No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Navigating the SEC’s 8-K Reporting Mandate: Cybersecurity Challenges & Compliance Realities

Cybersecurity disclosure rules are 1 year old, but questions remain for many organizations

by Bill McLaughlin
September 4, 2024
in Cybersecurity, Featured
digital technology concept

The SEC’s cybersecurity disclosure rules recently turned one year old, but many organizations still have questions about compliance. Bill McLaughlin, president of Thrive, a managed services provider, explores some of the lingering issues.

It has been about a year since the SEC enacted its cybersecurity disclosure mandate, which requires the disclosure of any material cybersecurity breach on form 8-K, item 1.05, as well as cybersecurity-specific additions to companies’ annual 10-K filing.

Companies may still be grappling with questions surrounding the new rules and processes needed to meet the SEC’s requirements.

4-day deadline

A form 8-K must be filed within four business days after a cybersecurity event occurs, starting the first business day after the event has been identified (also called Day One). Companies should take note of the language here: it is four days after the event has been identified, not after the incident has happened. That nuance and the narrow window of time can bring a company into compliance or render it out of compliance.

However, and as many companies note, four days may not be long enough to determine if a cybersecurity incident occurred, much less if it is deemed “material” or not. The mandatory 8-K and ongoing reporting document any breach’s cause, resolution(s) and corporate impacts. The SEC recognizes that companies may not be able to determine materiality that quickly and notes that if there’s not an unreasonable delay in reporting, there may be some leeway.

What constitutes materiality?

According to SEC guidance, “material” is defined as any event that a reasonable person would consider important when making an investment decision. One might think that financial information access is the only noteworthy event. However, any cyber event that could impact a company’s ability to function properly is considered a material event and beyond financial impact could include:

  • Operational impact, or disruptions or downtime to business operations, including the inability to access critical systems, data loss and interruption of services.
  • Reputational impact, or how an incident could impact brand image among consumers or key buyers.
  • Legal and regulatory implications, or if your company was out of compliance with industry or geographical requirements.
  • Customer and stakeholder impact, or if data belonging to consumers, partners, etc. was compromised as a result of the incident.

Cyber transgressions have significantly higher bottom-line consequences than even just five years ago. Harm travels at alarming speeds, resulting in significant costs. Due to reporting requirements, breaches are now public knowledge with lasting impact. Reports must include the incident, response and impact/effect information. Each must be updated during triage and throughout resolution.

intersection of business topics
Cybersecurity

The Rise of Cybersecurity GRC

by Yasmine Abdillahi
April 17, 2024

As regulations proliferate regarding the risks posed by our increasingly digital economy, companies face a choice: make cyber compliance the responsibility of existing teams or build a brand-new function: cybersecurity GRC, seated at the intersection of business, IT, privacy and cybersecurity.

Read moreDetails

What gets reported on 8-K and 10-K forms?

It’s important to note the difference between 8-K and 10-K forms and the level of detail required:

  • When reporting a cybersecurity incident on item 1.05 of Form 8-K, details of what happened must be documented, including the scope, timing,and material impact on the company.
  • The 10-K report includes a full description of the company’s financial activity during a fiscal year, including risks, liabilities, operations, agreements and more.

In a nutshell, public companies must submit a 10-K report every year to the SEC, while they file an 8-K form only after an incident has occurred. Both should err on the side of including more detail to fulfill requirements instead of withholding information.

Reportable events to be board-certified

The SEC mandates that companies report each significant breach to assist investors in identifying potential pitfalls. Material incidents encompass breaches, unauthorized data access or use, data tampering, data exfiltration, malware, events that contribute to financial or data harm, lead to loss of sales or confidence, reputational harm events and more are all reportable. 

If an incident occurs and is unreported but is later determined to be “material,” the four-day reporting clock begins then. The initial report provides an outline of the incident. Follow-up information will be filed, including incident response, resolution, impacts, etc. Incidents are reported in EDGAR, the SEC’s electronic data gathering, analysis and retrieval system, regardless of resolution progress. 

The initial report and all updates carry the same board certification mandates as other SEC reports. This puts an onus on the board to have cybersecurity understanding or skills since board members are required to:

  • Know about the incident
  • Know that the information conveyed is true and accurate enough for their certification
  • Report the accurate level of detail for each requirement as reporting signatories

Board expertise

While it’s not a requirement to have a chief security information officer (CISO) in a 10-K filing, companies are moving in the direction of cyber-knowledgeable board members to meet the “management’s role” rule. However, it’s no easy task to tackle security liability. The amount of security staff, education, training and internal resources to achieve the oversight of a CISO at the board level is overwhelming for many companies.

To get this level of expertise, while also managing budgets and supplementing internal resources, many organizations have been tapping into virtual CISOs (vCISOs). While not a requirement, having a CISO or vCISO at the helm can ensure that cybersecurity initiatives are taken seriously and actually implemented, that compliance is top of mind for the SEC rule and other industry- or geography-specific requirements, and that the company improves cyber posture overtime to improve business resilience.


Tags: SEC
Previous Post

2024: The Year (So Far) in Market Manipulation

Next Post

News Roundup: SEC Actions Heat Up at End of Summer

Bill McLaughlin

Bill McLaughlin

Bill McLaughlin is CEO of Thrive, a managed services provider.

Related Posts

sec building sign

What to Expect From Atkins-Led SEC

by Jaclyn Jaeger
May 6, 2025

Former Bush-era commissioner returns with mission to streamline regulations and enhance capital markets

news roundup new

Bang for the Buck: Regulators Pivot to Fewer But Higher-Value Enforcement Actions

by Staff and Wire Reports
April 11, 2025

CCI staff share recent surveys, reports and analysis on risk, compliance, governance, infosec and leadership issues. Share details of your...

freshly picked cherries

Fair Dealing or Foul Play? Preventing Trade Allocation Pitfalls

by Chris Hoyle and Howard Scheck
March 18, 2025

Investment advisers face heightened scrutiny of their allocation practices as regulators deploy advanced analytics to detect favoritism

imessage on phone

The Hidden Compliance Risks Lurking in Your iMessages

by Harriet Christie
March 3, 2025

How end-to-end encryption and lack of native archiving tools complicate regulatory compliance

Next Post
news roundup green bars

News Roundup: SEC Actions Heat Up at End of Summer

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights