News

Republican lawmakers oppose SEC cybersecurity rules

A group of Republican lawmakers sent a letter this week to Securities and Exchange Commission (SEC) Chair Gary Gensler criticizing the agency’s new cybersecurity rules for public companies.

The rule, which took effect Sept. 5, requires publicly traded companies to notify the SEC of a cyberattack within four days of the incident. It also, among other provisions, requires periodic disclosure of a company’s policies and procedures to manage cybersecurity risk.

The letter — authored by U.S. Reps. Mark Green (R-TN), chair of the House Committee on Homeland Security; Andrew Garbarino (R-NY), chair of the House Subcommittee on Cybersecurity and Infrastructure Protection; and Zach Nunn (R-IA) – said the rules are duplicative and will create additional bureaucracy for public companies.

They also contend that the rules will risk compromising their confidentiality and run contrary to the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA).

“We write expressing serious concerns over the Securities and Exchange Commission’s (SEC) new Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure final rules. While the SEC’s intent may be to standardize disclosures regarding cybersecurity governance and incident reporting by public companies, these new expansive disclosure requirements for public companies will do just the opposite by duplicating and confusing existing cyber incident reporting requirements. Further, the new rules compromise the confidentiality of a company’s cybersecurity program, thus harming investors instead of protecting them as the rules purport to do,” the lawmakers wrote to the SEC chair.

The lawmakers urge the SEC to work with the Department of Homeland Security (DHS) Cyber Incident Reporting Council on the rule. They also request an analysis by the SEC of how these rules will interact with CIRCIA, affect other federal cyber incident reporting requirements, and impact the SEC’s additional disclosure proposals.

“Given the potentially harmful consequences of the final rule, we urge the SEC to delay the rule until the SEC works with the Council to determine how the rule interacts with CIRCIA and other Federal prudential regulators’ cybersecurity incident reporting requirements. Furthermore, we call on the SEC to conduct a complete internal analysis of how this rule will interact with the SEC’s other cybersecurity disclosure proposals before this final rule goes into effect. Failing to do so will only jeopardize companies’ confidential reporting strategies and publicly divulge vulnerabilities to our Nation’s critical infrastructure,” they added.

Dave Kovaleski

Recent Posts

Bipartisan effort calls for details on foreign attempts to infiltrate U.S. military bases

A group of seven U.S. representatives recently wrote to Defense Secretary Lloyd Austin in a…

5 hours ago

House bill calls for AI task force within Cybersecurity and Infrastructure Security Agency

As more governments and businesses seek what artificial intelligence (AI) can offer, U.S. Reps. Troy…

5 hours ago

Senators push to preserve procurement levels for attack submarines

A group of 14 U.S. senators recently called on the U.S. Senate Appropriations Subcommittee on…

1 day ago

House advances appropriations for Coast Guard operations through 2026

In approving the Coast Guard Authorization Act of 2024 (H.R. 7659), the House recently authorized…

1 day ago

Commerce Department blacklists 37 Chinese entities over quantum, spying concerns

The U.S. Commerce Department recently added 37 Chinese entities to the Export Administration Regulations (EAR)…

2 days ago

U.S. Sens. Peters and Britt propose modern, better-suited body armor for DHS personnel

In introducing the DHS Better Ballistic Body Armor Act (S. 4305) this month, U.S. Sens.…

2 days ago

This website uses cookies.