In 2023, the Securities and Exchange Commission (SEC) significantly tightened its cybersecurity regulations for publicly traded companies. This move, aimed at enhancing investor protection and ensuring market transparency, responds to the increasing prevalence of cyber threats and their potential to disrupt business operations and financial stability.
New Rules for Incident Disclosure
The SEC's updated regulations require companies to disclose cybersecurity incidents within four days of determining their material impact. Companies must swiftly evaluate the scope and severity of any cyberattack, including the nature and amount of data compromised and the potential business, legal, or regulatory impacts. The goal is to provide timely and accurate information about incidents that could affect a company's financial health or market performance.
Case Studies: Clorox, Prudential Financial, and UnitedHealth
Recent cyber incidents involving Clorox, Prudential Financial, and UnitedHealth offer insights into how companies handle these new requirements.
Clorox: In August 2023, Clorox faced a major cyberattack that disrupted its automated order processing system, leading to significant delays and product shortages. This disruption is expected to cost the company between $57 million and $65 million in fiscal year 2024, largely for IT recovery and professional services. Additionally, Clorox’s Chief Information Security Officer (CISO) left the company following the attack, which revealed long-standing security issues that had previously been flagged in audits.
Prudential Financial: In February 2024, Prudential Financial reported a cyber breach involving unauthorised access to its infrastructure, affecting administrative and user data. The breach, linked to the ALPHV ransomware group, compromised the personal information of 36,545 individuals. Prudential took a proactive approach by disclosing the incident to the SEC before determining its material impact, indicating a possible new trend toward early transparency.
UnitedHealth: UnitedHealth’s subsidiary, Change Healthcare, experienced a significant cyberattack that compromised millions of patient records and disrupted prescription and claims processing. Initially attributing the attack to a nation-state, UnitedHealth focused on restoring operations without immediately assessing its materiality. The incident has led to substantial financial repercussions, including at least 24 lawsuits and potential costs up to $1.6 billion. Following the disclosure, UnitedHealth’s stock price dropped by nearly 15%.
Key Takeaways for Risk Management
These examples highlight several important lessons for companies under the new SEC regulations:
1. Visibility and Accountability: Companies must continuously oversee their digital assets and promptly address security vulnerabilities. Ignorance is no longer a viable defence, and businesses must be able to explain the details of any breaches.
2. Transparency and Proactive Measures: Transparency is crucial. Companies should adopt conservative and proactive cybersecurity policies and be prepared to update disclosures with more detailed information as it becomes available.
3. Information Sharing: Sharing information about cyber breaches and effective security strategies benefits all sectors. This collaborative approach enhances overall security practices and accelerates the adoption of best practices across the industry.
The SEC’s new cybersecurity regulations shift towards more stringent oversight, pushing the growing need for robust cybersecurity measures to protect market stability and investor interests. As companies adjust to these requirements, the experiences of Clorox, Prudential Financial, and UnitedHealth provide valuable lessons in effective risk management and transparency.
The company noted that because of the cyberattack, the products are now facing a shortage in their supply. This is consequently making it difficult for the company in keeping up with consumer demand.
Clorox has not yet confirmed as of what products are impacted in the disruption.
In the aforementioned filing, the company stated that they have detected a suspicious ‘unauthorized’ activity in some of its information technology systems. They further stated that following the revelation, Clorox swiftly took actions in order to stop the attack, such as minimizing their operations for the time being. However, the company now believes that the attack is still on.
The business said that it manually fills and processes orders. The process of restoring to regular business operations won't start, according to the corporation, until next week.
In a statement published by Clorox, the company says, "Clorox has already resumed production at the vast majority of its manufacturing sites and expects the ramp up to full production to occur over time.”
“At this time, the company cannot estimate how long it will take to resume fully normalized operations," it added.
Adding to this, the company notes that due to the cyber activity and delay in its operation, they may compromise their current-quarter financial amount materially. However, Clorox also notes that any longer term impact would in fact be premature, “given the ongoing recovery.”
In its early trading, Clorox shares had already fallen about 2%. The American global manufacturer and marketers are popular for their professional products and household staples such as bleach, detergents and cleaners.
A similar case of cyberattack was recently observed, in which operation of popular resort and casino giant MGM Resorts were disrupted. The cyberattack disrupted a significant portion of its operations, preventing customers from making room charges or using their digital keys to enter their rooms.