Takeaways from SEC Cyber Rule

Takeaways from SEC Cyber Rule

Earlier today the SEC made a critical ruling on how public companies will respond to cyber incidents. This is a monumental step forward in overall transparency as attacks continue to rise but it is of great importance that Executives and Boards think through their approach to meeting and, more importantly, exceeding the new requirements.

For those of us working in the cyber security space, we are intimately aware of the similar rules put in place over the last couple of years that govern how our financial institutions respond to such events as well as organizations that support our critical infrastructure. I have personally seen the diligence, collaboration, humility, and genuine curiosity that these companies have approached the change with and it is important that this mindset carries over into the rest of the public market.

To date, we have seen and experienced the financial impact on organizations as they deal with and respond to cyber incidents. Often times, the situation is handled with a high variance in time-to-remediation and stock price bounces back once out quarter guidance is given on how the revenue impact will be addressed and ultimately made up. I think we need to brace for impact when it comes to the volume of reported incidents inevitably rising. Here are three questions I would have top of mind as a leader as we prepare for what life looks like going forward:

  1. How can I ensure that the policies, procedures, and technologies I have in place are up to date and drive velocity in responding to a threat?
  2. Should I consider additional resource allocation to our cybersecurity program by means of people, process, and technology at not only the operational level but also from a strategic planning perspective?
  3. If we are to experience a material cyber incident, is there a way that I can not only report that an incident has happened within four days BUT also know what happened, how it happened, what our remediation plan will be, and how long it will take?

This third question is burning a hole in my brain because it will prove to be a complex task. With the average dwell time for attackers still well over two weeks and average recovery times over three weeks for critical applications, the world as a whole is struggling to find the answers they are looking for within a four day period, let alone have a coherent plan for remediation and recovery to a clean go-forward operational state. Concepts like Mean-Time-To-Detection and Mean-Time-To-Remediation will surface along with a more firm definition for Maximum Allowable Downtime.

To be clear, I think this is a great step forward but this will require a lot more thought, partnership, honesty, and ultimately reflection on whether or not companies are truly prepared to effectively respond to an incident rather than report the problem without a clear path towards resolution. Markets hate uncertainty and right now uncertainty is what we have when it comes to universally identifying how quickly a company can resume operations post incident.

Vendors will be challenged to be stronger partners with not only their customers but also the Incident Response Firms and Cyber Insurers that support the customers. Looking through this new lens will require the cybersecurity industry to commit R&D cycles into key areas such as user analytics, DLP, threat detection and response, infection quarantine and a well defined cyber recovery orchestration plan across hybrid, cloud, and Saas.

Thanks John for sharing. For companies with a mature cybersecurity program, only minor changes may be required, but primarily it creates the additional burden of providing sufficient details that allows a determination of materiality, which is cental to the disclosures, as described in this blog post.

回复

John, you are misreading the requirement. A company needs to report the incident not within four days of it occurring, but within four days of the company determining that the incident was material. That typically happens well into, and most often after, the investigation is complete.

回复
Ed Flavin

Technology leader/consultant, results driven PM adding value to the business through technology and innovation..

1 年

This is a positive move forward but, it will cause a huge ripple in the public sector. Most are not prepared for this.

David Ditka

Girl Dad | Sports Junkie Federal Account Executive @ Elastic | Fed Financials & SSA

1 年

Great summary John Koretoff! I think you nailed the questions that leaders need to be thinking about.

回复
John Koretoff

GTM Leader @ Rubrik, Inc. | Founding Partner

1 年

SEC Press release can be found here: https://www.sec.gov/news/press-release/2023-139

要查看或添加评论,请登录

John Koretoff的更多文章

  • Leading Like Lasso

    Leading Like Lasso

    Isn't it funny how so many of us, myself included, use deadlines to drive urgency? I planned to write this article…

    6 条评论
  • 10,000 Hours in Tech Sales @ Rubrik

    10,000 Hours in Tech Sales @ Rubrik

    Malcolm Gladwell says, “It takes ten thousand hours to truly master anything. Time spent leads to experience;…

    30 条评论

社区洞察

其他会员也浏览了