In July 2023, the US Securities and Exchange Commission (SEC) introduced new regulations requiring that registrants promptly report cybersecurity incidents and include details about their management of cybersecurity risks, their strategic approaches, and their governance in their annual reports. These rules apply to almost all registrants who are obligated to submit regular reports to the SEC, such as Form 10-K and Form 20-F, including smaller reporting companies, emerging growth companies, and foreign private issuers.
In the case of domestic registrants, should there be a substantial cybersecurity incident, they must disclose this within four business days on Form 8-K once the incident has been deemed significant and must divulge the following aspects related to the major incident: its nature, scope, and timing; the significant impact or the potential notable impact on the registrant’s financial status and operating results.
Foreign private issuers are also expected to promptly disclose any significant cybersecurity incident, reporting it on Form 6-K once they determine the incident is of substantial importance. They are to furnish on Form 6-K details of significant cybersecurity incidents that they have disclosed or publicized in a foreign jurisdiction, any stock exchange, or to their security holders.
A recent example, in their regulatory filing, Microsoft revealed that email accounts of some of its highest-ranking executives were infiltrated by Nobelium, a Russian intelligence group. This is the same group that managed to breach the systems of SolarWinds in 2020, one of the most impactful cyber-attacks in history. The supply-chain attack on the company that produces software for managing networks, systems, and infrastructure. The hackers, successfully managed to breach several US government departments, including Treasury and Commerce. They conducted a sophisticated operation wherein they infected a network management software update from SolarWinds, which was then used by approximately 18,000 customers globally. The company not only had to survive and overcome this incident, but also had to assume the fines imposed by the regulators, as SEC charged the company and Chief Information Security Officer with fraud, internal control failures.
While it’s a complex task, being prepared for a cyber incident can make all the difference in how much a company will lose – whether that’s in money, time, or trust. It’s better to be proactive rather than reactive. After all, not every cybersecurity incident ends in disaster or has to be reported – but without an effective incident response plan, it might as well. In the labyrinth of cybersecurity, being prepared for all possible junctures is key to safely navigating through it. The creation of a robust incident response strategy hinges on six critical stages, each playing a vital role in managing an incident holistically. Firstly, preparation entails establishing an incident response team, defining roles, identifying what constitutes an incident, and developing an incident response plan that includes procedures for recognizing, reporting, and evaluating incidents. Secondly, the identification phase involves the detection and assessment of a potential incident by monitoring systems and analyzing alerts. This is followed by containment, where the impact of the incident is minimized by isolating the affected systems. Eradication is next, where the root cause of the incident is identified, eliminated from the system, and further preventive measures are taken. Recovery then follows, involving the restoration of the systems to their initial function, after ensuring they are threat-free. Lastly, “lessons learned” is a review and reflective stage, entailing comprehensive incident documentation, assessing areas of improvement, and updating the response plan to buffer against future incidents.