August 15, 2023

Materiality: Crux of the new SEC cyber regs?

On July 26, 2023, only a few weeks ago, 29,980 senior business leaders of the 5,996 public companies in the US got a new headache.

If you are a CEO, CFO, CISO, CIO or General Counsel of a US public company, the SEC’s final rule S7-09-22 titled Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure is likely top of mind. In all likelihood, you have already been through many presentations about this topic over the last few months. Your Big 4 firm, trusted cybersecurity partners, biggest security vendors, social media thought leaders have all likely shared their views and helpful suggestions on this matter. You may even have filed objections with the SEC on how hard these regulations will be to comply with.

All that said, come Sept 5, 2023, you will need to comply with the SEC cyber regulations to avoid enforcement actions. This blog offers an analysis of the situation and a way forward.

The New SEC Requirements

Now that things are final, here is a quick summary of the new requirements:

New Questions and Considerations

As a CEO or CFO, as you sign and certify your company’s 10-K, one more question for you to ponder will be your confidence about the completeness and accuracy of your company’s disclosure about your cyber risk management program. From a legal perspective, you will need to stand behind the criteria used to determine whether or not an incident or risk item qualifies as material.

As a CISO or CIO, you are probably worrying about striking the right balance in the details of your disclosure so you meet the SEC’s requirements without giving away confidential information about your company’s cyber program. You are also probably debating with senior leaders and your legal department about the specifics of determining materiality of incidents and risk items. A crucial issue that will come down to you personally is to make sure that the people responsible for determining the materiality of a cybersecurity incident have all the information they need to make that determination without delay, and follow a consistent, defensible process.

Unwritten Requirement(s)

As is the case with any regulation, it is helpful to go back to the spirit of the regulation to understand how best to comply. The SEC introduced these new regulations because they were unhappy with the way in which cybersecurity is governed in US public companies. This is similar to the general discomfort in the past with accounting practices of corporate America which led to the current SOX regime.

In this case, ultimately, you want to put information in your 10-K and 8-K cybersecurity filings that inspires confidence with investors and the SEC about your company’s cybersecurity practices.

 

 

 

Sure, you want to avoid enforcement actions. You also don’t want to lose 45% of your company’s stock price due to lower investor confidence in cyber risk management.

Let’s start with a gap analysis…

Gap Analysis

Balbix has experience working with Fortune 1000 companies (including 13 of the Fortune 100) on cyber risk management over the last five years. Based on discussions with hundreds of senior cybersecurity and business leaders, Fig 1 is a gap analysis between capabilities your organization likely has, and what you need to comply with the new SEC regulations.

Fig 1: Gap between current and required capabilities

 

A few things stand out:

  1. Most organizations are struggling with basic items like asset-inventory and subjective, inconsistent processes around cyber risk management.
  2. Even “cybersecurity-mature” companies, like many of the Fortune 100, have not figured everything out. Sure, they have made investments in this area, but an accurate, near real-time, big picture of cyber risk tying IT level risks to business risks in a traceable and actionable way is elusive.
  3. Across the board, there is a lot more ad-hoc rather than data-driven decision making.
  4. Materiality determination is not easy – why?

It all comes down to Materiality…

How do we identify material risks in a data-driven, transparent manner?

As a CEO, I often think about solving business problems as a matter of allocating enough $ and time towards the problem, and assigning the problem to a capable leader and team. Determining materiality is not that simple. Let’s see why.

Fig 2 shows an abstract picture of the enterprise attack surface.

  • The right axis enumerates everything that makes up the modern digital enterprise – all the software and data that you have. Some of this software and data lives in servers located in your traditional data centers, or in computer systems located in your offices, in your cloud-based systems, in the mobile devices of your employees, and in the computer systems of your supply chain.
  • The left axis shows all the relevant attack vectors – all the different ways in which bad guys can do bad things to your assets
  • Each point on the picture, represents one way in which bad things can happen
  • The z-axis is cyber risk, your expected cybersecurity loss
Attack Surface
Fig 2: The Enterprise Attack Surface

 

This picture, as simple as it sounds, is not easy to get. First the right and left axis need to be enumerated, and if you go back to Fig 1, you may notice that your organization may not have a clean and comprehensive inventory of all your systems, applications and users (and the relationships between them). Instead, bits and pieces of this information is spread across different tools with your teams struggling daily with this siloed data as they go about their operational tasks.

If you have the asset inventory problem solved, in order to calculate or estimate risk, the risk equation of Fig 3 needs to be solved for each point of the attack surface picture of Fig 2.

Fig 3: The Risk Equation

 

For predicting likelihood, we need to incorporate information about the severity of the issue, the threat level – are attackers actually using this specific attack method, the exposure – whether the software is deployed or being used in a way for attackers to exploit using this vulnerability and attack methods, and the effectiveness of any security controls that you may have deployed covering this asset. For predicting impact, you need to take into account the $-impact if this asset is compromised.

All of the data that drives the likelihood side of the risk equation changes on an daily (if not hourly basis). Assets come and go, software is updated with new versions as well as how it is used, new vulnerabilities are discovered and published, new exploits are developed and security tools are also updated/installed/removed.

If your head is spinning a bit, don’t be surprised. In a typical Fortune 500, the amount of data that needs to be analyzed per day to produce an accurate picture of cyber risk is 100TB to several Petabytes. This is impossible for humans to do – even if you have a small army of cybersecurity professionals in your infosec team. 250 people need 10 lifetimes to just view a petabyte of data! This is why the cybersecurity materiality determination problem is so hard, and why we get it wrong again and again.

However, mapping the attack surface and figuring out materiality is a perfect problem to be solved by AI-powered models supervised lightly by human experts.

The way forward

Fig 4 shows how the combination of expert human input and specialized AI-powered models can work together to help your organization meet the SEC’s requirements.

 

Fig 4: Materiality Determination

 

With this approach, you can be data-driven and efficient, while keeping ultimate control of determining materiality with human judgement. The trouble, of course, is coming up with a system that provides a consistent, data-driven, inspectable, near real-time mapping of IT security issues to business risks and identifies high-risk items for your review.

Balbix can help

We designed Balbix to help organizations manage cyber risk in the age of infinite attack surfaces. Here is how Balbix can help you with complying with the new SEC regulations.

  1. Materiality determination. Balbix can help you determine whether an incident, application, asset, threat or vulnerability is material, by analyzing all relevant data in a rigorous, consistent, data-driven and maximally automated way to identify high risk items. You can combine quantitative data and qualitative judgement in a consistent fashion for defensible 8-K filings
  2. Data-driven cyber risk management. The Balbix platform is a near-real-time, data-driven, traceable, actionable system to quantify and manage material cyber risks down to acceptable levels. Balbix is deployed in dozens of the Fortune 500 as well as smaller public companies, and leverages data from your existing cybersecurity tooling
  3. Unifying cybersecurity governance, operations and compliance. Balbix enables you to unify and align cyber governance, operational cybersecurity, and compliance to enable better management of material cyber risks. Balbix implements role-specific views and governance/management capabilities for board, senior leaders, CISO, operational teams, GRC and risk owners.

The image of Fig 5 is quite literally a “brain scan” of Balbix that shows how petabytes of cybersecurity, IT and business data is continuously analyzed to produce a human-scale traceable and actionable unified cyber risk model. Every ◼︎ in the interior of this graph is a specialized AI model, e.g., an LLM, etc., purpose built to solve a specific data science problem.

 

Fig 5: The Balbix Brain

 

Your expected journey with Balbix

Over the course of the last 5 years, we have worked with our customers on transforming their cybersecurity programs to the new paradigm of “AI-powered”, and learnt a few lessons along the way. Fig 6 shows the path and timelines your organization will likely follow to close the gaps of Fig 1 and fully meet the requirements of the new SEC regulations.

 

Fig 6: Path to SEC compliance

 

The timelines can be compressed quite a bit. Recently we helped a Fortune 100 organization gain accurate asset inventory in 6 days and get a v1.0 of a data-driven cyber risk model, better than anything they had previously, in another 3 weeks.

Some screenshots of what your new unified cybersecurity picture will look like are shown below.

 

 

 

If this is of interest,  please reach out to us and schedule a meeting.