Linchakin

(ISC)2 Supports Members with Thoughtful Response to SEC Proposed Rule on Cybersecurity Reporting

 May 25, 2022     No comments   

Guy-Woman-ComputerOn March 9, 2022, the SEC released new proposed rules relating to cybersecurity risk management, incident reporting, and disclosure for investment advisers and funds.

The proposed rules would require advisers and funds to adopt and implement policies and procedures that are designed to address cybersecurity risks. Advisers and funds would be required to review and assess the design and effectiveness of their cybersecurity policies and procedures; and prepare a report describing the review, explaining the results, documenting any incident that has occurred since the last report, and discussing any material changes to the policies and procedures since the last report.

The proposed amendments would require current reporting of material cybersecurity incidents by adding a new item to Form 8-K which is already in use. This added item would require companies to disclose material cybersecurity incidents within four business days of an incident being determined to be material.

Required disclosure would include:

  • When the incident was discovered and whether it is ongoing.
  • A brief description of the nature and scope of the incident.
  • Whether any data was stolen, altered, accessed, or used for any other unauthorized purpose.
  • The effect of the incident on the company’s operations; and
  • Whether the company has remediated or is currently remediating the incident.

The proposed rules would also require disclosure about the cybersecurity expertise of members of the board, if any. The proposed rules do not define “cybersecurity expertise” but provide several factors to consider, such as prior work experience or certifications in cybersecurity. (ISC)² addresses each of these in our response.

These new proposed rules would have a significant impact on affected entities. If approved, many advisers and funds would be required to develop more robust programs that may not address the issues each individual organization is faced with intricate and comprehensive cybersecurity programs in such a short time frame. 

(ISC)² compiled our response to the SEC request for comment with our members in mind and taking into consideration the importance of certifications for those director roles.

Effectively managing cyber risks and responsible breach disclosure should be a top priority for organizations and (ISC)² is confident our response encompasses that importance while balancing the difficult position of the organization as they navigate the challenges of a cybersecurity incident.

To learn more view the entire (ISC)² response to the SEC Request for comment.

Adblock test (Why?)


You may be interested in:
>> Is a Chromebook worth replacing a Windows laptop?
>> Find out in detail the outstanding features of Google Pixel 4a
>> Top 7 best earbuds you should not miss

Related Posts:
>> Recognizing 12 Basic Body Shapes To Choose Better Clothes
>>Ranking the 10 most used smart technology devices
>> Top 5+ Best E-readers: Compact & Convenient Pen
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • High Severity IDOR Bugs inCNCF ‘Harbor’ Project by VMware Oxeye, the provider of award-winning cloud-native application security, today announced that its security researchers have uncovered several new high… Read More
  • Event-Driven Architecture: Automatic DTO Generation From Event Documentation One very important thing in the software development process that is often overlooked in the early stages of a project is API documentation. One of … Read More
  • The World Behind the Moon Like pitiless jaws, a distant crater opened for their ship. Helplessly, they hurtled toward it: helplessly, because they were still in the nothingnes… Read More
  • Every Career Starts with a Leap of Faith: Navigating a Career in Content Crea... Gigi Robinson, 21, is a self-made social media tycoon. She hosts a Spotify Live podcast called “Everything You Need Is Within’s ‘The Creator Chronicl… Read More
  • Designer to Developer Handoff: How to Build a React Component from a Design File AWS Amplify allows you to build an application from Figma and import the components into React. With the help of Amplify, the tool creates reusable R… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment


Copyright © 2025 Linchakin | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates