This article was updated August 30, 2023.
Properly responding to material incidents could protect your organization from receiving charges from the SEC.
The SEC published its final rule meant to enhance and standardize disclosures regarding cybersecurity risk management, strategy, governance, and incident reporting by public companies.
Evaluate Incidents Carefully
Nonmaterial cyber incidents don’t have to be disclosed to the SEC; however, the number of material cybersecurity incidents is likely higher than organizations report.
What if some of the cybersecurity incidents organizations originally deemed nonmaterial are actually material? How well do organizations evaluate incidents to determine whether they’re material?
SEC Enforcement Cases
In the past, the SEC rarely enforced actions on cybersecurity incidents. However, three enforcement cases against companies indicate things are changing.
A property title company in California, an educational services company in the United Kingdom, and a software company in South Carolina received enforcement actions for not properly disclosing facts surrounding a material cybersecurity incident.
In each case, front-line IT personnel might not have:
- Fully understood how their company defined materiality
- Been incentivized to report the vulnerability up the chain of command
- Made necessary changes to systems or programs in a timely manner
- Describe the incident accurately and completely
The Division of Enforcement within the SEC is signaling a hard line against companies that haven’t designed and implemented cybersecurity disclosure controls that accurately and completely mention all material facts regarding incidents. Registrants should know the new rules give the SEC a new basis for bringing enforcement actions.
How Can You Assess If a Cybersecurity Incident Is Material?
Materiality of a cybersecurity incident depends on its impact and the magnitude of compromised information.
For example, leaked personal health information (PHI) or personally identifiable information (PII) could be a material event for an organization that relies on protecting their customers’ sensitive information.
In the cases mentioned above, the SEC defined materiality broadly and the companies defined it narrowly.
- Narrow means looking myopically at the impact of a cybersecurity incident
- Broad means looking at all known facets of a cybersecurity incident including the impact to the registrant’s reputation, customer or vendor relationships, or a registrant’s competitive position
Generally, assessing the materiality of a cybersecurity incident is an assessment of the potential impact to the company’s reputation, financial performance, customer and vendor relationships, possibility of litigation, and possibility of regulatory investigation. If the impact is great enough to cause an investor to make a buy or sell decision, then the incident is material.
Responding to a Cybersecurity Incident
With its enforcement actions, the SEC signals that employees with knowledge of security vulnerabilities are expected to communicate this information up the chain of command accurately and completely. Those charged with reporting material incidents must do so in four days.