Securities Attorney for Going Public Transactions

Securities Lawyer Blog

knowledge itself is power

SEC’s Cybersecurity Disclosure Rules: Key Insights and Implications

The SEC’s cybersecurity disclosure rules aim to enhance transparency but have left many companies grappling with uncertainties, particularly around determining materiality. Recent guidance from Erik Gerding, Director of the SEC Division of Corporation Finance, underscores the challenges issuers face in distinguishing between material and non-material cybersecurity incidents.

Challenges in Determining Materiality

1. Ambiguities in Materiality Standards

Gerding’s recent statement encouraged companies to voluntarily disclose non-material incidents but advised against using Item 1.05 of Form 8-K, titled “Material Cybersecurity Incidents.” He emphasized that such voluntary disclosures should avoid diluting the significance of material cybersecurity incidents. However, his suggestion to evaluate materiality using "all relevant factors" leaves much to interpretation, adding to the existing ambiguity.

2. Signal-to-Noise Ratio in Disclosures

A review of recent filings revealed that only a handful of disclosures under Item 1.05 involved material cybersecurity incidents. This low signal-to-noise ratio reflects the difficulty companies face in applying the materiality standard effectively. Non-material disclosures, while helpful, risk overshadowing significant incidents if not properly categorized.

Recent Enforcement Action: A Wake-Up Call

In May, the SEC fined The Intercontinental Exchange Inc. (ICE) $10 million for failing to timely disclose a cybersecurity breach involving its subsidiaries, including the New York Stock Exchange. Although the incident occurred before the current rules, the enforcement highlights the SEC’s commitment to ensuring timely and accurate cybersecurity disclosures.

Key Takeaways from the ICE Case

  • Timeliness Matters: Even a delay of a few days can lead to significant penalties.

  • Accountability Across Subsidiaries: Parent companies must ensure their subsidiaries meet disclosure obligations.

  • Precedent for Future Enforcement: The SEC is likely to act decisively against companies failing to comply with its cybersecurity disclosure rules.

Guidance for Companies

To navigate these challenges, companies should:

  1. Develop a Robust Incident Evaluation Framework: Assess materiality based on a comprehensive set of factors, including financial, operational, and reputational impacts.

  2. Enhance Internal Reporting Mechanisms: Ensure incidents are communicated promptly across subsidiaries and to the SEC.

  3. Clearly Differentiate Material and Non-Material Disclosures: Avoid using Item 1.05 for non-material incidents to maintain clarity and investor confidence.

Looking Ahead

The SEC’s enforcement actions and evolving guidance signal that companies must take cybersecurity disclosure seriously. By proactively aligning their practices with SEC expectations, businesses can mitigate risks and demonstrate a commitment to transparency and compliance.

For tailored advice on navigating cybersecurity disclosure requirements, contact The Law Offices Of Destiny Aigbe PLLC today.

Gayatri Gupta