data, identify subtle patterns, and detect anomalies in real-time capabilities that traditional security approaches simply cannot match. Security leaders ...
2 months ago Cybersecuritynews.com
SEC Cyber Incident Reporting Rules Pressure IT Security Leaders - As the Security and Exchange Commission gets tough on businesses' cybersecurity posture, IT security leaders will need to beef up incident response plans-a notable challenge for organizations currently lacking in this area. The rules also require ...
1 year ago Securityboulevard.com
Why 78% of Security Leaders Are Rethinking Their Entire Cyber Strategy in 2025 - By building security strategies that acknowledge the realities of today’s threat landscape while aligning with business objectives, they’re positioning their organizations to thrive despite the challenging security environment of 2025. ...
2 months ago Cybersecuritynews.com