The SEC cybersecurity disclosure landscape
8-K filing requirements for cybersecurity incidents
Materiality: the critical determination
Timing, process, and practical considerations
Preparing for disclosure obligations today
Key Takeaways
TL;DR
Public companies must disclose material cybersecurity incidents on Form 8-K within four business days of determining materiality.
RIAs must promptly notify affected clients of cybersecurity incidents and may need to update Form ADV and report to the SEC.
Materiality determination is the critical decision — establish an assessment framework before an incident occurs.
The SEC has penalized firms for both delayed disclosure and for downplaying incidents — honesty and promptness are essential.
Cyber Defense Agent provides continuous security evidence that demonstrates proactive management and mitigates regulatory liability during disclosure.
FAQ
Frequently asked questions
Does the 4-day 8-K rule apply to my RIA?
The Item 1.05 Form 8-K requirement applies directly to public companies. If your RIA is not a public reporting company, the 8-K requirement does not apply directly. However, the SEC uses this four-business-day standard as a benchmark for "prompt" disclosure from all registrants. RIAs should aim to notify affected clients and the SEC within a similar timeframe to demonstrate good faith.
What if I am not sure whether an incident is material?
When in doubt, treat the incident as potentially material and begin your materiality assessment immediately. Document your analysis thoroughly, including the factors considered and the reasoning for your determination. The SEC is more likely to pursue enforcement against firms that failed to assess materiality than against firms that assessed it in good faith and reached a reasonable conclusion — even if the SEC would have reached a different conclusion.
Can I delay disclosure while investigating?
You can — and should — investigate before disclosing. The four-day clock starts at the materiality determination, not at incident detection. However, you cannot unreasonably delay your materiality assessment to avoid disclosure. The SEC expects the assessment to be made "without unreasonable delay" after detection. If you are clearly dealing with a significant incident, dragging out the investigation to avoid disclosure is an enforcement risk.
What technical details must I disclose?
The SEC explicitly stated that companies do not need to disclose specific technical details about their cybersecurity systems, vulnerabilities, or the details of an ongoing investigation. Disclosure should focus on: the nature and scope of the incident, the timing, and the material impact or reasonably likely material impact. You should describe the business impact without providing a roadmap for attackers.
How does CDA help with SEC disclosure requirements?
CDA provides three key benefits for disclosure readiness: (1) continuous monitoring evidence that demonstrates you had an active, proactive cybersecurity program before any incident, (2) post-incident scans that help assess the scope and impact of an incident on your external posture, and (3) documented security posture history that supports your narrative of reasonable cybersecurity practices to regulators, clients, and courts.
Get your Cyber Defense Score™ in 60 seconds.
100 tools. No installation. No credit card. Real evidence.