Government Regulations, Compliance Management
Here’s how to get proactive about complying with the SEC’s cybersecurity rules

Today’s columnist, Mike Britton of Abnormal Security, writes that best practices are required, but companies will need to adjust to the new SEC cybersecurity rules by taking the time to determine the financial impact of a security incident. (Photo by SAUL LOEB/AFP via Getty Images)
We’re now in 2024, and with it comes a new set of challenges that today’s security leaders must face. High on the list: the Security and Exchange Commission’s (SECs) new cyber rules that went into effect Dec. 18 that require public companies to report a “material” breach within four days. Despite being initially announced last July, security teams say achieving compliance isn’t clear cut, leaving many organizations grappling with how to do so effectively.Many security organizations say they find determining materiality thresholds a big challenge. Many point out that quantifying what makes an incident “material” is not always black and white.It’s difficult to standardize because materiality thresholds vary from company to company. An incident resulting in $X financial loss might qualify as material for one type of company, but not another. Without a concrete definition of a “material” impact on operations, revenues, or stock price, security pros are concerned that the rule can feel somewhat arbitrary and may lead to some material breaches going unreported. Companies need to make their own determination around what’s considered material, and they should make it the first step that they take in their efforts to comply with the SEC cyber rule. Executives should take a risk management approach and examine the severity of loss their organization may experience as the result of an incident. This includes both direct losses — like financial loss due to paying a fake invoice or having to pay a fine — and indirect losses, including repercussions from damage to brand reputation.This will require close collaboration between CISOs and CFOs, to better understand how to balance the cost of addressing cyber risk levels and the cost of the potential consequences of not addressing them. CFOs and CISOs should learn to speak each other’s languages—CISOs need to appeal to the strategic interests of the CFO and communicate how company decisions can create risk, but this goes both ways. CFOs also need to understand cyber risk and what risks may impact financial statements and the materiality of reporting breaches.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds