Cybersecurity

SEC finalizes cybersecurity rules


Risk management and strategy

Registrants must provide in their Form 10-K a description of their processes, if any, for assessing, identifying and managing material risks from cybersecurity threats, including whether:

  • The described cybersecurity processes have been integrated into the registrant’s overall risk management system or processes, and how. 
  • The registrant engages assessors, consultants, auditors or other third parties in connection with such processes. 
  • The registrant has processes to oversee and identify material risks from cybersecurity threats associated with its use of any third-party service provider. 

Registrants must also describe whether any risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have materially affected or are reasonably likely to materially affect the registrant – including its business strategy, results of operations, or financial condition and if so, how. 

Governance

The final rules require disclosures about the board of directors’ oversight of risks from cybersecurity threats and management’s role in assessing and managing material risks from cybersecurity threats. 



Source

Related Articles

Back to top button