Skip to main content
NewsJul 26, 20232 min read

SEC Cybersecurity Disclosure Rules: New Requirements for Public Company Breach Reporting

The SEC adopted new cybersecurity disclosure rules requiring public companies to report material breaches within four business days. Here is what organizations need to understand and implement.

By 3SN Editorial
#SEC#Disclosure#Compliance#Regulatory#Governance
SEC Cybersecurity Disclosure Rules: New Requirements for Public Company Breach Reporting
Compliance
Jul 26, 20233SN Newsroom

SEC Cybersecurity Disclosure Rules: New Requirements for Public Company Breach Reporting

The SEC adopted new cybersecurity disclosure rules requiring public companies to report material breaches within four business days. Here is what organizations need to understand and implement.

SEC Cybersecurity Disclosure Rules: New Requirements for Public Company Breach Reporting

TL;DR

  • The SEC adopted new rules requiring public companies to disclose material cybersecurity incidents within four business days.
  • Companies must also annually disclose their cybersecurity risk management and governance processes.
  • Organizations should establish incident response procedures that support rapid materiality assessment and disclosure workflows.

The short version

The SEC's new cybersecurity disclosure rules fundamentally change how public companies must handle and report security incidents. Companies now have four business days to disclose material cybersecurity incidents after determining their materiality. Additionally, annual reports must include detailed disclosures about cybersecurity risk management processes, board oversight, and management's role in addressing cyber risks. These requirements elevate cybersecurity from a technical concern to a core governance and disclosure obligation.

The compressed timeline creates significant operational pressure. Four business days is not much time to assess an incident's materiality, consult legal counsel, prepare a filing, and obtain necessary approvals. Organizations without established incident response and disclosure workflows will struggle to comply, potentially exposing themselves to regulatory enforcement and shareholder litigation.

Why this matters beyond a single product

These rules represent a broader trend of regulatory attention to cybersecurity as a material business risk. Investors increasingly view cybersecurity posture as a factor in valuation and risk assessment. The SEC's action acknowledges that cyber incidents can have material financial impacts and that shareholders deserve timely disclosure of such risks.

The governance implications extend beyond the SEC. Other regulators and standard-setters are likely to follow similar approaches. Organizations should view these requirements as part of a larger shift toward cybersecurity accountability at the board and executive levels. Technical security controls remain essential, but they must be supported by governance structures and disclosure capabilities that satisfy regulatory expectations.

Practical next steps for teams

If you are at a public company, immediately assess your current incident response procedures against the new disclosure requirements. Do you have clear criteria for determining materiality? Can you reliably complete the assessment and filing process within four business days? Are your security, legal, and executive teams aligned on roles and responsibilities?

Develop tabletop exercises that simulate incidents requiring disclosure. Test your materiality assessment frameworks and disclosure workflows under realistic time pressure. Document gaps and create remediation plans with specific timelines. If you only have time for one action today, convene a cross-functional meeting with security, legal, and executive leadership to align on disclosure responsibilities and establish clear escalation procedures.

3SN perspective

Regulatory compliance should not be viewed as a burden but as an opportunity to strengthen organizational resilience. The SEC rules compel companies to think systematically about cybersecurity risk and to communicate that risk effectively to stakeholders. When organizations treat security as a governance priority rather than an IT concern, they build stronger defenses and create more transparent relationships with investors. The goal is not just compliance, but creating sustainable security practices that protect the business and satisfy regulatory expectations simultaneously.

What happened

On July 26, 2023, the SEC adopted final rules requiring public companies to disclose material cybersecurity incidents on Form 8-K within four business days of determining materiality. The rules also mandate annual disclosures about cybersecurity risk management, strategy, and governance in Form 10-K filings.

Who’s affected

All publicly traded companies in the United States must comply with these disclosure requirements. Organizations without established incident response and disclosure workflows face particular compliance challenges given the compressed four-day timeline.

What to do now

  1. Establish clear materiality assessment procedures that enable rapid determination of whether an incident requires disclosure.
  2. Develop disclosure workflows integrating legal, security, and executive teams to meet the four-business-day deadline.
  3. Document and annually review cybersecurity risk management processes for inclusion in 10-K filings.

Technical analysis

Mitigations & recommendations

critical

Establish materiality assessment framework

Define clear criteria for determining materiality that incorporate financial, operational, and reputational factors. Create decision trees and escalation procedures to support rapid assessment.

critical

Develop disclosure workflows

Create integrated workflows connecting incident detection, materiality assessment, legal review, and SEC filing preparation. Test these workflows through tabletop exercises.

high

Document governance processes

Maintain current documentation of board cybersecurity oversight, management responsibilities, and risk management processes for annual disclosure requirements.

medium

Train cross-functional teams

Educate security, legal, finance, and executive teams on disclosure requirements and their respective roles in the assessment and filing process.