SEC Rules On Cybersecurity Risk Management, Strategy, Governance & Incident Response
SEC Final Rule - Cybersecurity Materiality

SEC Rules On Cybersecurity Risk Management, Strategy, Governance & Incident Response

The Security and Exchanges Commission (SEC) recently published its Final Rule: Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure that will force publicly traded companies to adjust practices for ongoing cybersecurity governance and incident response.

The SEC, Generally Accepted Accounting Principles (GAAP) and International Financial Reporting Standards (IFRS) lack specificity in defining the criteria for materiality. Therefore, organizations generally have leeway to define it on their own. The lack of authoritative definition for materiality is not unique, since the concept of risk appetite, risk tolerance and risk threshold also suffer from nebulous definitions by statutory and regulatory authorities.

How Do You Determine Materiality?

For an item to be considered material, the control deficiency, risk, threat or incident (singular or a combination) generally must meet one, or more, of the following criteria where the potential financial impact is:[1]

  • ≥ 5% of pre-tax income;
  • ≥ 0.5% of total assets;
  • ≥ 1% of total equity (shareholder value); and/or
  • ≥ 0.5% of total revenue.

This materiality determination can be visualized with this infographic with the callout for publicly traded companies having a requirement to publicly disclose material cybersecurity incidents:

Determining materiality with the SEC Final Rule on cybersecurity

Material Weakness vs Material Risk vs Material Threat vs Material Incident

With evolving regulatory requirements for public disclosures, it is increasingly important to understand the nuances between material weakness vs material risk vs material threat vs material incident, since they have specific meanings:

Material Weakness

A material weakness is a deficiency, or a combination of deficiencies, in an organization's cybersecurity and/or data privacy controls (across its supply chain) where it is probable that reasonable threats will not be prevented or detected in a timely manner that directly, or indirectly, affects assurance that the organization can adhere to its stated risk tolerance.

  • When there is an existing deficiency (e.g., control deficiency) that poses a material impact, that is a material weakness (e.g., inability to maintain access control, lack of situational awareness to enable the timely identification and response to incidents, lacking pre-production control validation testing, etc.).
  • A material weakness will be identified as part of a gap assessment, audit or assessment as a finding due to one or more control deficiencies.
  • A material weakness should be documented in an organization's Plan of Action & Milestones (POA&M), risk register, or similar tracking mechanism used for remediation purposes.

Material Risk

A risk is a situation where (1) someone or something valued is exposed to danger, harm or loss (noun); or (2) to expose someone or something valued to danger, harm or loss (verb).

  • When there is an identified risk that poses a material impact, that is a material risk.
  • A material risk is a quantitative or qualitative scenario where the exposure to danger, harm or loss has a material impact (e.g., potential class action lawsuit, death related to product usage, etc.)
  • A material risk should be identified and documented in an organization's "risk catalog" that chronicles the organization's relevant and plausible risks.

Material Threat

A threat is (1) a person or thing likely to cause damage or danger (noun); or (2) to indicate impending damage or danger (verb).

  • When there is an identified threat that poses a material impact, that is a material threat.
  • A material threat is a vector that causes damage or danger that has a material impact (e.g., poorly governed Artificial Intelligence (AI) initiatives, nation state hacking operations, dysfunctional internal management practices, etc.).
  • A material threat should be identified and documented in an organization's "threat catalog" that chronicles the organization's relevant and plausible threats.

Material Incident

An incident is an occurrence that actually or potentially (1) jeopardizes the Confidentiality, Integrity, Availability or Safety (CIAS) of a system, application, service or the data that it processes, stores and/or transmits; or (2) constitutes a violation or imminent threat of violation of an organization's policies, procedures or acceptable use practices.

  • When there is an incident that poses a material impact, that is a material incident.
  • A material incident is an occurrence that does or has the potential to (1) affect the CIAS of systems, applications, services or data; or (2) a violation of organizational practices that has a material impact (e.g., malware on sensitive/regulated systems, emergent AI actions, illegal conduct, business interruption, etc.).
  • A material incident should be identified and documented in an organization's Incident Response Plan (IRP) that chronicles the organization's relevant and plausible incidents, so there are appropriate steps in place to identify, respond to and recover from such incidents.

Want To Learn More About Risk Management?

In collaboration with with Andy Kuykendall from the Secure Controls Framework , we authored a white paper on this subject: Enterprise Risk Management (ERM): Practitioner’s Guide To Align Risk Appetite, Risk Tolerance & Risk Thresholds With Strategic, Operational & Tactical Business Planning Activities. You'll find the SEC Final Rule discussed in the document, as well as how to address cybersecurity governance from a strategic, operational and tactical perspective.

enterprise risk management for SEC final rule cybersecurity management
Enterprise Risk Management (ERM): Practitioner’s Guide To Align Risk Appetite, Risk Tolerance & Risk Thresholds With Strategic, Operational & Tactical Business Planning Activities


About The Author

If you have any questions about this, please feel free to reach out. Tom Cornelius is the Senior Partner at ComplianceForge, an industry leader in cybersecurity and privacy documentation. He is also the founder of the Secure Controls Framework (SCF), a not-for-profit initiative to help companies identify and manage their cybersecurity and privacy requirements.


[1] Norwegian Research Council - https://snf.no/media/yemnkmbh/a51_00.pdf

Eric Akinmuyiwa

Information System Security officer (ISSO) || Security Control Assessor || RMF || Vulnerability Analyst || Cyber Security professional

1 年

I appreciate expertise on subject matter

回复
Donna R.

Security, risk, privacy, technology leader and board member. Experience in multiple verticals including banking, finance, insurance, telecomm, life science, manufacturing & healthcare. Security and DEI evangelist!

1 年

Great summary

回复
Sandy Dunn

CISO | Board Member | AIML Security | CIS & MITRE ATT&CK | OWASP Top 10 for LLM Core Team Member | Incident Response |

1 年

Appreciate how generous you are with your wisdom & expertise Tom Cornelius !

As always: Nice summary.?Way to cut through all the Accounting and Audit jargon!

要查看或添加评论,请登录

Tom Cornelius的更多文章

社区洞察

其他会员也浏览了