{"id":385,"date":"2013-05-15T00:00:00","date_gmt":"2013-05-15T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/15\/beware-the-coming-sec-regulations-on-cybersecurity\/"},"modified":"2021-12-30T11:37:11","modified_gmt":"2021-12-30T11:37:11","slug":"beware-the-coming-sec-regulations-on-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/15\/beware-the-coming-sec-regulations-on-cybersecurity\/","title":{"rendered":"Beware The Coming SEC Regulations On Cybersecurity"},"content":{"rendered":"<p>Having been CEO of a public company and now as CEO of a global enterprise software company which provides cyber security and compliance solutions to many public companies, I can attest to the growing complexities and pressures of supply (threats and risk to operations) and demand (regulatory requirements) that must be managed on a daily basis. In his April 9 letter to the SEC Chair, Senate Commerce Chairman Jay Rockefeller (D-W.Va.) urged the SEC to step-up the requirements on its guidance (issued in October 2011) for companies to disclose information about their ability to defend against attacks on their networks. \u201cInvestors deserve to know whether companies are effectively addressing their cyber security risks \u2014 just as investors should know whether companies are managing their financial and operational risks,\u201d the letter said. From this experience I\u2019ve learned that corporate risk is idiosyncratic and varies from company to company, but the SEC looks at it all the same.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>f the SEC requires details on the material loss from cyber-attacks, the actual reporting of such proof is going to be a tall order on a company that\u2019s already strapped for specialized IT security talent and working at fever pitch to manage risk. Until then cyber incidents continue to financially drain private and public companies, IT must clean up the mess and put a lid on it in order to save face with stakeholders.<\/p>\n<p>As corporate data theft continues and investors demand answers, here are recommended actions companies can take now within their IT departments to ensure they are prepared to not only answer to to the SEC and investors, but also better prepared for managing the risks associated with maintaining and relying on global computer networks:<\/p>\n<p>It\u2019s All or Nothing: With today\u2019s emerging technologies such as cloud computing, mobility and virtualization, it\u2019s important to have a complete view of your IT landscape.<\/p>\n<p>Less is More: Those with experience with Sarbanes-Oxley understand that access and entitlements to financial reporting systems is a vital control to exhibit, mainly due to the potential impact of manipulation of those systems.<\/p>\n<p>Most companies that have their data or systems compromised as a result of security incident know full well the costs of repair and remediation; costs of deploying cybersecurity protections (including software like my company develops), litigation costs and the worst: reputational damage to brands and stock price.<\/p>\n<p>While companies are following the guidance, many that have been the targets of these successful attacks have denied any material impact in their SEC filings \u2013 the lack of these filings proves that.<\/p>\n<p>Link: <a href=\"http:\/\/www.forbes.com\/sites\/ciocentral\/2013\/05\/15\/how-to-prepare-for-when-the-sec-comes-asking-about-cybersecurity-risk\/2\/\">http:\/\/www.forbes.com\/sites\/ciocentral\/2013\/05\/15\/how-to-prepare-for-when-the-sec-comes-asking-about-cybersecurity-risk\/2\/<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-385","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=385"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/385\/revisions"}],"predecessor-version":[{"id":2872,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/385\/revisions\/2872"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}