Article

New SEC Cybersecurity Disclosures

Securities and Exchange Commission’s (“SEC”) recent adoption of the Final Rules on Cybersecurity Incident disclosures will be pivotal in establishing transparency related to cybersecurity incidents at Registrants.

New SEC Cybersecurity Disclosures

Background

Securities and Exchange Commission’s (“SEC”) recent adoption of the Final Rules on Cybersecurity
Incident disclosures will be pivotal in establishing transparency related to cybersecurity incidents at
Registrants. The Final Rules will augment investors’ interest and confidence as they will now have
timely and comparable insights made available to them to enable decision making based on relevant information.
As with any new guidance or acts, several Registrants may consider disclosures in compliance with
the Final Rules an uphill task before the new compliance disclosures set in from December 2023.
The New Rules will also require Registrants to reassess the agility of their cybersecurity programs to
identify material cybersecurity incidents and their reporting. The Registrants scrutiny of their cybersecurity posture will also increase as they will now require reporting such incidents in the Inline eXtensible Business Reporting Language (“Inline XBRL”).

Overview of New Requirements:

The new disclosure requirements can be broadly considered under the following: 1. Strategy, Governance and Incident Disclosure 2. Risk Management and Strategy Disclosure 3. Governance 4. Tagging Registrants will have to focus on the following requirements:  
Changes toRequirement
Form 10-K1. Disclose Risk Management strategy through its Processes for assessing, identifying, and managing material risks from cybersecurity threats​.
2. The board of directors’ oversight of risks from cybersecurity threats and management’s role and expertise in assessing and managing material risks from cybersecurity threats​.
3. High-level disclosure of assessors, consultants, auditors, or other third-parties supporting the cybersecurity landscape. This will provide investors with a view on in-house vs outsourced cybersecurity capacity / capability of an organization.​ Organizations do not have to disclose details such as name of third- party vendor and exact description of services provided.​
4. Description of historical cybersecurity threats and their impact on materiality.​
Form 8-K1. Requires Form 8-K disclosures about cybersecurity incidents, within four (04) business days after a material cybersecurity incident has been identified (not within four (04) days of incident occurring).
For each material cybersecurity incident: Materiality (actual
or likely), Scope of impact, Timing of the incident, Impact on
operations and financial condition should be covered.​
The intent is to provide enough information to the investor and the impact on materiality to support their decision making regarding the organization.​
2. Requires updates to Form 8-K within four (04) business days when additional information is made available which was not determined or unavailable at the time of filing the initial Form 8-K.​
3. Requires correcting prior disclosures in Form 8-K which were either untrue, incorrect, or omitted (not deliberately to mislead)​.
4. Requires From 8-K to cover a series of related unauthorized occurrences which may collectively have a material cybersecurity impact.​
The final rules define a cybersecurity incident as “an unauthorized occurrence, or a series of related unauthorized occurrences, on or conducted through a Registrant’s information systems that jeopardizes the confidentiality, integrity, or availability of a Registrant’s information systems or any information residing therein.”
Form 6-K1. For Foreign Private Issuers (FPIs)

Requires Form 6-K disclosures when Registrant determines that the incident is material, in addition to meeting the other criteria for required submission of the Form.​

Other Criteria: A Registrant is required under Form 6-K to furnish copies of all information that it: (i) makes or is required to make public under the laws of its jurisdiction of incorporation, (ii) files, or is required to file under the rules of any stock exchange, or (iii) otherwise distributes to its security holders.
Form 20-F1. Requires the same cybersecurity risk management, strategy, governance and updated incident disclosures as proposed for domestic (US) public companies.
XBRL2. Registrants to tag the new disclosures in Inline XBRL, including by block text tagging narrative disclosures and detail tagging quantitative amounts.

Timeline to compliance is one year beyond the initial compliance with the disclosure requirements.

Delayed Reporting:

The new disclosure requirements can be broadly considered under the following:

1. Delays permitted in filing Form 8-K post approval from Attorney General for disclosures which pose a substantial risk to national security or public security.

Brief on Compliance Timelines:

1. The final rules will become effective 30 days following publication in the Federal Register.
2. The Form 10-K and Form 20-F disclosures will be due beginning with annual reports for fiscal
years ending on or after December 15, 2023.
3. The Form 8-K and Form 6-K disclosures will be due beginning the later of 90 days after the
date of publication in the Federal Register or December 18, 2023.
4. Smaller reporting companies will have an additional 180 days before they must begin
providing the Form 8-K disclosure.

Way Forward:

Registrants need to analyze their cybersecurity programs and reporting procedures to determine if
their programs and initiatives are ready to support disclosures.


Registrants should consider increased focus on:


1. Review their approach to define and determine materiality to include cybersecurity
incidents from both qualitative and quantitative perspective.
2. Prepare the Board or consider augmenting the Board’s / Management’s cybersecurity
expertise.
3. Evaluate existing controls and procedures to assess its capability to report material
cybersecurity incidents.
4. Evaluate relationships with third-party vendors which may impact your cybersecurity
posture and reporting compliance.
5. Assess the existing technology landscape from its effective and timely monitoring and
notification capabilities.

 

SHARE

Contact Us

We can definitely help you, let us know how

Whether you are a start-up or a large enterprise, we have solutions that can make a difference!

FEATURED INSIGHTS

Take a look at our case-studies and thought leadership pieces to get a better visibility of how we intend to create value to businesses.

CASE STUDY

ARTICLE

ARTICLE

WEBINAR