Governance, Risk and Compliance, Government Regulations
Four ways companies can respond and more effectively comply with the SEC’s new cybersecurity rules

Today’s columnist, Karen Worstell of Carbon Black, offers four ways for security teams to comply with the new SEC rules around cybersecurity. (Stock Photo, Getty Images)
With two major actions in the last six months of 2023, the Securities and Exchange Commission (SEC) has made it clear that it plans to get tough on cybersecurity. As a result, chief information security officers (CISOs) and their teams will need to expand their focus from the battlefield to the boardroom, as the threat landscape emerges more than ever as a business concern first and foremost.The SEC in July announced the implementation of rules (that went into effect December 18) requiring the disclosure of “material” threat/breach incidents in four days, as well as annual reporting on cybersecurity risk management, strategy, and governance.And in October, the SEC charged Austin, Texas-based software company SolarWinds Corporation and its CISO, Timothy G. Brown, for fraud and internal control failures. The SEC contends that SolarWinds disclosed “only generic and hypothetical risks” in formal filings, at the same time Brown and other executives/employees knew of specific issues impacting SolarWinds’ security, along with increasingly elevated risks.This is the first time that the SEC has brought cybersecurity enforcement claims against an individual, as well as intentional fraud charges in a cybersecurity disclosure case, according to White and Case, an international law firm specializing in corporate, financial, and government legal counsel.The SEC developments could have the greatest impact on corporations since the Sarbanes-Oxley Act of 2002, which mandated the governance, risk management, auditing and financial reporting of public companies, with provisions that punish corporate accounting fraud and corruption. They combine to make a compelling case that all leaders need to support a systematic change. CISOs must empower themselves as consultants and risk mitigators, to drive their entire organization’s increased involvement in – and willingness to take greater responsibilities for – cybersecurity.CISOs are at an important crossroads. Because of the existing scope and scale of ransomware and the growth of cybercrime, this is no time to stop paying attention to incident detection and response (IDR). CISOs must examine IDR processes and adopt aggressive target metrics such as zero dwell time while they shift their mindset and approach from one of adversary-oriented to risk management and business-oriented.Here’s how they can respond to the recent developments in ways that comply with the SEC requirements, and actually help their companies emerge as smarter and better protected organizations:
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds



