{"id":3934,"date":"2023-01-10T14:10:06","date_gmt":"2023-01-10T14:10:06","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3934"},"modified":"2023-02-10T15:27:13","modified_gmt":"2023-02-10T15:27:13","slug":"is-your-company-ready-for-the-proposed-sec-cybersecurity-rules","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/","title":{"rendered":"Is Your Company Ready for the Proposed SEC Cybersecurity Rules?"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><em>A revised set of proposed SEC guidelines for public company cybersecurity disclosure was released in 2022. Public businesses\u2019 cybersecurity-related business activities, decision-making processes, and the Board\u2019s new role in oversight would all be subject to heightened SEC scrutiny under the proposed regulations.<\/em><\/p>\n<p>Boards are becoming more aware of the importance of participating in cybersecurity monitoring. Not only are the repercussions concerning, but <a href=\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/nist-proposes-new-cybersecurity-framework-for-liquid-natural-gas\/\">new regulations<\/a> are raising the stakes and altering the game. As part of their fiduciary and supervisory responsibilities, boards ensure effective cyber risk management. As cyber threats grow and firms worldwide expand their cybersecurity budgets, the regulatory community, including the SEC, proposes new standards that businesses must be aware of as they strengthen their cybersecurity strategy.<\/p>\n<p>In March 2022, the SEC issued a proposed regulation titled <a href=\"https:\/\/www.sec.gov\/rules\/proposed\/2022\/33-11038.pdf\" target=\"_blank\" rel=\"noopener\">Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure<\/a>. The proposed rules would boost SEC scrutiny of public businesses\u2019 cybersecurity-related activities, decision-making processes, and the Board\u2019s expanded role in cybersecurity oversight.<\/p>\n<p>These proposed rules demonstrate the SEC\u2019s growing emphasis on cybersecurity, going further than any other federal agency in imposing requirements on public businesses and their boards of directors. One of the most important new requirements requires the Board of Directors of public companies to oversee and participate in the evaluation, assessment, and implementation of cybersecurity policies and procedures. The proposed standards also establish more stringent and consistent guidelines for organizations to follow when disclosing and supplementing \u201cmaterial\u201d cybersecurity events.<\/p>\n<p>Hundreds of comments were filed during the consultation period for these rules, which <a href=\"https:\/\/www.jdsupra.com\/legalnews\/sec-proposed-cybersecurity-rules-what-2345066\/\" target=\"_blank\" rel=\"noopener\">ended on May 9, 2022<\/a>. While it has yet to be discovered when the rules will be completed or effective, corporations and their boards should begin preparing now, given the considerable changes anticipated to be included.<\/p>\n<h2>What are the critical requirements of the SEC rules?<\/h2>\n<p>The following are the primary requirements if the SEC adopts the rules in their proposed form:<\/p>\n<ul>\n<li>Notify the SEC of any \u201cmaterial cybersecurity incidents\u201d within four days, as well as any previously classified \u201cnon-material\u201d incidents that, when added to others, become \u201cmaterial\u201d in the aggregate.<\/li>\n<li>Updates on previous events should be included in regular SEC filings, and the corporation should explain its cybersecurity risk management system and the Board\u2019s role in regulating this issue.<\/li>\n<\/ul>\n<p>\u201cOver the years, our disclosure regime has evolved to reflect evolving risks and investor needs,\u201d <a href=\"https:\/\/www.sec.gov\/news\/press-release\/2022-39\" target=\"_blank\" rel=\"noopener\">said SEC Chair Gary Gensler<\/a>. \u201cToday, cybersecurity is an emerging risk with which public issuers increasingly must contend. Investors want to know more about how issuers are managing those growing risks. A lot of issuers already provide cybersecurity disclosure to investors. I think companies and investors alike would benefit if this information were required in a consistent, comparable, and decision-useful manner. I am pleased to support this proposal because, if adopted, it would strengthen investors\u2019 ability to evaluate public companies\u2019 cybersecurity practices and incident reporting.\u201d<\/p>\n<h2>What do the new SEC rules mean for businesses?<\/h2>\n<p>Board members must improve their cybersecurity portfolio to give effective oversight and comply with the regulatory environment. It is no longer enough to hear about new security measures or the findings of the latest phishing exercise.<\/p>\n<p>Board members must assume that cyber-attacks are possible and use their oversight responsibility to ensure security managers have established enough measures to respond and recover. Let\u2019s assume that every organization is at risk of being breached and that it is impossible to be completely protected from every attack. The most logical approach is to ensure that the <a href=\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/cisas-north-star-secure-and-resilient-infrastructure\/\" target=\"_blank\" rel=\"noopener\">organization can recover with little or no damage to operations<\/a>, the financial bottom line, or the organization\u2019s reputation.<\/p>\n<p>In light of the above discussion, the new regulations will require companies to establish and maintain reasonable cybersecurity practices, disclose those practices in public documents, clarify how their senior leadership effectively oversees those programs, and report cybersecurity incidents in a way that provides appropriate information to shareholders.<\/p>\n<p>While the new standards are more specific and possibly burdensome than previous requirements, they will clarify and reinforce previous guidance and the outcomes of prior SEC enforcement. Finally, the new regulations will specify incident reports\u2019 content, time, structure, and periodic disclosures. The new guidelines also compel corporations to document their cybersecurity and risk management plans.<\/p>\n<h2>What should companies do to prepare?<\/h2>\n<p>Follow these steps to ensure that your Board provides adequate oversight of cybersecurity programs and satisfies the new SEC requirements.<\/p>\n<p><strong>Review cybersecurity and risk management documentation. <\/strong><\/p>\n<p>Since upgrading cybersecurity and risk management systems can be lengthy, companies should begin examining and updating these programs immediately. Changes in the IT\/OT infrastructure, mergers and acquisitions, the evolving threat landscape, and recent security events should all be monitored closely by businesses.<\/p>\n<p><strong>Educate your Board of Directors. <\/strong><\/p>\n<p>With all the new monitoring duties imposed on the Board, it must ensure that it is equipped to oversee the company\u2019s cybersecurity and risk management policies and processes. However, few Boards have historically been given adequate information to undertake this role. Find out if the whole Board or a smaller committee will supervise and ensure they know what they\u2019re in for.<\/p>\n<p><strong>Review your incident response plans. <\/strong><\/p>\n<p>We advise all businesses to assess their incident response plans in light of the new regulations. The members of your incident response team must be familiar with the necessary reporting protocols in order to know when and how to escalate a situation. The incident response plan should outline a clear escalation strategy for bringing up serious or material issues with top management and the Board. The Board needs to be briefed on the incident response plan before participating in a tabletop exercise meant to replicate a real-life crisis.<\/p>\n<p><strong>Determine what \u201cmaterial\u201d means to your organization. <\/strong><\/p>\n<p>The company\u2019s legal department and, if necessary, senior leadership should make the call on whether a cyber incident meets the threshold for \u201cmateriality,\u201d requiring reporting within four days. The company must ensure that the legal team and senior management, who will make \u201cmaterial\u201d decisions, are reachable through the appropriate channels in the incident response plan and the operating environment.<\/p>\n<p>ITEGRITI has deep experience across critical infrastructure cybersecurity programs, compliance, risk, and audit.\u00a0 Contact us today to learn how we can leverage this experience to help you accomplish your cybersecurity goals.<\/p>\n<p>Contact Us <a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">https:\/\/itegriti.com\/kw022024\/contact\/<\/a><\/p>\n<p>ITEGRITI Services <a href=\"https:\/\/itegriti.com\/kw022024\">https:\/\/itegriti.com\/kw022024<\/a><\/p>\n<p>Never miss an insight. Click here to follow ITEGRITI on LinkedIn, and our insights will appear in your LinkedIn feed upon publication.<\/p>\n<\/div><script src=https:\/\/platform.linkedin.com\/in.js type=\"text\/javascript\"> lang: en_US<\/script>\n<script type=\"IN\/FollowCompany\" data-id=\"10831622\" data-counter=\"bottom\"><\/script>\n<\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":3935,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179],"tags":[2188,2192],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is Your Company Ready for the Proposed SEC Cybersecurity Rules?<\/title>\n<meta name=\"description\" content=\"A revised set of proposed SEC guidelines for public company cybersecurity disclosure was released in 2022. Public businesses\u2019 cybersecurity-related business activities, decision-making processes, and the Board\u2019s new role in oversight would all be subject to heightened SEC scrutiny under the proposed regulations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Your Company Ready for the Proposed SEC Cybersecurity Rules?\" \/>\n<meta property=\"og:description\" content=\"A revised set of proposed SEC guidelines for public company cybersecurity disclosure was released in 2022. Public businesses\u2019 cybersecurity-related business activities, decision-making processes, and the Board\u2019s new role in oversight would all be subject to heightened SEC scrutiny under the proposed regulations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-10T14:10:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-10T15:27:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/01\/Itegriti-131.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"Is Your Company Ready for the Proposed SEC Cybersecurity Rules?\",\"datePublished\":\"2023-01-10T14:10:06+00:00\",\"dateModified\":\"2023-02-10T15:27:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/\"},\"wordCount\":1866,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/01\/Itegriti-131.png\",\"keywords\":[\"Cybersecurity\",\"Finance Sector\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/\",\"name\":\"Is Your Company Ready for the Proposed SEC Cybersecurity Rules?\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/01\/Itegriti-131.png\",\"datePublished\":\"2023-01-10T14:10:06+00:00\",\"dateModified\":\"2023-02-10T15:27:13+00:00\",\"description\":\"A revised set of proposed SEC guidelines for public company cybersecurity disclosure was released in 2022. Public businesses\u2019 cybersecurity-related business activities, decision-making processes, and the Board\u2019s new role in oversight would all be subject to heightened SEC scrutiny under the proposed regulations.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/01\/Itegriti-131.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/01\/Itegriti-131.png\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Your Company Ready for the Proposed SEC Cybersecurity Rules?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Is Your Company Ready for the Proposed SEC Cybersecurity Rules?","description":"A revised set of proposed SEC guidelines for public company cybersecurity disclosure was released in 2022. Public businesses\u2019 cybersecurity-related business activities, decision-making processes, and the Board\u2019s new role in oversight would all be subject to heightened SEC scrutiny under the proposed regulations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/","og_locale":"en_US","og_type":"article","og_title":"Is Your Company Ready for the Proposed SEC Cybersecurity Rules?","og_description":"A revised set of proposed SEC guidelines for public company cybersecurity disclosure was released in 2022. Public businesses\u2019 cybersecurity-related business activities, decision-making processes, and the Board\u2019s new role in oversight would all be subject to heightened SEC scrutiny under the proposed regulations.","og_url":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2023-01-10T14:10:06+00:00","article_modified_time":"2023-02-10T15:27:13+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/01\/Itegriti-131.png","type":"image\/png"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"Is Your Company Ready for the Proposed SEC Cybersecurity Rules?","datePublished":"2023-01-10T14:10:06+00:00","dateModified":"2023-02-10T15:27:13+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/"},"wordCount":1866,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/01\/Itegriti-131.png","keywords":["Cybersecurity","Finance Sector"],"articleSection":["Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/","url":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/","name":"Is Your Company Ready for the Proposed SEC Cybersecurity Rules?","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/01\/Itegriti-131.png","datePublished":"2023-01-10T14:10:06+00:00","dateModified":"2023-02-10T15:27:13+00:00","description":"A revised set of proposed SEC guidelines for public company cybersecurity disclosure was released in 2022. Public businesses\u2019 cybersecurity-related business activities, decision-making processes, and the Board\u2019s new role in oversight would all be subject to heightened SEC scrutiny under the proposed regulations.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/01\/Itegriti-131.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/01\/Itegriti-131.png","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/is-your-company-ready-for-the-proposed-sec-cybersecurity-rules\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Is Your Company Ready for the Proposed SEC Cybersecurity Rules?"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3934"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3934"}],"version-history":[{"count":6,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3934\/revisions"}],"predecessor-version":[{"id":3966,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3934\/revisions\/3966"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3935"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}