Working as a Chief Information Security Officer (CISO) has never been easy or glamorous. But with the recent adoption of new rules by the U.S. Security and Exchange Commission on cybersecurity risk management, strategy, governance and incident disclosure, life as a CISO has just gotten harder. Adding to the longstanding organizational risk CISO’s have always managed, now they have to contend with personal risk as well. Late in 2023, the SEC instituted rules placed strict new disclosure requirements on publicly traded organizations intended to protect the interests of investors in these companies. The main things to know:
Firms must disclose any cybersecurity incidents that “may be material to investors” within four days of the incident’s discovery.
Companies will now also need to disclose material information regarding their cybersecurity risk management, strategy and governance efforts in their annual SEC disclosure statements—publicly traded U.S. companies fill out Form 10-K, while foreign issuers submit Form 20-F.
These 10-K and 20-F reports will need to detail a wide range of information on digital assets, and how CISOs and security teams at the executive level are constituted, how they communicate up to their boards of directors and demonstrate competence, and how the board receives that communication, whether through a committee or other arrangement.
In the press release announcing the new rules, the SEC puts theft/abuse/damage/harm to digital assets on par with similar material issues stemming from physical assets:
“Whether a company loses a factory in a fire — or millions of files in a cybersecurity incident — it may be material to investors,” said SEC Chair Gary Gensler. “Currently, many public companies provide cybersecurity disclosure to investors. I think companies and investors alike, however, would benefit if this disclosure were made in a more consistent, comparable, and decision-useful way.”
It goes unsaid, but the clear meaning is that information about a burning factory is fundamentally public and material. It’s not concealable. It’s going to get the attention of the fire department and the media, and investors as well. A suspected vulnerability in a cloud database’s permission’s framework or a laptop left in a taxi, on the other hand, doesn’t necessarily become public knowledge unless it’s a reportable incident under state or federal (FTC Act, GLBA or HIPAA) privacy reporting laws.
With the new rules, the SEC removes any wiggle room about reporting, and does so in a somewhat novel way. Privacy laws are put in place to protect the interests of individual citizens. The SEC protects the interests of investors, whether individual or institutional. By tying the enforcement to economic interests rather than the intrinsic rights as a citizen, the mandate becomes far broader. Any incident involving digital resources that has the potential to negatively impact the value of the organization is now subject to mandatory reporting under the law. And oh yeah, you have four days to make that happen.
The contextual underpinnings of the new rules make very clear that the SEC is applying a much tighter focus on CISOs, seeing the role as the mainstay position in an organization’s security hierarchy. And without specifically saying so in the text, the SEC’s actions point to a new era where much more serious enforcement actions are on the table—both for boards and for CISOs. How do we know this?
The entire exercise here must be seen in light of the SolarWinds breach and the SEC’s subsequent prosecution of SolarWinds the organization, and its CISO Timothy Brown. The issue there is that the SEC charged that Brown sent emails internally stating that the “company’s critical assets were very vulnerable,” sentiments that were not reflected in investor communications. Further, the SEC complaint alleges that “Brown was aware of SolarWinds’ cybersecurity risks and vulnerabilities but failed to resolve the issues or, at times, sufficiently raise them further within the company.”
Clearly, the SEC is setting out to bring more transparency to reporting on cybersecurity and emphasizing the role of both boards and CISOs. But it must be noted that the roles and responsibilities of boards and CISOs can diverge, which is exactly what’s happening with the SolarWinds case.
In the suit it filed in October 2023, the SEC stated that the initial Form 8-K disclosure that SolarWinds filed once it became obvious that it’s Orion platform had been compromised “was materially misleading in several respects, including its failure to disclose that the vulnerability at issue had been actively exploited against SolarWinds’ customers multiple times over at least a six-month period in the incidents involving U.S. Government Agency A, Cybersecurity Firm B, and Cybersecurity Firm C.”
News reports point out that the security vulnerabilities plaguing SolarWinds were well known within the company but weren’t disclosed until those vulnerabilities started to be exploited to attack SolarWinds customers. In singling out CISO Brown in the suit, the SEC points out that he was selling stock in the company even while he was aware these vulnerabilities could be potentially catastrophic to the company’s market valuation. The implication from the SEC is that Smith should have acted as a whistleblower but chose to conceal the vulnerabilities to profit instead.
It should be noted that SolarWinds has put out statements defending the actions of the company, but not those of CISO Brown. Which illustrates the conundrum facing everyone in the CISO position today. Security industry observers rightly perceive the SEC’s actions as rendering the CISO role in general as untenable, and a threat to individual practitioners in the field. Who would want to take on the role of CISO within a publicly traded company if inaction on the part of the board, or sloppiness within the investor relations communication team, could expose you to prosecution by federal authorities?
The key issue here is personal liability. With the SEC clearly showing they’re willing to sue CISOs, and the board of SolarWinds apparently not standing 100 percent behind their beleaguered CISO, security professionals everywhere are entirely justified in fearing that they’ll get sued—thrown under the bus—if they’re ever unfortunate enough to be the presiding executive when a significant breach occurs. CISOs need to understand that the downside risk of non-compliance has grown significantly.
So, what’s to be done? The new SEC rules are already in effect. If you are a CISO at a publicly traded company, it’s time to take stock and gain an understanding of where your organization stands in relation to the new rules. Given the monetary and reputational risks, directors and officers (D&O) insurance will be a must-have for CISOs going forward. D&O liability insurance protects individual board members and executive officers from personal loss if they are sued for actions taken on behalf of the business. If you’re already covered under your company’s policy, know that premiums are likely to increase. It’s important to understand also how far your coverage extends. Not all D&O policies cover criminal prosecution, as the SolarWinds CISO now dealing with.
What can be done to bring your currently systems, policies and practices in line with the new SEC rules? At CyCognito, our take is that to come into compliance with the new SEC rules, organizations will only be deemed as properly managing risk when they can document:
In short, this is a pragmatic approach to establishing: we know what we’ve got, we know where the material info is, we know how to think like our enemy, and we’re testing all the time. So, the question becomes: how to achieve these goals? Deloitte has helpfully released guidance that establishes a workable framework from which to proceed. We’re going to paraphrase some of that guidance here and spell out where CyCognito solutions can play a role in bringing your organization into compliance with the new mandates.
Automatic organizational reconnaissance, asset discovery and risk profiling provide the continuous visibility required for EU organizations to meet NIS2 requirements.
The CyCognito platform helps organizations follow this standard by mapping closely to the Identify and Protect functions and contributing to Detect, Respond and Recover functions.
The CyCognito platform aligns partially or substantially with 10 of the 20 control families as applied to externally facing assets.
The CyCognito platform provides guidance on assets with violations to NIST 800-171, helping organizations understand issues and remediate them promptly.
The CyCognito platform contributes to addressing ISO 27001:2013 sections “6.1.2 Information Security Risk Assessment,” “9.1 Monitoring, Measurement, Analysis and Evaluation” and “10.1 Nonconformity and Corrective Action.” Of the 14 Categories in the Annex A controls, the CyCognito platform contributes significantly to three; A.8 Asset Management, A.12 Operations Security, and A.13 Communications Security.
The CyCognito platform maps to 14 CIS controls. CyCognito provides extensive coverage around the inventory of assets, vulnerability and penetration testing, and security of ports and services.
The CyCognito platform helps your organization comply with other data privacy regulations around the globe that include protections for the way that PII is obtained, processed and stored. These include:
A key challenge for holding companies, multinational corporations, and other conglomerates is monitoring the IT security risk of their subsidiaries. Subsidiary IT environments contain assets that you don’t manage but that can still put your organization at risk. Unknown and unmanaged attacker-exposed assets in these environments can easily be the source of your organization’s most critical cybersecurity risk. The CyCognito platform provides an automated, scalable platform that will help you manage and monitor your attacker-exposed subsidiary environments efficiently and effectively.
The CyCognito platform gives you immediate visibility into the entire organization’s full scope of its legal entities, brands, and subsidiaries, even uncovering assets they didn’t know existed, and providing the business context of each asset including ownership.
CyCognito objectively measures the risk of each subsidiary and the risk of each asset in its environment by validating evidence across multiple data sources and testing for high accuracy. This evidence includes an exact path of discovery, ownership, and critical issue remediation steps. This validated evidence establishes credibility when working with subsidiaries for remediation.
CyCognito provides an automated, scalable platform that needs no deployment or configuration to monitor subsidiaries’ attack surface continuously. This is essential for maintaining visibility into the evolving attack surface, allowing the organization’s subsidiaries to mitigate security risks and threats.
Tim Matthews, Chief Marketing Officer, has been in and around cybersecurity for over twenty years, from encryption and digital certificates to modern analytics and cloud security.
Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.
Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.
Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.
Discover insights on application security, exposure management and other key topics below.
The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.
Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.
Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.
Explore CyCognito modules ASM, AST and EI in the resources below.
Scalable, continuous, and comprehensive testing for all external assets, all the time.
CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.
CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.