Risk Insights
September 15, 2025

The Uncertain Future of the SEC's Cybersecurity Rules

Key Points

  • Over a year after the U.S. Securities and Exchange Commission (SEC) unveiled new cybersecurity rules, public companies are increasingly claiming that the regulations are both too ambiguous and too onerous.
  • Growing grievances occur against the backdrop of a newly appointed SEC head, Paul Atkins, who is expected to pursue a range of deregulation initiatives during his tenure.
  • Revisions to or reductions in oversight and enforcement of the rules may offer some reprieve for public companies that currently face a range of punitive actions for noncompliance, it may also lead some entities to invest less in cybersecurity, exacerbating threats.

Background

In December 2023, the U.S. Securities and Exchange Commission (SEC) began implementing new cybersecurity disclosure rules, which effectively introduced new reporting requirements for publicly traded companies. The rule, formally known as the "Cybersecurity Risk Management, Strategy, Governance and Incident Disclosure by Public Companies," began requiring companies to submit additional information related to cybersecurity preparedness.

In particular, the new rules began requiring publicly-traded companies to begin adding additional information to two pre-existing SEC disclosure forms: the annual 10-K form and the 8-K periodic disclosure form. Under the new rules, companies are mandated to include annual descriptions of their internal corporate cyber governance and risk management policies in the 10-K form, including how the board of directors plays an oversight role in cybersecurity. Companies also must now be prepared to submit periodic 8-K forms – previously reserved for large-scale moves like a change in company leadership, a merger or acquisition or other kinds of major reorganization – to publicly disclose when a major "material" cyber incident occurs that could impact shareholders or customers within four days. Companies were encouraged to interpret materiality broadly and consider variables such as whether the incident jeopardized the confidentiality, integrity, or availability of internal systems and data.

While some data privacy advocates welcomed the SEC's more aggressive approach to cybersecurity requirements, many companies expressed significant apprehension around the ambiguity of some of the new rules' stipulations, including the concept of materiality and the short 96-hour reporting period for material cyber incidents. Some cybersecurity experts also expressed concerns that providing explicit information on a company's cyber defense measures could inform potential bad actors on specifically how they can discover and breach vulnerabilities.

SEC-Cybersecutiry-Compliance-Rules-07082025.ai-.png

Impact

In the most recent example of company pushback around the SEC's cybersecurity rules, several prominent members of the U.S. banking industry – including the American Bankers Association and the Securities Industry and Financial Markets Association – published a petition on May 22, asking the Commission to rescind the rule. The petition argues that the rules add more requirements to "an already complex list of reporting and disclosure obligations that financial institutions and other critical infrastructure sector companies must follow." The petition also claims that the rules introduce confusing compliance requirements for both companies and their investors, creating the risk for companies to disclose information even while incidents are ongoing or expose critical information that financially motivated cybercriminals like ransomware groups can exploit.

Currently, the SEC has not indicated that it is imminently planning to rescind the current cybersecurity rules for publicly traded companies. That being said, the Commission's new Chairman, Paul Atkins, appointed by then president-elect Donald Trump in December 2024, is known for supporting a hands-off approach and had promised to pursue a range of deregulatory initiatives. While rescinding the rule entirely would be more challenging, as it would require Atkins to propose new rules in its place in a time-consuming process, he may look to undercut the rule's enforcement and/or scope. In an example of how Atkins' supports less regulation on cybersecurity, the SEC scrapped proposed cybersecurity rules for investment advisers and companies participating in securities markets on June 16 that the previous outgoing administration had drafted.

If the SEC does lessen its enforcement of its cybersecurity rules, companies will face fewer noncompliance risks that could result from incomplete disclosure, including financial penalties and audits or investigations. On the other hand, however, some companies may subsequently invest fewer resources or oversight into internal cybersecurity activities, elevating the risk for some entities to be more vulnerable to malicious intrusion. Weaker enforcement could also lead to less clarity between companies, shareholders or customers around cyber incidents that could imperil the organization's internal data and financial assets.

How Companies Can Prepare

  • Publicly traded companies should monitor any announcements from the SEC or the outcome of ongoing litigation linked to the rules to evaluate how compliance expectations could affect their organization.
  • Even in the case that the cybersecurity rules are amended, organizations should carefully consider their general risk environment and invest in defenses that adequately address potential threats like corporate espionage, financial theft and reputational harm.
  • These best practices can range from implementing principles like zero-trust and least privilege, as well as mandating dual-factor authentication and periodic cybersecurity training for employees.
  • Companies should also ensure they are remaining compliant with the rules as they currently stand and organize an internal plan to communicate with the SEC and stay abreast of any requests for information or potential reviews related to a cybersecurity incident.