More Confusion on Cybersecurity 8-K Disclosures

We’ve long covered the SEC’s regulation requiring public companies to disclose serious cybersecurity incidents in an 8-K filing. See several updates and the text of the cyber disclosure regulation here. A common theme since the rules were released in 2023 has been confusion about when cybersecurity 8-Ks must be filed. The rules seem straightforward on paper, but real-world applications are revealing significant confusion, as highlighted in a recent LinkedIn discussion sparked by cybersecurity expert Michael McLaughlin.

Cyber 8-K Required for “Material Incident,” But What’s That?

The SEC introduced an “Item 1.05” form of 8-Ks for disclosing significant cyber events within four business days of a company determining it has suffered a material cyber event. But the threshold for “materiality” remains subjective, often hinging on factors such as financial impact, operational disruption, or reputational harm. As McLaughlin notes, if a company hasn’t yet determined a breach was material, but wants to make a voluntary disclosure anyway, it should use a different type of 8-K, such as an “Item 8.01” (“8.01s” are a catch-all for “other events” not covered by other disclosure filings.)

graphic of SEC cybersecurity 8-k disclosures

In his post, McLaughlin, co-leader of cybersecurity and data privacy at law firm Buchanan Ingersoll & Rooney PC, singled out one public company for what he described as an improper use of Form 8-K Item 1.05 in a filing earlier this month. The company, a provider of data and security solutions, noted in the filing that it had been hit with a ransomware attack, but: “(T)he Incident does not appear to have had a material impact on the Company’s business operations; however, the full scope and impact of this Incident is not yet known and could result in a future determination that the incident either was not or has been material to the Company’s financial statements and results of operations.”

See also  CRISIL and Maxxsure Partner to Enhance Cyber Risk Management with Integrated Cyber Insurance Solutions

In other words, the company filed a report of a “material” cyber incident when it did not yet know whether the attack was material. Adding confusion to the situation, the company went on to state: “The expected costs related to the Incident, including fees for our cybersecurity experts and other advisors, and costs to restore any impacted systems, are reasonably likely to have a material impact on the Company’s results of operations and financial condition (boldface ours.)

This is just the most recent example of “8-K confusion;” previous reports from law firms have identified many others.

Get The Cyber Insurance News Upload Delivered
Every Sunday
Subscribe to our newsletter!

Why Does the Type of 8-K Matter?

Aside from raising questions about corporate governance and potentially causing stock volatility (for example, if investors initially believe the breach was more serious than it was), filing premature cyber 8-Ks could impact the perception of a firm’s risk by cyber insurers, as well as providing fodder for litigators who often jump on disclosures to launch lawsuits for affected customers.

×