Blog
/
SEC Cybersecurity Disclosure Rules: Requirements and Deadlines

SEC Cybersecurity Disclosure Rules: Requirements and Deadlines

Quick Summary / Key Takeaways

  • Material cybersecurity incidents must be disclosed within four business days after the company determines the incident is material, as required under Form 8-K Item 1.05.
  • Annual reports must include cybersecurity risk management and governance disclosures under Regulation S-K Item 106, including how companies assess and manage cybersecurity threats.
  • Materiality is evaluated from the perspective of a reasonable investor, using the SEC’s established materiality standard that considers both financial and operational impact.
  • Foreign private issuers must disclose material cybersecurity incidents through Form 6-K and include cybersecurity risk management and governance disclosures in their Form 20-F annual reports.
  • Companies must describe board oversight and management’s role in cybersecurity risk management, providing investors with visibility into how cybersecurity threats are monitored and addressed.

Introduction

Introduction

Cybersecurity has become a core disclosure issue for public companies as digital threats increasingly affect operations, financial performance, and investor confidence. In response, the SEC cybersecurity disclosure rules established a standardized framework requiring companies to report material cybersecurity incidents and risk management practices in their public filings. These rules introduced specific reporting obligations, including Form 8-K Item 1.05 for material incidents and Regulation S-K Item 106 for cybersecurity risk management and governance disclosures in annual reports. The goal is to ensure investors receive timely, consistent information about how companies identify and manage cybersecurity risks.

The rules also emphasize materiality and reporting timelines. Companies must disclose a material cybersecurity incident within four business days after determining the incident is material, rather than when the breach is first discovered. In addition, annual filings must describe the company’s cybersecurity risk management processes, board oversight, and management’s role in monitoring cyber threats. These requirements position cybersecurity as a governance and disclosure issue, not just a technical matter handled by IT teams.

This guide explains the SEC Cybersecurity Disclosure Rules: Requirements and Deadlines, including how material incidents are defined, when reporting deadlines are triggered, and what companies must disclose in annual filings. For legal and compliance teams responsible for evaluating and reporting material cybersecurity incidents, platforms such as Dimension AI help review cybersecurity disclosures against prior SEC filings using precedent-based workflows with traceable sources from EDGAR, helping ensure incident disclosures and governance reporting remain accurate, auditable, and aligned with SEC cybersecurity reporting requirements.

SEC Cybersecurity Disclosure Rules: Key Filing Forms and Reporting Deadlines

Filing FormDisclosure PurposeReporting DeadlineReporting Deadline
Form 8-K (Item 1.05)Disclosure of material cybersecurity incidents, including nature, scope, timing, and material impactWithin 4 business days after the company determines the incident is materialAll U.S. public companies
Form 10-KAnnual disclosure of cybersecurity risk management processes, strategy, and governance oversight under Regulation S-K Item 106Annual filing deadlineAll U.S. public companies
Form 20-FAnnual disclosure of cybersecurity risk management and governance for foreign private issuersAnnual filing deadlineForeign private issuers
Form 6-KDisclosure of material cybersecurity incidents or updates when the information is made public or required in the issuer’s home jurisdictionPrompt disclosureForeign private issuers

Factors Used to Assess Cybersecurity Incident Materiality

Incident TypeDescriptionPotential Financial ImpactPotential Investor / Market Impact
Data BreachUnauthorized access to sensitive customer, employee, or proprietary dataInvestigation costs, remediation expenses, regulatory penaltiesLoss of customer trust and investor confidence
Ransomware AttackSystems encrypted or disabled by attackers demanding paymentOperational disruption, recovery costs, possible ransom paymentsConcerns about operational resilience
Intellectual Property TheftTheft of proprietary technology, trade secrets, or strategic dataLoss of competitive advantage and long-term revenue impactIncreased disclosure scrutiny from investors
System Outage from Cyber IncidentDisruption of critical systems or services caused by a cyberattackLost revenue, contractual penalties, operational recovery costsMarket concern over reliability of operations

Cybersecurity Disclosure Readiness Checklist (Before a Reportable Incident)

  • Establish a cross-functional incident response team that includes legal, cybersecurity, compliance, and investor relations leadership.
  • Define a documented internal process for determining incident materiality in line with SEC standards used for Form 8-K Item 1.05 disclosures.
  • Implement internal controls to monitor and document cybersecurity risks and incidents that could affect financial condition or operations.
  • Train directors and relevant board committees on their cybersecurity oversight and disclosure responsibilities required under Regulation S-K Item 106.

Cybersecurity Disclosure Compliance Checklist (After an Incident or Filing Review)

  • Confirm whether the incident meets the materiality threshold that triggers the Form 8-K four-business-day disclosure requirement.
  • Review Form 10-K or Form 20-F cybersecurity risk disclosures to ensure governance and risk management descriptions remain accurate.
  • Validate that internal reporting processes allow teams to identify, evaluate, and escalate incidents quickly enough to meet SEC deadlines.
  • Maintain clear documentation of incident evaluations and disclosure decisions to support auditable SEC reporting and regulatory review.

Table of Contents

Section 1: MATERIAL CYBERSECURITY INCIDENT DISCLOSURE AND REPORTING TIMELINES

Section 2: CYBERSECURITY DISCLOSURES IN ANNUAL FILINGS AND CORPORATE GOVERNANCE

Section 3: DISCLOSURE EXCEPTIONS, RISK MANAGEMENT, AND ENFORCEMENT RISKS

Frequently Asked Questions

Section 1: MATERIAL CYBERSECURITY INCIDENT DISCLOSURE AND REPORTING TIMELINES

FAQ 1: What constitutes a material cybersecurity incident?

Under the SEC cybersecurity disclosure rules, a cybersecurity incident is considered material if there is a substantial likelihood that a reasonable investor would view the information as important when making an investment decision. This standard follows the long-standing SEC materiality framework and applies to disclosures required under Form 8-K Item 1.05. Companies must assess both quantitative impacts, such as financial losses or operational disruption, and qualitative factors, including potential harm to customer relationships, exposure of sensitive data, or compromise of intellectual property.

The determination focuses on the overall impact on the company’s financial condition, results of operations, or business strategy, rather than only the technical severity of the attack. Public companies typically rely on cross-functional internal review processes involving legal, cybersecurity, and executive leadership to evaluate incidents quickly and determine whether disclosure is required under the SEC’s reporting rules.

Takeaway: A cybersecurity incident is material if a reasonable investor would consider the information important, requiring companies to evaluate both financial and operational impacts when determining disclosure obligations.

↑ Back to Table of Contents

FAQ 2: When is the four-day reporting deadline triggered?

The four-business-day reporting deadline begins once a company determines that a cybersecurity incident is material under the SEC’s disclosure rules. This requirement is established under Form 8-K Item 1.05, which obligates registrants to disclose material cybersecurity incidents. The clock does not start when the incident is first detected, but when management concludes that the incident meets the SEC materiality standard based on its potential impact on the company’s financial condition, operations, or investor decision-making.

Companies are expected to make the materiality determination without unreasonable delay after discovering the incident. Once the determination is made, the company must file a Form 8-K within four business days describing the material aspects of the incident, including its nature, scope, and timing, to the extent known at the time of filing. Delays in making the determination or submitting the filing can increase regulatory risk and draw scrutiny from the SEC.

Takeaway: The four-business-day deadline begins when the company determines the cybersecurity incident is material, not when the incident is first discovered.

↑ Back to Table of Contents

Section 2: CYBERSECURITY DISCLOSURES IN ANNUAL FILINGS AND CORPORATE GOVERNANCE

FAQ 3: What must be included in the annual 10-K filing?

Under the SEC’s cybersecurity disclosure rules, companies must include specific cybersecurity risk management disclosures in their Form 10-K under Regulation S-K Item 106. These disclosures must describe the company’s processes for assessing, identifying, and managing material risks from cybersecurity threats, including whether and how those risks have materially affected or are reasonably likely to materially affect the company’s business strategy, results of operations, or financial condition.

The filing must also explain the governance structure for cybersecurity oversight. This includes how the board of directors oversees cybersecurity risk and the role of management in assessing and managing cybersecurity threats. Companies are expected to describe the relevant expertise, reporting structures, and processes used to monitor cybersecurity risks, ensuring that investors understand how cybersecurity is integrated into the company’s overall risk management framework.

Takeaway: Form 10-K cybersecurity disclosures must describe risk management processes, board oversight, and management’s role in monitoring and addressing cybersecurity threats.

↑ Back to Table of Contents

FAQ 4: How do these rules affect foreign private issuers?

The SEC’s cybersecurity disclosure rules also apply to foreign private issuers (FPIs), but the reporting framework differs from that of domestic registrants. When a cybersecurity incident is determined to be material, an FPI must disclose the incident on Form 6-K if the company publicly discloses the information in its home jurisdiction, files it with a foreign exchange, or distributes it to security holders. This approach ensures that U.S. investors receive access to the same material cybersecurity information that the issuer provides in its primary markets.

FPIs must also include cybersecurity risk management and governance disclosures in their annual report on Form 20-F, consistent with the SEC’s cybersecurity rule updates. These disclosures require companies to describe their processes for assessing and managing cybersecurity risks and the role of management and the board in overseeing those risks, providing investors with a clear view of how cybersecurity threats are monitored and addressed.

Takeaway: Foreign private issuers disclose material cybersecurity incidents through Form 6-K and provide cybersecurity risk and governance disclosures in their Form 20-F annual reports.

↑ Back to Table of Contents

FAQ 5: What is the board's role in cybersecurity governance?

Under the SEC’s cybersecurity disclosure rules, companies must describe how the board of directors oversees cybersecurity risks in their annual filings. These requirements appear in Regulation S-K Item 106, which requires disclosure of the board’s role in monitoring cybersecurity threats and how management reports cybersecurity risks to the board. Companies must explain whether cybersecurity oversight is handled by the full board or a specific committee, and how the board is informed about material cybersecurity risks and incidents.

The disclosure must also explain management’s role in assessing and managing cybersecurity threats, including which executives or teams are responsible for cybersecurity risk management and how they communicate with the board. The goal is to provide investors with clear visibility into how cybersecurity risk oversight is integrated into the company’s governance structure.

Takeaway: Companies must disclose how the board oversees cybersecurity risks and how management reports those risks to the board as part of their cybersecurity governance disclosures.
Generating…

↑ Back to Table of Contents


Section 3: DISCLOSURE EXCEPTIONS, RISK MANAGEMENT, AND ENFORCEMENT RISKS

FAQ 6: Can companies delay disclosure for national security?

Yes. The SEC cybersecurity disclosure rules allow a company to delay reporting a material cybersecurity incident if the U.S. Attorney General determines that immediate disclosure would pose a substantial risk to national security or public safety. When this determination is made, the Attorney General provides written notification to the SEC, which allows the company to postpone the Form 8-K Item 1.05 disclosure.

The initial delay may last up to 30 days, and the Attorney General may grant an additional 30-day extension if the risk continues. Outside of this limited exception, companies must follow the standard rule and file Form 8-K within four business days after determining the incident is material.

Takeaway: A delay is allowed only when the U.S. Attorney General determines that disclosure would create a national security or public safety risk. Otherwise, the four-business-day Form 8-K reporting deadline applies.

↑ Back to Table of Contents

FAQ 7: How should companies describe their risk management processes?

Under the SEC cybersecurity disclosure rules, companies must describe how they assess, identify, and manage material risks from cybersecurity threats in their annual filings. These disclosures appear under Regulation S-K Item 106 and should explain the company’s cybersecurity risk management framework, including whether cybersecurity risks are integrated into the organization’s broader enterprise risk management processes. Companies may also disclose the use of third-party service providers, consultants, or internal security teams involved in monitoring and managing cybersecurity risks.

The disclosure should focus on the structure and governance of the cybersecurity risk management program, rather than detailed technical controls that could create security vulnerabilities. Many organizations describe oversight processes, incident response planning, and internal reporting channels that inform management and the board about cybersecurity risks. Using precedent-based workflows with traceable sources from prior SEC filings can help legal and compliance teams prepare disclosures that remain auditable, verifiable, and consistent with SEC reporting expectations.

Takeaway: Describe how cybersecurity risks are identified, assessed, and managed, focusing on governance, oversight, and integration with enterprise risk management rather than technical system details.

↑ Back to Table of Contents

FAQ 8: What are the consequences of non-compliance?

Failure to comply with the SEC cybersecurity disclosure rules can expose companies to SEC enforcement actions, including civil penalties and investigations related to inaccurate or delayed disclosures. If a company fails to report a material cybersecurity incident under Form 8-K Item 1.05 or provides misleading information in its filings, the SEC may pursue enforcement under the Securities Exchange Act of 1934, particularly the antifraud and reporting provisions. Non-compliance can also increase litigation risk, as investors may file securities class-action lawsuits if a material cyber incident was not disclosed properly.

Beyond regulatory exposure, delayed or inaccurate cybersecurity disclosures can damage investor confidence and market credibility. Public companies are expected to maintain reliable reporting processes for incident assessment and disclosure. Dimension AI help legal and compliance teams review cybersecurity disclosures against prior SEC filings using precedent-based workflows with traceable sources, helping ensure that incident reporting remains accurate, auditable, and aligned with SEC disclosure requirements.

Takeaway: Prioritize timely and accurate filings to avoid heavy fines and the loss of investor trust.

↑ Back to Table of Contents


Article Summary

Master the SEC cybersecurity disclosure rules with our guide on requirements and deadlines. Learn about 8-K reporting and 10-K risk management standards.

Changelog

To access this endpoint, you must have an approved developer account, and have activated the new developer portal. When authenticating, you must use keys and tokens from a developer App that is located within a Project. Learn more about getting access to the API v2 endpoints in our "Getting started" page:

15 May 2023

Once you have the API v2 collection loaded in Postman

10 May 2023

The hide replies endpoint uses OAuth 1.0a user context authentication. If successful, the endpoint hides a single Reply that was published in a Tweet conversation that was initiated by an authenticated user. Each conversation supports hiding up to 725

05 May 2023

This endpoint gives you the ability to programmatically hide or unhide replies using criteria you define. Just like the functionality in the main

11 May 2023

There are several different tools and libraries that you can use to make a request to this endpoint, but we are going to use the Postman tool here to simplify the process.

Apply for the Private Beta

Sign up for a Free Trial and streamline your workflows today!