January 13, 2025
Research shows that the majority of companies filing cybersecurity reports are doing so twice as long after an incident as the Securities and Exchange Commission (SEC) requires: nine days instead of the rule’s stipulated four days. Perhaps a bigger issue is that only a few companies are filing, and those that are filing are using boilerplate language lacking specific details.
Why the lackluster compliance? Some think the reporting mandates, updated in December 2023, go too far and place too heavy a burden on companies, which struggle to comply in such a short timeframe. As well, companies may simply lack the necessary tools to comply.
Below you’ll find background on the SEC’s updated rules and companies’ tentative response to them, plus a look at how the right tools can help teams identify issues, recommend resolution, and provide the visibility and reporting they need to meet compliance.
As reported in December 2024, for the first 11 months after the SEC’s cyber incident reporting rule (PDF) went into effect, only 71 incidents had been disclosed by publicly traded companies, according to incident management software vendor BreachRx.
Nor are the reports providing the cybersecurity transparency and accountability the SEC is after: The research found that the reports are filled with copy-paste language from 10-K filings, as opposed to useful, detailed findings.
Some of the key findings:
In today’s evolving regulatory landscape, compliance with the SEC’s new reporting requirements is not only a legal obligation but also a cornerstone of maintaining investor trust and safeguarding an organization’s reputation. Experts say that thorough reporting is actually in organizations’ best interest, given that it entails adopting cybersecurity controls that are, in fact, best practices.
Cybersecurity controls enhance monitoring and reporting on incidents, say compliance and risk experts. Additionally, they empower security teams to identify vulnerabilities and address them promptly to prevent attacks and breaches.
“Every regulatory mandate differs from the next, but they share some common requirements regarding remediation and reporting,” said Richa Gupta, Contrast Security Director of Risk and Compliance. “When we talk about security best practices, every company should be able to identify the vulnerabilities in an application and prioritize how they are remediated. The right tools can help teams identify issues, recommend what the resolution should be, and provide the necessary visibility and reporting to meet compliance goals and requirements.”
Below is an overview of the SEC’s new requirements. (It’s worth noting that with the new U.S. administration taking office in January 2025, these rules may evolve further. For now, the current mandates provide a target baseline for companies to meet, regardless of their size or the industry in which they operate.)
The SEC’s cybersecurity disclosure rules require public companies to proactively address vulnerabilities to avoid the significant consequences of a vulnerability being exploited and the resulting breach. To meet such mandates, organizations should use tools like Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Interactive Application Security Testing (IAST), pen testing and Application Detection and Response (ADR) to enhance their ability to monitor, detect and prioritize remediation of vulnerabilities. According to Gupta, it’s all about creating secure code.
Companies should look for a platform that enables real-time monitoring, rapid response, comprehensive risk assessment and robust documentation to meet the SEC’s (and other) regulatory deadlines, minimize risk exposure and demonstrate proactive governance. Such platforms also help organizations build a resilient cybersecurity posture that addresses current SEC guidelines.
Drilling down into the specific necessary capabilities companies should look for, such features include:
When an incident occurs, the stakes are high. Companies must put thorough and timely measures in place to address stringent regulatory mandates and maintain a solid risk posture. With the right security tools, companies can navigate the complexities of cybersecurity reporting with confidence, streamlining compliance efforts and positioning themselves as leaders in security and transparency. The result? Reduced vulnerabilities, less exposure to regulatory fines and an enhanced ability to protect both business operations and shareholder value.
Want to learn more about how Contrast ADR can help your compliance efforts? Book a demo today.
Read more:
Get the latest content from Contrast directly to your mailbox. By subscribing, you will stay up to date with all the latest and greatest from Contrast.