Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementVideo SurveillanceCybersecurity News

Year in Review: The SEC and Cybersecurity

In the wake of many cybersecurity breaches, SEC's aggressive agenda demonstrates that cybersecurity management is vital to U.S. public companies and capital markets.

By Seth P Berman, Ian Roffman, Melanie L Todman
SEC0519-Review-Feat-slide1_900px
SEC0519-Review-slide2_900px

About the Authors

Ian Roffman chairs Nutter’s Litigation Department and is a partner in the Securities Enforcement and Litigation practice group.

Seth P. Berman leads Nutter’s Privacy and Data Security practice group and is a member of the firm’s White Collar Defense practice group.

Melanie L. Todman is an associate in Nutter’s Litigation Department.

SEC0519-Review-Feat-slide1_900px
SEC0519-Review-slide2_900px
May 13, 2019

The Securities and Exchange Commission rolled out a broad, more assertive cybersecurity agenda in 2018. It investigated security practices at several companies that suffered cyberattacks, it pursued high-profile enforcement actions against companies that did not disclose or respond to data breaches adequately, and it issued detailed guidance about public company cybersecurity disclosure and internal control obligations. The SEC carried out this expanded cybersecurity initiative by using its existing regulatory toolbox in novel ways, rather than developing a new overarching regulatory scheme. The SEC’s action this past year demonstrated that it considers cybersecurity management vital to the healthy operation of U.S. public companies and that it will not hesitate to use its authority to enforce cybersecurity obligations.

 

The SEC’s Past Cybersecurity Activities

Historically, the SEC’s cybersecurity enforcement activities followed a predictable pattern: the agency targeted registered financial institutions that did not adequately safeguard customer information as required by Rule 30(a) of Regulation S-P, otherwise known as the “Safeguards Rule”. The largest of these actions, against Morgan Stanley Smith Barney (MSSB) in 2016, is a typical of the Commission’s pre-2018 focus. An employee of the firm improperly accessed a company web portal of customer information, downloaded and transferred data from 730,000 accounts to his personal server. The employee’s server was hacked and the confidential data was posted to the internet and offered for sale. In a settled administrative proceeding, the SEC found that MSSB violated the Safeguards Act by not updating its cybersecurity policies, not developing authorization programs to ensure restricted advisor access to customer account information, not monitoring advisor portal activity and not auditing or testing authorization programs to ensure effectiveness. The SEC faulted MSSB for a litany of alleged failures that violated the Safeguards Rule and fined the firm one million dollars.

Other SEC divisions gave limited cybersecurity guidance on an ad hoc basis. In 2011, the Division of Corporation Finance, which regulates the disclosures of publicly-traded companies, issued non-binding guidance regarding the duty of companies to disclose cyber-related incidents that represent a material risk or event. In April 2015, the Division of Investment Management, which regulates the mutual fund and investment advisory industry, issuing guidance regarding the obligation of funds and advisors to take steps to address the growing cybersecurity risk.

Despite the SEC’s initial restraint, there were early indications that the agency was gearing up to pursue a broader and more proactive approach. During a 2014 roundtable, Commissioner Luis Aguilar said that the SEC was “particularly concerned about the risks that cyber-attacks pose to public companies, and to the capital markets and its critical participants [and while] there is no doubt that the SEC must play role in this area.” In a 2016 press release, Chair Mary Jo White stated “Cyber-attacks are a constant threat to our market. With the cyber field steadily evolving and expanding, it is imperative we continue to enhance our coordinated approach to cybersecurity policy across the SEC and engage at the highest levels with market participants and governmental bodies.” In 2017, a year of seemingly unending high-profile cyberattacks against U.S. companies, the Division of Enforcement announced the creation of a new specialized “Cyber Unit,” erasing any lingering ambiguity about the SEC’s cybersecurity ambitions.

 

The SEC’s Aggressive Cybersecurity Agenda in 2018

The SEC made good on its promise to pursue a more aggressive and coordinated cybersecurity role in 2018. The year began with the SEC publishing a statement and interpretive guidance outlining the obligation of public companies to timely disclose material cybersecurity risks and incidents to investors, elevating what had previously been only staff guidance to form interpretive guidance of the Commission. It addressed the need for companies to revamp their incident response plans to ensure that information regarding cybersecurity risks and incidents is recorded and reported in a timely manner. Finally, the guidance stated that insider trading prohibitions applied to cybersecurity incidents and that companies should have policies and procedures to prevent company insiders with material non-public information (MNPI) from trading on knowledge of cybersecurity incidents or risks. Senior SEC officials made clear that the interpretive release was a warning to public companies that the SEC considers cybersecurity as fair game for increased oversight.

The SEC wasted no time in pursuing its cybersecurity agenda. In March 2018, Enforcement’s Cyber Unit brought an action against a former Equifax executive for insider trading when he made trades after learning MNPI concerning the massive 2017 data breach suffered by the company. In June 2018, a second Equifax manager was also charged with insider trading in relation to the breach.

One month later, on April 24, 2018, the Cyber Unit levied one of the SEC’s largest cybersecurity-related fines against Altaba, formerly known as Yahoo! In the wake of the now infamous data breach of Yahoo!’s user database, Altaba settled with the SEC for $35 million to resolve allegations that Yahoo! violated federal securities laws by failing to disclose the 2014 breach. The Commission further faulted Yahoo! for not sharing information about the breach and for failing to investigate the circumstances of the breach. Finally, the SEC criticized Yahoo! for lacking any disclosure policies or procedures that would facilitate the elevation of breaches detected by the information security team to appropriate parties who could determine whether disclosure was warranted.

The SEC’s cybersecurity efforts are not limited to its oversight of publicly traded companies. The investment industry was scrutinized by the SEC for cyber-related incidents. On September 2018, the SEC announced that it was fining Voya Financial Advisors, Inc. one million dollars in the aftermath of a data breach involving the personal identifying information of Voya’s customers. Unauthorized users impersonated Voya’s contractors, calling Voya’s technical support to reset passwords that allowed access to customer accounts, ultimately stealing customer information. The SEC found that Voya had violated the Safeguards Rule. The Voya action was the first time that the SEC relied on the “Identify Theft Red Flags Rule," representing the SEC’s new focus on ensuring that institutions quickly detect and mitigate breaches.

To cap off 2018, the SEC issued a Section 21(a) Report on October, outlining the results of an investigation into nine publicly listed companies that were victims of cyber-related frauds, revealing that they lost a combined $100 million dollars after employees were tricked into wiring money to cybercriminals posing as executives or vendors. The SEC reminded companies of their obligations under the Securities Exchange Act of 1934 to maintain internal accounting controls, ensuring transactions are executed only when authorized by management and that failure to do so would result in punitive action. The report lists various ways that companies can enhance their accounting controls so that they are in compliance with internal control requirements and prevent future infiltrations.

 

Existing Rules Used to Pursue SEC’s Cybersecurity Agenda

The SEC makes clear that various federal securities laws obligate companies to review and adopt enhanced protocols and procedures as cybersecurity risks increase, and that failure to do so will result in punitive action. It’s possible that new cybersecurity rules are on the horizon, however, the SEC has not waited to create new rules in order to pursue its cybersecurity priorities. The SEC’s current arsenal aggressively polices company’s response to cyber threats and attacks:

  • The Safeguards Rule - Regulation S-P requires financial institutions to limit the circumstances under which a financial institution may disclose a customer’s nonpublic personal information to unaffiliated non-parties. Rule 30(a) requires regulated entities to adopt written policies and procedures designed to protect against anticipated threats to the security of customer information and protect against unauthorized access to or use of customer information.
  • The Identity Theft Red Flags Rule - Regulation S-ID requires certain financial institutions and creditors to implement a written program to detect, prevent and mitigate identity theft in connection with the opening or maintenance of a “covered” account. Under the regulation, companies must evaluate these policies and procedures periodically to account for the evolving risks of identity and ensure that the program is appropriate for the “size and complexity” of the institution and “nature and scope of its activities.”
  • Disclosure and Insider Trading Rules - Public companies must disclose material cybersecurity risks and incidents. In its February 2018 guidance and subsequent enforcement action against the former Yahoo!, the SEC staked its position that the costs and negative consequences of cyber-attacks, like financial performance, increased liability and reputational damage, having significant impacts on companies and investors as the economy.

The SEC has also made clear that Rules prohibiting insider trading apply in the cybersecurity context. Corporations should institute appropriate restrictions that prevent corporate insiders with knowledge about the company’s cybersecurity risks and incidents from making trades after the discovery of a breach and before public disclosure.

Finally, public companies are responsible for ensuring that their existing system of internal accounting controls is reasonably designed to prevent and detect cyber-related frauds. The SEC’s Section 21(a) report estimated that “business email compromises” similar to those investigated by the agency have caused almost $6 billion in losses in five years. As part of the duty to safeguard assets, businesses must recalibrate internal accounting controls to account for current and evolving cybersecurity risks.

 

Key Takeaway

The SEC’s activities this year show that, in an age where cyber-related threats continue to increase in frequency and sophistication, the SEC will use its authority to protect U.S. businesses and investors. The SEC has expanded its reach by using existing, generally applicable securities to target cybersecurity. Companies should expect the SEC to utilize these tools with greater frequency and consistency into 2019 and beyond.

KEYWORDS: cyber threats cybersecurity data breach security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Seth P. Berman is a contributing writer and leads Nutter’s Privacy and Data Security practice group and is a member of the firm’s White Collar Defense practice group.

Ian Roffman chairs Nutter’s Litigation Department and is a partner in the Securities Enforcement and Litigation practice group.

Melanie L. Todman is a contributing writer and an associate in Nutter’s Litigation Department.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber tactics year in review

    A cybersecurity year in review

    See More
  • 2023 Year in Review

    Security’s Year in Review – 2023

    See More
  • 2024 Top 5 video

    Security’s Top 5 – 2024 Year in Review

    See More
×
About the Authors Ian Roffman chairs Nutter’s Litigation Department and is a partner in the Securities Enforcement and Litigation practice group. Seth P. Berman leads Nutter’s Privacy and Data Security practice group and is a member of the firm’s White Collar Defense practice group. Melanie L. Todman is an associate in Nutter’s Litigation Department.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!