SEC Division of Corporation Finance Director Gives Speech on Cybersecurity Disclosure
December 15, 2023
            In a recent speech, Erik Gerding, director of the SEC’s Division of Corporation
                Finance (the “Division”), discussed the SEC’s July 2023 final rule Cybersecurity Risk Management, Strategy, Governance, and
                        Incident Disclosure. In his introduction, Mr. Gerding
                commented on the timeliness of his remarks, noting that “[b]ecause some of the new
                disclosure requirements will take effect later this month, it is important to
                underscore the changes the Commission made from the proposal, highlight some
                significant parts of the rationale and mechanics of these rules, and clear up
                potential misconceptions.” The body of Mr. Gerding’s discussion was divided into the
                five topics below.
        Overview of the Rule and Its Rationale
Mr. Gerding addressed the SEC’s rationale behind releasing the final rule,
                    including “investors’ need for improved disclosure” about cybersecurity in light
                    of the greater cybersecurity risks in an increasingly technology-reliant world.
                    He also stressed that, although investors “need consistent and comparable
                    disclosures” about cybersecurity, it would be a “misconception” to think that
                    the Commission is “seeking to prescribe particular cybersecurity defenses,
                    practices, technologies, risk management, governance, or strategy.” Rather,
                    “[p]ublic companies have the flexibility to decide how to address cybersecurity
                    risks and threats based on their own particular facts and circumstances.” 
            The Cybersecurity Incident Disclosure Provision
Mr. Gerding indicated that a better understanding of this provision of the final
                    rule can be attained by asking three questions: “what must be disclosed, when
                    must that information be disclosed, and why did the Commission use a materiality
                    standard.” He emphasized the SEC’s decision to use materiality1 as the threshold for when a disclosure is required and clarified that this
                    was a departure from the proposal, “which would have required additional details
                    that were not explicitly limited by materiality.” While acknowledging that some
                    may “prefer a more bright line rule,” he explained that “[m]ateriality is a
                    touchstone of securities laws [that] connects disclosures back to the needs of
                    investors.”
                He observed that the deadline for reporting a material cybersecurity incident is
                    four business days after a registrant “determines the incident to be material
                    [and] is not four business days after the incident occurred or is
                    discovered.” He clarified that “[t]his timing recognizes that, in many cases, a
                    company will be unable to determine materiality the same day the incident is
                    discovered.”
            The National Security and Public Safety Delay Provision
This provision of the final rule, which resulted from feedback on the proposal,
                    allows registrants to request a delay from providing a cybersecurity incident
                    disclosure if the U.S. Attorney General communicates in writing that such
                    disclosure “would pose a substantial risk to national security or public safety”
                    (also see Deloitte’s earlier news item for
                    more information about the FBI’s guidance on this topic). Mr. Gerding further
                    pointed to the Division’s recently issued compliance and disclosure
                    interpretation (C&DI) clarifying that just because a registrant consults
                    with the DOJ regarding a delay does not automatically signify that the incident
                    in question is material. Therefore, this should “not create a disincentive for
                    public companies to consult with law enforcement or national security agencies
                    about cybersecurity incidents.” Rather, Mr. Gerding “would encourage public
                    companies to work with the FBI, CISA, and other law enforcement and national
                    security agencies at the earliest possible moment after cybersecurity incidents
                    occur” since such “timely engagement is in the interest of investors and the
                    public.” 
            The Risk Management, Strategy, and Governance Provisions
Mr. Gerding noted that the SEC “streamlined” these provisions after reading
                    comments on the proposal and indicated that its intent in doing so was to “avoid
                    being overly prescriptive or empowering threat actors to the detriment of
                    companies and their investors.” Specifically, he gave two examples of
                    enhancements the SEC made in in the final rule: (1) requiring “disclosures
                    regarding management’s role in assessing and managing material risks from
                    cybersecurity threats” rather than “whether any members of their board have
                    cybersecurity expertise” and (2) focusing “more broadly on the company’s
                    cybersecurity processes” as opposed to the proposal’s requirement to disclose
                    “cybersecurity policies and procedures as well as certain specific details
                    regarding those policies and procedures.”
            Next Steps
Given the final rule’s imminent compliance date, Mr. Gerding addressed some of
                    the actions public companies should consider taking, such as consulting with
                    “chief information security officers, a company’s other cybersecurity experts
                    and technologists, the company’s disclosure committee, and those responsible for
                    advising them on securities law compliance.” He also stressed the Division’s own
                    “open door policy” with respect to assisting companies with their interpretive
                    questions regarding the final rule’s provisions. Mr. Gerding closed his remarks
                    by reassuring companies that the Division does not “seek to make ‘gotcha’
                    comments or penalize foot faults.” Rather, he underscores that the SEC’s
                    overarching goal with this rule, as with other rules, is to “elicit tailored
                    disclosures that provide consistent, comparable, and decision-useful information
                    to investors.”
                For more information about the requirements of the SEC’s new cybersecurity rule,
                    see Deloitte’s July 30, 2023, Heads
                        Up.
            Footnotes
1
                        
The cybersecurity rule indicates that the definition of “materiality” is
                            consistent with that established by the U.S. Supreme Court in multiple
                            cases, including TSC Industries, Inc. v. Northway, Inc. (426 U.S.
                            438, 449 (1976)); Basic, Inc. v. Levinson (485 U.S. 224, 232
                            (1988)); and Matrixx Initiatives, Inc. v. Siracusano (563 U.S. 27
                            (2011)). Quoting TSC Industries, Inc. v. Northway, Inc.