Key Takeaway
The SEC's cybersecurity disclosure rule requires public companies to file a Form 8-K within four business days of determining a cybersecurity incident is material, and to include annual governance disclosures in Form 10-K under Item 106. The rule has been fully effective since late 2023 and carries civil penalties, securities fraud liability, and personal exposure for certifying executives. SOC teams and CISOs must integrate materiality determination workflows into IR playbooks and align annual disclosures with actual security controls.
SEC Cybersecurity Disclosure Rule (17 CFR Parts 229 and 249)
Issuing Body: U.S. Securities and Exchange Commission (SEC)
What the Rule Requires
The SEC's cybersecurity disclosure rule, adopted July 26, 2023, imposes two distinct obligations on public companies registered under the Securities Exchange Act of 1934: material incident disclosure and annual governance reporting.
Material Incident Disclosure (Form 8-K, Item 1.05)
Registrants must file a Form 8-K within four business days of determining that a cybersecurity incident is material. The filing must describe the nature, scope, and timing of the incident, and its material impact—or reasonably likely material impact—on the company. The SEC does not define a bright-line threshold for materiality; companies must apply the standard from Basic Inc. v. Levinson: whether a reasonable investor would consider the information significant to an investment decision.
The rule explicitly does not require disclosure of specific technical remediation details that could compromise ongoing response. However, SOC teams and CISOs must build a rapid materiality assessment workflow that feeds directly into legal and IR pipelines. A 96-hour clock that starts at the wrong moment—discovery versus determination—is a compliance failure waiting to happen.
Annual Governance Reporting (Form 10-K, Item 106)
Companies must disclose:
- Processes for assessing, identifying, and managing material cybersecurity risks
- Whether and how identified risks have materially affected or are reasonably likely to materially affect business strategy, results of operations, or financial condition
- Board oversight of cybersecurity risks, including which committee holds responsibility
- Management's role and expertise in assessing and managing cybersecurity risks
This is not a checkbox exercise. The SEC expects specificity. If your CISO reports to the CFO rather than the CEO or board, document why. If you use CrowdStrike Falcon for endpoint detection or Palo Alto Networks Cortex XSOAR for incident response orchestration, you do not need to name those vendors in the 10-K—but you must describe the processes those tools support.
Who Must Comply
All domestic public companies filing with the SEC are subject to the rule. Foreign Private Issuers (FPIs) face parallel requirements under Form 20-F (annual) and Form 6-K (material incidents), with a 30-day 6-K window rather than four business days.
Smaller Reporting Companies (SRCs) received a delayed compliance date for the 8-K incident disclosure requirement but are now fully subject to all provisions.
Private companies, including the many acquired in M&A transactions, are not directly covered—but when a public acquirer like Rapid7, Airbus Defence and Space, or Databricks absorbs a private target, the parent's disclosure obligations immediately apply to material incidents arising from the acquired entity's infrastructure.
Timeline and Penalties
The annual disclosure requirements (Form 10-K, Item 106) took effect for fiscal years ending on or after December 15, 2023. The four-business-day 8-K requirement became effective December 18, 2023 for large accelerated filers and June 15, 2024 for SRCs.
Penalties for non-compliance or materially misleading disclosures fall under standard SEC enforcement authority:
- Civil penalties up to $10,908 per violation per day for negligent violations, scaling to $218,152 per violation for intentional misconduct (2024 adjusted figures)
- Securities fraud liability under Section 10(b) and Rule 10b-5 for materially false or misleading disclosures
- Personal liability for the CEO and CFO who certify filings under Sarbanes-Oxley Section 302
The SEC has already demonstrated enforcement intent. In October 2023—months before the rule's full effective date—the SEC charged SolarWinds and its CISO Timothy Brown with fraud and internal control failures related to misrepresentations about cybersecurity practices ahead of and following the SUNBURST supply chain compromise (CVE-2020-10148). That case signals the SEC will pursue individuals, not just corporate entities.
What Organizations Should Do Now
Build a materiality determination process. Draft a written procedure that defines who makes the materiality call, what inputs are required (blast radius, data classification, revenue impact, regulatory notification triggers), and how fast that determination must happen. The four-day clock runs from determination, not discovery—but regulators will scrutinize any gap between the two.
Map your 8-K trigger to your IR playbook. Integrate SEC notification as a discrete step in your incident response runbooks. Tools like Splunk SOAR, ServiceNow Security Operations, or PagerDuty can automate escalation paths that route to legal counsel and the disclosure committee the moment an incident crosses a materiality threshold.
Audit your 10-K risk disclosures against actual controls. Compare your current annual filing's cybersecurity risk language against your actual detection and response capabilities. If your 10-K claims continuous monitoring but your SOC operates on a 9-to-5 schedule with no after-hours on-call rotation, that gap creates both regulatory and litigation exposure.
Brief the board. Item 106 requires disclosure of board oversight mechanisms. If your board lacks a director with substantive cybersecurity expertise, the SEC expects you to say so—and investors will notice. Consider whether your board's audit or risk committee has the technical literacy to fulfill the oversight role the rule describes.
Prepare for M&A integration disclosure risk. Every acquisition brings inherited vulnerabilities, unpatched CVEs, and unknown breach history. During due diligence, conduct threat-informed assessments of target environments. An undisclosed pre-acquisition compromise in an acquired entity that surfaces post-close can trigger an 8-K obligation with no warning.
Related:
Original Source
SecurityWeek
Related Articles
RSAC 2026: AI-Driven Threats, Global Cyber Leadership Shifts, and the Policies Reshaping Defense Priorities
RSAC 2026 surfaced AI-assisted attack tooling, enforcement of EU NIS2 and the incoming EU AI Act, and structural shifts in U.S. and allied cyber leadership as the defining issues for security practitioners. SOC teams and CISOs face active NIS2 enforcement since October 2024, EU AI Act high-risk system deadlines in August 2026, and ongoing CISA KEV remediation obligations. Organizations must audit AI product compliance, validate vulnerability remediation workflows, and document NIS2 risk management measures now.
Microsoft Mandates Windows 11 25H2 Upgrade for Unmanaged Home and Pro Devices
Microsoft has begun force-upgrading unmanaged Windows 11 24H2 Home and Pro devices to version 25H2 to address critical vulnerabilities including CVE-2023-28252. Unmanaged devices not enrolled in enterprise management tools will be automatically updated starting June 2024. Organizations should audit unmanaged endpoints and enforce patch management to maintain security compliance.
FCC Mandates Pre-Approval for All Foreign-Manufactured Routers Imported or Sold in the US
The FCC now requires pre-approval for all foreign-manufactured routers before they can be imported, marketed, or sold in the United States, with applicants required to disclose foreign investor relationships and submit a U.S. manufacturing relocation plan. The rule targets supply chain risks tied to documented exploitation campaigns by groups including Volt Typhoon and Salt Typhoon, which compromised SOHO and enterprise routers to gain persistent access to U.S. critical infrastructure. CISOs, procurement teams, and network engineers must audit hardware pipelines, monitor DoD and DHS exemption lists, and pressure vendors for compliance timelines now.
SEC Cybersecurity Disclosure Rule: What CISOs and Security Engineers Must Do Before the Deadlines Hit
The SEC's cybersecurity disclosure rule requires public companies to report material incidents on Form 8-K within four business days of a materiality determination, and to disclose risk management programs and board oversight annually in 10-K filings. Large accelerated filers have been subject to incident reporting requirements since December 18, 2023, with enforcement precedent already set through the SEC's fraud charges against SolarWinds and CISO Timothy Brown. Security teams must build materiality determination workflows, align IR playbooks to disclosure triggers, and ensure 10-K disclosures accurately reflect internal security posture.