Data Security Platform Recognized as Leader for AI-Powered Capabilities,Coverage, and Automated Remediation. Read More.

What is DSPM?


Gartner® Innovation Insight: Data Security Posture Management
Get Report
The Normalyze Platform
Supported Environments
Platform Benefits

Reduce Data Access Risks

Enforce Data Governance
Eliminate Abandoned Data

Secure PaaS Data

Enable Use of AI

DSPM for Snowflake




DSPM-chat-Richard Stiennon-Ravi-Ithal-Normalyze
DSPM for Dummies:

Your guide to Data Security Posture Management

Get Your Copy


CYBER 60: The fastest-growing startups in cybersecurity
Get Report

SEC Cybersecurity Disclosure Rules

Final Rule on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies

The new SEC Final Rule requires public companies to disclose security posture annually and cyber incidents within four days after determining an incident was material.


Why This New SEC Cybersecurity Rule?

The new SEC Final Rule increases transparency for cybersecurity readiness and response by public companies.

Cybersecurity threats and attack surfaces continue to grow as more data moves to the cloud. It’s important for companies to maintain clear and consistent processes and policies to protect their data and the systems, applications, and networks that contain it.

Cybersecurity posture and material breaches impact the safety of shareholders’ investments in affected public companies, just like any other material changes or weaknesses that must be disclosed under existing SEC mandates.

In the words of the SEC…

“In our disclosure-based regime, investors have a right to financial statements prepared in accordance with Generally Accepted Accounting Principles (GAAP).”
Assessing Materiality, March 2022

The new final rule extends this right to cybersecurity posture and material cybersecurity incidents.

When is the SEC Cybersecurity Rule Effective?
The rule was approved on July 26, 2023 and is effective as of December 18, 2023. Smaller reporting companies must comply as of June 15, 2024.

What the New SEC Cybersecurity Disclosure Rule Means for Public Companies and How Normalyze Helps

Requirement 1: Annual Disclosure

Annually disclose material information describing a public company’s cybersecurity risk management, strategy and governance.

Get continuous visibility and control of security posture.

Communicate and report on security posture clearly and transparently.

  • Communicate posture improvement to executives and board members in terms of the cost of a potential breach.
  • Report data security posture based on up-to-date status.

Requirement 2: Material Incident Disclosure

Disclose within four business days on SEC Form 8-K “any cybersecurity incident they determine to be material and to describe the material aspects of the incident’s nature, scope and timing, as well as its material impact or reasonably likely material impact on the registrant.”

Assess the financial impact of breaches and potential loss.

  • The monetary value of data effectively communicates breach impact to executives and board members. Use calculations based on real-world data or customize to the specifics of your environment.

Monitor data for faster response and to limit the damage of breaches.

Incident Disclosure Timing

When does the four-day clock start ticking?

Assume a company discovers and confirms a cyber incident occurred on August 7. This does not mean disclosure must automatically occur four business days later. First, there’s an exception for cases of national security or public safety, as determined by the US Attorney General. In other cases, the trigger point is a company’s determination that the incident was material. The SEC defines material as if “there is a substantial likelihood that a reasonable shareholder would consider it important.” So, if materiality was determined two weeks after the discovery, on August 21, that’s when the four-day clock starts ticking.

In this scenario, the disclosure must occur within four business days, by August 25.


Discover, visualize, fix

Get a full picture of your sensitive data landscape and discuss your use case live with a security engineer.