Companies Are Still Trying To Figure Out How To Comply With SEC Cyber Rules
Some public companies are still trying to figure out how to comply with new rules from the US Securities and Exchange Commission requiring speedy disclosure of significant cyberattacks. Those rules, which kicked in Monday, require companies to report cyber incidents within four business days of determining they are “material” […]
Some public companies are still trying to figure out how to comply with new rules from the US Securities and Exchange Commission requiring speedy disclosure of significant cyberattacks.
Those rules, which kicked in Monday, require companies to report cyber incidents within four business days of determining they are “material” to shareholders. The SEC previously required firms to disclose major events that would be of shareholder interest, but didn’t specify cyber events.
Making that determination isn’t so easy, said Erez Liebermann, partner at Debevoise & Plimpton law firm.
In the past three months, Liebermann has advised more than 50 publicly listed companies on how to prepare for the new SEC rule, and participated in tabletop exercises with executives to help understand whether their new processes will stand up under the pressure of a major hack. Describing or quantifying what make makes an incident material to investors in the midst of responding to it is “super difficult,” Liebermann said.
US officials, who requested anonymity to speak freely on the topic, said the new rules will boost visibility into cyberattacks, which are widely underreported. However the SEC rules have received pushback, with the US Chamber of Commerce and two of five SEC Commissioners opposing.
Under the new rules, public companies have to report on the impact of a material hack, including what data was publicly disclosed and the processes the company took to mitigate risk. They also must disclose how they manage cybersecurity risks in annual reports.
Sign up for the Cyber Bulletin newsletter for exclusive coverage inside the shadow world of hackers and cyber-espionage
Click here to view full article