An Introduction to the SEC Cyber Security Disclosure Rules

In today’s threat landscape, the protection of sensitive data and the transparency of cyber security practices are paramount. To address these vital concerns, the US SEC (Securities and Exchange Commission) has introduced a set of robust cyber security disclosure rules.

These rules are designed to ensure that publicly listed organisations not only safeguard their digital assets but also communicate their cyber security risk management efforts transparently.

Cyber security expert William Gamble, from IT Governance USA, will demystify the complexities of these SEC rules, explaining why they exist and how they impact your organisation.

Why download?

You will:

  • Get a foundational understanding of SEC cyber security disclosure rules;
  • Determine if your organisation is within the SEC’s jurisdiction; and
  • Understand the current legal framework and potential challenges.

Delivered by:

William Gamble
Cyber Security Consultant, IT Governance USA

With a distinguished career spanning more than two decades, William Gamble has established himself as an accomplished specialist in cyber security and legal compliance. His extensive expertise lies in navigating complex global regulatory environments, effectively optimizing collaboration across disciplines.

William is dedicated to enhancing the effectiveness of logical, management, legal, and physical controls, ensuring comprehensive protection for corporate assets against cyber threats, legal challenges, and government regulations. His invaluable insights and proactive approach transcend borders, offering invaluable guidance to organisations both in the US and abroad.

Webinar agenda

From this webinar download, you will learn:

  • Get an overview of the SEC’s proposed rules and their significance;
  • Determine if your organisation falls under the SEC’s jurisdiction;
  • Understand the compliance requirements for listed companies;
  • Get an in-depth examination of current laws, including:
    • Disclosure requirements and materiality;
    • 10 B 5 implications; and
    • Previous cyber incidents, hacks and vulnerabilities.
  • Identify and address compliance challenges emerging from compliance issues.