New guidelines from US regulators throw a spotlight on disclosure of cyber-incidents Public companies may need to look more closely at their exposure to cyberattacks after new guidelines were released this week by the U.S. Securities and Exchange Commission.The guidelines, from the SEC’s division of corporation finance, aim to help companies determine when they need to disclose cyberattacks or the amount of risk they pose to a business.In general, public companies in the U.S. are required to disclose incidents that could have a material impact on their business. While the current regulations don’t specifically mention cyberattacks, the new guidelines say they need to be reported in some cases.Companies should disclose the risk of cyber-incidents “if these issues are among the most significant factors that make an investment in the company speculative or risky,” say the guidelines, issued late Thursday To determine that, companies need to look at factors such as how likely it is they will be targeted by an attack and what the cost of an attack might be, in terms of disruption to operations or loss of sensitive data.They may also be required to give details about hacking incidents that took place in the past. “For example, if a registrant experienced a material cyberattack in which malware was embedded in its systems and customer data was compromised, it likely would not be sufficient for the registrant to disclose that there is a risk that such an attack may occur.” Instead, they would probably be required to reveal specifics of the incident, the SEC said.The guidelines come in a year that has seen numerous high-profile hacking incidents, including a massive attack on Sony that forced it to take its PlayStation Network offline for more than a month.The risk of cyberattacks has always been a potential disclosure issue, but the SEC guidance “really highlights the issue and brings it to the fore,” according to David Navetta, a founding partner of Information Law Group, which provides legal services related to IT matters.Even so, he wrote in a company blog post, “materiality is still going to be a big issue, and not every breach will need to be reported as many/most will not likely involve the potential for a material impact to a company.”One interpretation of the guidelines is that “companies internally are going to have to more carefully forecast and estimate the impact of cyber incidents and the consequences of failing to implement adequate security,” Navetta wrote.“This analysis will go well beyond privacy-related security issues where most companies have focused (due to various privacy laws and regulator activity), and implicate key operational issues impacted by security breaches,” he said. James Niccolai covers data centers and general technology news for IDG News Service. Follow James on Twitter at @jniccolai. James’s e-mail address is james_niccolai@idg.com Related content feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO CSO and CISO C-Suite news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe