SlideShare a Scribd company logo
ALERT
 The Last Link of the Cybersecurity Chain:
 Don’t Let IT Asset Retirement Expose Your Corporation


SEC Guidance on                                                  risk, exposure to cyber incidents could adversely affect
                                                                 customer or investor confidence. As the guidance states,
Cybersecurity and                                                “federal securities laws, in part, are designed to elicit

IT Asset Retirement                                              disclosure of timely, comprehensive, and accurate
                                                                 information about risks and events that a reasonable
                                                                 investor would consider important to an investment decision.”
IT ASSET RETIREMENT:
THE REAL RISKS                                                   WHAT SHOULD BE DISCLOSED?
How IT assets are retired plays a significant role in            According to the SEC’s guidance, companies should
mitigating risk to a company’s bottom line. The U.S.             consider a discussion of cybersecurity risks within the
Securities and Exchange Commission recently published            following six required disclosure sections. This discussion
new disclosure guidance recommending that publicly               would be included in a company’s annual report.
traded companies based in the United States disclose
their cyber risk.                                                  1.  isk Factors: Given that publicly traded companies
                                                                      R
                                                                       are obligated to analyze their risks, the SEC
If an IT asset such as a laptop is stolen, or if it is lost in         recommends disclosing the probability of cyber
transit once it is marked for retirement, the exposed data             incidents, their quantitative and qualitative impact,
on the hard drive or memory constitutes a cyber incident.              and the consequences of leaking sensitive or corrupted
The data that may be recovered illegally can negatively                data. In addition, the SEC advises disclosing the
impact the company, its suppliers, and its customers.                  areas of operations with material cyber risks and
                                                                       the potential costs and consequences related to
INCREASED VIGILANCE                                                    those risks. The SEC indicates that a description of
                                                                       how a company addresses material cybersecurity
IN NEW GUIDANCE FOR
                                                                       risks for any pertinent outsourced functions may
PUBLIC COMPANIES                                                       be appropriate.
While the formal guidance from the SEC’s Division of
                                                                       Also, exposure analyses might also include an
Corporate Finance covers all aspects of cyber exposure,
                                                                       assessment of cyber risks that may remain
Intechra knows that one of the greatest risks occurs at the
                                                                       undetected for an extended period of time.
point of IT asset retirement—and that this phase of the IT
life cycle is where many public companies are least vigilant.      2.  anagement’s Discussion and Analysis of
                                                                      M
The SEC’s recommendations that companies disclose                      Financial Condition and Results of Operations:
their potential or past exposure could cause many public               Cases where cyber risks and incidents represent
firms to review and possibly rethink their processes and               a material event, trend, or uncertainty may
reporting related to the disposition of IT assets. The                 negatively impact a firm’s operations, liquidity,
SEC published this guidance based on increased focus                   or current or future financial condition or results
by publicly traded companies and legal and accounting                  should be noted, as should material increases
professionals on how cyber risks and their related                     in expenditures used to prevent the loss of
impact should be described within the framework of                     intellectual property during an attack.
corporate disclosure obligations. As with any business
3. Firm’s Description of Business: If an event or
                                                              CALL TO ACTION FOR
   events impact products (including those in
   development), services, or customer or supplier
                                                               PUBLIC COMPANIES
                                                               The SEC has revised its position, stating that cyber
   relationships, the incident or incidents and the
                                                               disclosures should now be viewed in the aggregate,
   related potential material affect should be discussed.
                                                               which means that it is even more likely that incidents
4. Legal Proceedings: If a material legal proceeding
                                                              will be come to light.
   includes a cyber incident, these facts may need to
                                                               The SEC lists many potential consequences of cyber
   be disclosed.
                                                               incidents throughout the corporate IT life cycle, from
5. Financial Statements: The SEC recommends
                                                              litigation exposure to loss of revenue to increased insurance
   considering disclosing costs associated with                scrutiny. While there are many points of potential failure
   preventing cyber incidents; providing incentives to         throughout the life cycle, the unsecured or ineffective
   customers to mitigate reputational damage resulting         retirement of IT assets remains fraught with many risks and
   from a cyber attack; and detailing current and              exposures for public firms. Whether retired corporate
   future losses directly or indirectly resulting from         technology assets are remarketed or recycled, these
   cyber incidents.                                            actions must be handled with the utmost professional
6. Controls and Procedures: The SEC recommends
                                                              diligence and recorded transparency to ensure that
   consideration of whether deficiencies in a firm’s           cyber risks are minimized and the company is protected.
   disclosure controls and procedures could result             Read Intechra’s One Sheet on the subject for a solution
   from cyber incidents.                                       that will help your company ensure that IT assets are
                                                               securely retired.




      The Price Companies Could Pay
      for Unnecessary Risks
      If computers and other IT assets are improperly retired or carelessly disposed of, many state and
      federal compliance regulations levy financial penalties.


      Fines alone are substantial and must be reported:


      Gramm-Leach-Bliley Act (Financial Institutions) . . . . . . . . . . . . . . . . . . $100,000 per violation


      Sarbanes-Oxley Act (Accounting  Governance) . . . . . . . . . . . . . . . . . . . . . . . . . . $5,000,000


      Health Insurance Portability and Accountability Act . . . . . . . . . . . . . . . . . . . . . . . $1,500,000


      Fair and Accurate Credit Transactions Act . . . . . . . . . . . . . . . . . . . . . . . . $2,500 per violation


      Fines and litigation together can run into the millions, and the damage to brand reputation also
      can cost a company. Even one improperly retired asset could lead to multiple cases of identity
      theft, a public relations crisis, or even a reported case of environmental pollution.

More Related Content

What's hot

Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
Rohan Sehgal
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
whmillerjr
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
ShareDocView.com
 
Cyber_Security_Action_Plan_2016
Cyber_Security_Action_Plan_2016Cyber_Security_Action_Plan_2016
Cyber_Security_Action_Plan_2016
John T. Araneo
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firm
David Sweigert
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
DFLABS SRL
 
Debunking Myths for Cyber-Insurance
Debunking Myths for Cyber-InsuranceDebunking Myths for Cyber-Insurance
Debunking Myths for Cyber-Insurance
Priyanka Aash
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics
Chris Stallard
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
balejandre
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Precisely
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Paige Rasid
 
Ics white paper report 2017
Ics white paper report 2017Ics white paper report 2017
Ics white paper report 2017
Ir. Indin Hasan ST, MT, IPM, ASEAN Eng
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
Christine Maligec, CRM-E, CRIS
 
Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report
Graeme Cross
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
Ethan S. Burger
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
Accenture Insurance
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
Daren Dunkel
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
DFLABS SRL
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
Colleen Beck-Domanico
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
Christopher Rieser
 

What's hot (20)

Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
 
Cyber_Security_Action_Plan_2016
Cyber_Security_Action_Plan_2016Cyber_Security_Action_Plan_2016
Cyber_Security_Action_Plan_2016
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firm
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
Debunking Myths for Cyber-Insurance
Debunking Myths for Cyber-InsuranceDebunking Myths for Cyber-Insurance
Debunking Myths for Cyber-Insurance
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Ics white paper report 2017
Ics white paper report 2017Ics white paper report 2017
Ics white paper report 2017
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
 
Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 

Viewers also liked

Sää saksa 7-9
Sää saksa 7-9Sää saksa 7-9
Sää saksa 7-9viehko
 
PROUD TO BE HINDU Pseudosecularism
PROUD TO BE HINDU PseudosecularismPROUD TO BE HINDU Pseudosecularism
PROUD TO BE HINDU Pseudosecularism
Harikesh tripathi
 
Sinko_Gabor_Successes, failures and personal hardship under the presidency of...
Sinko_Gabor_Successes, failures and personal hardship under the presidency of...Sinko_Gabor_Successes, failures and personal hardship under the presidency of...
Sinko_Gabor_Successes, failures and personal hardship under the presidency of...
Gabor Sinko
 
واجمعوا
واجمعواواجمعوا
واجمعوا
Mio Abdul Hadi
 
Task 2 hope9 d
Task 2 hope9 dTask 2 hope9 d
Task 2 hope9 d
Hope333xxx
 
March 2012
March 2012March 2012
Modelo constructivismo social
Modelo constructivismo socialModelo constructivismo social
Modelo constructivismo social
maelenaherreraperedo
 
Ch08 overview
Ch08 overviewCh08 overview
Ch08 overview
sevans-idaho
 
Memoria sistemas
Memoria sistemasMemoria sistemas
Memoria sistemas
REMERA
 
Proyecto Leonardo Miguel Romero Esteo 2010/12(1)
Proyecto Leonardo Miguel Romero Esteo 2010/12(1)Proyecto Leonardo Miguel Romero Esteo 2010/12(1)
Proyecto Leonardo Miguel Romero Esteo 2010/12(1)
educacionenmalagavalores
 
Teoríadelderecho
TeoríadelderechoTeoríadelderecho
Teoríadelderecho
JesuUs CarRera
 
2015 03-12 projektschwerpunkte-2015
2015 03-12 projektschwerpunkte-20152015 03-12 projektschwerpunkte-2015
2015 03-12 projektschwerpunkte-2015
uganda-garbeck
 
Banjo presentation Commitment Slide
Banjo presentation Commitment SlideBanjo presentation Commitment Slide
Banjo presentation Commitment Slide
fenderleo2
 
Mapa conceptual del resumen
Mapa conceptual del resumenMapa conceptual del resumen
Mapa conceptual del resumen
abraham1230
 
Portada
PortadaPortada
Portada
palacio333
 
Presentation4
Presentation4Presentation4
Introduccion a windows
Introduccion a windowsIntroduccion a windows
Introduccion a windows
lasmcetis121
 
Filosofia Política ( Introdução)
Filosofia  Política ( Introdução)Filosofia  Política ( Introdução)
Filosofia Política ( Introdução)
profpallaoro
 

Viewers also liked (20)

Sää saksa 7-9
Sää saksa 7-9Sää saksa 7-9
Sää saksa 7-9
 
PROUD TO BE HINDU Pseudosecularism
PROUD TO BE HINDU PseudosecularismPROUD TO BE HINDU Pseudosecularism
PROUD TO BE HINDU Pseudosecularism
 
Sinko_Gabor_Successes, failures and personal hardship under the presidency of...
Sinko_Gabor_Successes, failures and personal hardship under the presidency of...Sinko_Gabor_Successes, failures and personal hardship under the presidency of...
Sinko_Gabor_Successes, failures and personal hardship under the presidency of...
 
واجمعوا
واجمعواواجمعوا
واجمعوا
 
Task 2 hope9 d
Task 2 hope9 dTask 2 hope9 d
Task 2 hope9 d
 
March 2012
March 2012March 2012
March 2012
 
Modelo constructivismo social
Modelo constructivismo socialModelo constructivismo social
Modelo constructivismo social
 
Ch08 overview
Ch08 overviewCh08 overview
Ch08 overview
 
Memoria sistemas
Memoria sistemasMemoria sistemas
Memoria sistemas
 
Proyecto Leonardo Miguel Romero Esteo 2010/12(1)
Proyecto Leonardo Miguel Romero Esteo 2010/12(1)Proyecto Leonardo Miguel Romero Esteo 2010/12(1)
Proyecto Leonardo Miguel Romero Esteo 2010/12(1)
 
Master22b
Master22bMaster22b
Master22b
 
Teoríadelderecho
TeoríadelderechoTeoríadelderecho
Teoríadelderecho
 
Copertina 6 x 9 sovraccoperta createspace
Copertina 6 x 9 sovraccoperta createspaceCopertina 6 x 9 sovraccoperta createspace
Copertina 6 x 9 sovraccoperta createspace
 
2015 03-12 projektschwerpunkte-2015
2015 03-12 projektschwerpunkte-20152015 03-12 projektschwerpunkte-2015
2015 03-12 projektschwerpunkte-2015
 
Banjo presentation Commitment Slide
Banjo presentation Commitment SlideBanjo presentation Commitment Slide
Banjo presentation Commitment Slide
 
Mapa conceptual del resumen
Mapa conceptual del resumenMapa conceptual del resumen
Mapa conceptual del resumen
 
Portada
PortadaPortada
Portada
 
Presentation4
Presentation4Presentation4
Presentation4
 
Introduccion a windows
Introduccion a windowsIntroduccion a windows
Introduccion a windows
 
Filosofia Política ( Introdução)
Filosofia  Política ( Introdução)Filosofia  Política ( Introdução)
Filosofia Política ( Introdução)
 

Similar to SEC Alert

Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docx
write30
 
EY - SEC Reporting update - Spotlight on cybersecurity disclosures
EY - SEC Reporting update - Spotlight on cybersecurity disclosuresEY - SEC Reporting update - Spotlight on cybersecurity disclosures
EY - SEC Reporting update - Spotlight on cybersecurity disclosures
Julien Boucher
 
Cyber-insurance and liability caps proposed as incentives by Department of Co...
Cyber-insurance and liability caps proposed as incentives by Department of Co...Cyber-insurance and liability caps proposed as incentives by Department of Co...
Cyber-insurance and liability caps proposed as incentives by Department of Co...
David Sweigert
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
Erik Ginalick
 
EY thought leadership - SEC issues guidance on cybersecurity
EY thought leadership - SEC issues guidance on cybersecurityEY thought leadership - SEC issues guidance on cybersecurity
EY thought leadership - SEC issues guidance on cybersecurity
Julien Boucher
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015
Paul Ferrillo
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Energy Network marcus evans
 
Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014
Silvia Cardona
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
Rachel Anne Carter
 
Outsourcing
OutsourcingOutsourcing
Outsourcing
karlhennessy
 
In the news
In the newsIn the news
In the news
Rob Wilson
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
Rahul Tyagi
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
Sarah Cirelli
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Rahul Neel Mani
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update
GridCyberSec
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen Hamilton
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Sarah Nirschl
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
nsheel
 

Similar to SEC Alert (20)

Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docx
 
EY - SEC Reporting update - Spotlight on cybersecurity disclosures
EY - SEC Reporting update - Spotlight on cybersecurity disclosuresEY - SEC Reporting update - Spotlight on cybersecurity disclosures
EY - SEC Reporting update - Spotlight on cybersecurity disclosures
 
Cyber-insurance and liability caps proposed as incentives by Department of Co...
Cyber-insurance and liability caps proposed as incentives by Department of Co...Cyber-insurance and liability caps proposed as incentives by Department of Co...
Cyber-insurance and liability caps proposed as incentives by Department of Co...
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
EY thought leadership - SEC issues guidance on cybersecurity
EY thought leadership - SEC issues guidance on cybersecurityEY thought leadership - SEC issues guidance on cybersecurity
EY thought leadership - SEC issues guidance on cybersecurity
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
 
Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Outsourcing
OutsourcingOutsourcing
Outsourcing
 
In the news
In the newsIn the news
In the news
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 

SEC Alert

  • 1. ALERT The Last Link of the Cybersecurity Chain: Don’t Let IT Asset Retirement Expose Your Corporation SEC Guidance on risk, exposure to cyber incidents could adversely affect customer or investor confidence. As the guidance states, Cybersecurity and “federal securities laws, in part, are designed to elicit IT Asset Retirement disclosure of timely, comprehensive, and accurate information about risks and events that a reasonable investor would consider important to an investment decision.” IT ASSET RETIREMENT: THE REAL RISKS WHAT SHOULD BE DISCLOSED? How IT assets are retired plays a significant role in According to the SEC’s guidance, companies should mitigating risk to a company’s bottom line. The U.S. consider a discussion of cybersecurity risks within the Securities and Exchange Commission recently published following six required disclosure sections. This discussion new disclosure guidance recommending that publicly would be included in a company’s annual report. traded companies based in the United States disclose their cyber risk. 1. isk Factors: Given that publicly traded companies R are obligated to analyze their risks, the SEC If an IT asset such as a laptop is stolen, or if it is lost in recommends disclosing the probability of cyber transit once it is marked for retirement, the exposed data incidents, their quantitative and qualitative impact, on the hard drive or memory constitutes a cyber incident. and the consequences of leaking sensitive or corrupted The data that may be recovered illegally can negatively data. In addition, the SEC advises disclosing the impact the company, its suppliers, and its customers. areas of operations with material cyber risks and the potential costs and consequences related to INCREASED VIGILANCE those risks. The SEC indicates that a description of how a company addresses material cybersecurity IN NEW GUIDANCE FOR risks for any pertinent outsourced functions may PUBLIC COMPANIES be appropriate. While the formal guidance from the SEC’s Division of Also, exposure analyses might also include an Corporate Finance covers all aspects of cyber exposure, assessment of cyber risks that may remain Intechra knows that one of the greatest risks occurs at the undetected for an extended period of time. point of IT asset retirement—and that this phase of the IT life cycle is where many public companies are least vigilant. 2. anagement’s Discussion and Analysis of M The SEC’s recommendations that companies disclose Financial Condition and Results of Operations: their potential or past exposure could cause many public Cases where cyber risks and incidents represent firms to review and possibly rethink their processes and a material event, trend, or uncertainty may reporting related to the disposition of IT assets. The negatively impact a firm’s operations, liquidity, SEC published this guidance based on increased focus or current or future financial condition or results by publicly traded companies and legal and accounting should be noted, as should material increases professionals on how cyber risks and their related in expenditures used to prevent the loss of impact should be described within the framework of intellectual property during an attack. corporate disclosure obligations. As with any business
  • 2. 3. Firm’s Description of Business: If an event or CALL TO ACTION FOR events impact products (including those in development), services, or customer or supplier PUBLIC COMPANIES The SEC has revised its position, stating that cyber relationships, the incident or incidents and the disclosures should now be viewed in the aggregate, related potential material affect should be discussed. which means that it is even more likely that incidents 4. Legal Proceedings: If a material legal proceeding will be come to light. includes a cyber incident, these facts may need to The SEC lists many potential consequences of cyber be disclosed. incidents throughout the corporate IT life cycle, from 5. Financial Statements: The SEC recommends litigation exposure to loss of revenue to increased insurance considering disclosing costs associated with scrutiny. While there are many points of potential failure preventing cyber incidents; providing incentives to throughout the life cycle, the unsecured or ineffective customers to mitigate reputational damage resulting retirement of IT assets remains fraught with many risks and from a cyber attack; and detailing current and exposures for public firms. Whether retired corporate future losses directly or indirectly resulting from technology assets are remarketed or recycled, these cyber incidents. actions must be handled with the utmost professional 6. Controls and Procedures: The SEC recommends diligence and recorded transparency to ensure that consideration of whether deficiencies in a firm’s cyber risks are minimized and the company is protected. disclosure controls and procedures could result Read Intechra’s One Sheet on the subject for a solution from cyber incidents. that will help your company ensure that IT assets are securely retired. The Price Companies Could Pay for Unnecessary Risks If computers and other IT assets are improperly retired or carelessly disposed of, many state and federal compliance regulations levy financial penalties. Fines alone are substantial and must be reported: Gramm-Leach-Bliley Act (Financial Institutions) . . . . . . . . . . . . . . . . . . $100,000 per violation Sarbanes-Oxley Act (Accounting Governance) . . . . . . . . . . . . . . . . . . . . . . . . . . $5,000,000 Health Insurance Portability and Accountability Act . . . . . . . . . . . . . . . . . . . . . . . $1,500,000 Fair and Accurate Credit Transactions Act . . . . . . . . . . . . . . . . . . . . . . . . $2,500 per violation Fines and litigation together can run into the millions, and the damage to brand reputation also can cost a company. Even one improperly retired asset could lead to multiple cases of identity theft, a public relations crisis, or even a reported case of environmental pollution.