Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and Management

The new cybersecurity accountability: SEC takes action

By Padraic O'Reilly
Laptop and mouse on wood desk

Image courtesy of Luca Bravo via Unsplash

January 6, 2025

As cyberattacks grow more systemic and continue to mature, regulators have increased their focus on transparency and accountability. On October 22, 2024 the SEC announced a series of fines against four firms for making “materially misleading disclosures” regarding SolarWinds-related intrusions. The action highlights a marked shift in what the SEC expects of companies regarding cyber disclosures, targeting omissions that could leave investors in the dark about the scope and impact of security events. The SEC's stance is clear: cybersecurity risk transparency is an essential component of a public corporation’s fiduciary duty to investors. This stance signals a shift in corporate oversight, where cybersecurity risk is now as critical to disclose as financial metrics. In much the same way the Sarbanes-Oxley Act transformed financial governance, the SEC’s actions mark a pivotal step in making cybersecurity accountability a core element of corporate governance.

The evolving role of CISOs under SEC's "Cyber SOX"

As the fines demonstrate, security leaders are now tasked with bridging gaps between cyber risk and financial impact — combining an understanding of risk metrics and their financial impact that resonate at the board level. The cost of a cyberattack continues to weigh heavily on businesses; in 2024, U.S. companies paid an average of $9.36 million to recover from data breaches, only a slight decline from the previous year. Globally, the average cost was a staggering $4.88 million.

For today's CISOs, this marks a turning point. Their responsibilities have expanded beyond the traditional duties of checkbox compliance requirements and control implementation. They are now critical players in corporate governance, tasked with ensuring that cyber risks are evaluated, managed and reported transparently to stakeholders. The SEC's cybersecurity rule now demands that CISOs and boards take proactive steps to address the financial implications of cyber threats, focusing on clear and quantifiable disclosures. Beyond reporting on the technical state of cybersecurity, they must now align cyber risk metrics with operational and financial risk metrics, reinforcing cybersecurity as a foundational aspect of overall business health.

8-K filings and disclosure strategy

A notable aspect of the SEC's cybersecurity ruling is the requirement for current and timely reporting of material cybersecurity incidents via Form 8-K filings. Since the rule took effect in 2023, there has been a sharp rise in 8K filings regarding cyber events, reflecting a broader shift in expectations for security leaders. While materiality is a well-understood economic concept that can be determined using modern risk quantification methods, discrepancies remain in how it’s interpreted. Executives often tie materiality to high revenue thresholds, but investors may view smaller breaches as significant when they indicate broader deficiencies in cyber risk management.

This adjustment period has led some organizations to adopt an overly cautious approach, submitting filings without fully quantifying the material impact. While technically compliant, this strategy can obscure meaningful disclosures and pose a risk to investors seeking transparency. The SEC's stance on recent omissions brings a pointed message: failure to communicate critical cyber risk information isn't just a lapse; it is a regulatory violation that can have major financial consequences.

For CISOs, this highlights the importance of cybersecurity disclosures as integral to investor relations. Cyber risk management, when done properly, ensures clear communication between information security and boards, promoting better decision making and transparency, much like standardized reporting practices implemented under SOX.

Bridging the knowledge gap in financial and cyber risk

One of the greatest challenges for security leaders in meeting these new requirements is the need for cross-disciplinary knowledge. Many security leaders are highly skilled in technical areas but may lack experience in financial terminology and its implications for cybersecurity. Yet, understanding these financial dimensions is essential. It allows CISOs to clearly communicate risk posture to boards and investors and align cyber risks with other critical business risks in financial terms.

Strong platforms emphasizing measurable, actionable cybersecurity programs provide tools that help close this gap. By translating cyber risk into language that resonates with other departments, such as finance and investor relations, CISOs can effectively communicate the full impact of cybersecurity incidents. This approach fosters a culture of transparency, in line with SEC expectations, while enhancing the organization's ability to protect against cyber threats.

Focus on omissions: The SEC's new emphasis on transparency

The SEC's recent fines reflect a broader regulatory focus on omissions rather than misstatements. In the case of the four fined firms, the SEC's rationale was rooted in a "reasonable investor" standard — essentially, investors have a right to expect clear and accurate information regarding material cyber risks. This emphasis on omissions challenges CISOs to ensure that cybersecurity reports are complete and understandable to stakeholders who may not have a technical background.

For cybersecurity leaders, risk management and disclosure go hand-in-hand, but each has distinct requirements. Under section 106(b), organizations must “show their work” by disclosing the processes they use to assess, identify, and manage cybersecurity risks. This transparency requires CISOs to work with other executives to ensure these processes are well-documented, consistent, and clearly communicated to investors.

In contrast, omissions in incident disclosures — addressed under Section 105 — can lead to significant consequences including fines and reputational damage. CISOs must balance these dual responsibilities by developing strategies that prioritize transparency in both ongoing risk management processes and incident-specific disclosures.

The irony of the fines: When transparency would have softened the blow

The recent SEC fines spotlight an ironic truth: had these companies quantified their cyber risks in financial terms, their disclosures may have seemed less alarming than the narrative implied by technical terms alone. By avoiding financial metrics, the companies presented cybersecurity events in vague, often unsettling terms, leaving investors to interpret risks without material context. Reporting a “ransomware attack” or “breach” without quantifiable impact can appear far more daunting than the financial implications might suggest.

This irony reveals the need for security leaders to integrate financial clarity into their cyber resilience efforts, making cyber disclosures a seamless part of corporate governance. The SEC’s rule is, in many ways, a call for CISOs and boards to present cybersecurity not as an isolated technical function but as a quantifiable, manageable element of operational and financial stability.

A new era of corporate governance and cybersecurity accountability

As SOX reshaped corporate governance around financial transparency, the SEC's cybersecurity ruling has the same effect on cyber risk. It encourages CISOs to adopt a proactive and transparent approach to managing and disclosing cyber risks. By embedding cybersecurity into the core of corporate governance, companies can ensure resilience in the face of growing cyber threats, ultimately building greater trust among investors.

For CISOs, cybersecurity must be treated as a critical element of business continuity and investor confidence. As SOX set the stage for financial accountability, the SEC's cybersecurity rule establishes a new standard for cybersecurity accountability that holds security leaders and boards to a higher level of transparency and integrity in the digital age.

By aligning cyber and business risks, CISOs can deliver the insights necessary to drive informed decisions and ensure compliance with SEC standards. With end-to-end tools, organizations can establish a cybersecurity culture that meets these evolving demands, delivering transparency, resilience and measurable business value.

KEYWORDS: CISO CISO leadership cyber attack cybersecurity SEC regulations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Padraicorielly 01

Padraic O'Reilly is Chief Product Officer and Co-Founder at CyberSaint, where he leads product innovation and development. His experience as a Harvard-trained economist, IT risk and compliance consultant, and his rapid exposure to Cybersecurity led him to seek out CISOs, CIOs, and Boards of Directors at global organizations to pursue the answer to the question - how can cyber be managed, measured, and understood like any other business function? Padraic’s current activity spans working directly with organizations from public agencies to private companies across the globe to understand how to measure cyber risk, especially amidst the global pandemic which is fueling massive digital transformation projects around the world. Padraic was a key member of the group providing feedback on the NIST Cybersecurity Framework during its development and is an expert in regulatory standards both in security and privacy, including the NIST Risk Management and NIST Privacy Frameworks. An expert in Artificial Intelligence (AI) and economic modeling, Padraic works with members of the Global 500 to research and deploy risk quantification, risk intelligence gathering, and risk reporting and communication strategies. Padraic also holds a patent entitled, “System and Method for Monitoring And Grading A Cybersecurity Framework” which has inspired much of his work on cohesive IT and cyber risk management approaches.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber software freepik

    When it comes to cyber risk, company size doesn't matter

    See More
  • leadership

    New Survey Reveals CISO Stress and the Toll it Takes

    See More
  • metaverse-freepik1170x658.jpg

    The evolving standards for online accountability in 2022

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing