Risk Frameworks and Security Control Standards in 10-K Cybersecurity disclosures between 2023-12-15 and 2024-06-30

Andrew Hoog

Abstract

Keywords: Cybersecurity disclosures, 10-K, Risk Frameworks, Security Control Standards.

1. Introduction

The recent cybersecurity disclosure rules from the SEC not only provide investors with material information on how companies manage security risk but also valuable data that can be used to glean best practices in cybersecurity risk management or even gaps in cybersecurity strategy.

Many practitioners conflate Risk Frameworks with Security Control Standards. This insight report will provide data on what risk frameworks and security control standards are mentioned and at what frequency.

The analysis below is a snapshot of data from 10-Ks disclosed between 2023-12-15 and 2024-06-30. You can see the full list of the 10-Ks in the 10-K Cybersecurity Tracker.

2. Methodology and Data

2.1 Data

2.1.1 SEC EDGAR

The U.S. Security and Exchange Commission’s Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system provides a public interface 1 to retrieve companies SEC filings, including their annual 10-K report.

2.2 Methodology

2.2.1 Retrieval

An hourly process is run which parses the EDGAR RSS feed and determines if any new 10-K filing were disclosed. If so, the 10-K filing is downloaded locally and processed.

2.2.2 Identifying and extracting Item 1C Cybersecurity text

The 10-K filing is the processed to determine of an Item 1C Cybersecurity section exits. If found, the text from that section is then extracted from the 10-K. During this process, formatting is lost and we attempt to replace non-ASCII characters with their ASCII equivalent (e.g. replacing \u2009 thin space with an ASCII space 0x20). Extraneous spaces are also removed.

The extraction algorithm have been improved so that over less than 5% (4.57%) of 10-Ks with an Item 1C Cybersecurity are excluded due to data extraction failures. In some instances, the author has added the 10-K Item 1C to the data set manually.

2.2.3 Identifying cybersecurity features

The resulting Item 1C Cybersecurity data is then analyzed using regular expressions to determine the presence of key cybersecurity features. In the current algorithm, 23 unique features are tested and two are included in this report: Risk Frameworks and Security Control Standards.

Caveat: this analysis is more effective on cybersecurity features which can be tested for by the presence of a key word or phrase, e.g. “NIST CSF”. The analysis is only as effective as the list of key words and phrases included in the the algorithm and present in the Item 1C sections.

2.3 Data set

Leveraging the SEC data and methodology produced the following data set: 10-K data set

PropertyValue
Start date2023-12-15
End Date2024-06-30
Total Records5582
Skipped Low Word Count789
Skipped High Word Count26
Skipped No Word Count229
10-Ks in analysis4538

Additional details on excluded Item 1C sections:

3. Results

3.1 Percentage of 10-Ks that mention a Security Control Standard

For the Security Control Standards analysis of 10-Ks between 2023-12-15 & 2024-06-30, the results include 4,538 records. The phrase was found 1,629 times (35.9 %)

Graph showing 35.9% of companies mention a Security Control Standard in their 10-K Item 1C

3.2 Percentage of 10-Ks that mention a Risk Framework

For the Risk Framework analysis of 10-Ks between 2023-12-15 & 2024-06-30, the results include 4,538 records. The phrase was found 23 times (0.51 %)

Graph showing 0.5% of companies mention a Risk Framework in their 10-K Item 1C

4. Discussion

Observations from the results:

5. Conclusion and future work

The new cybersecurity disclosure requirements from the SEC have generated a new set of data and insights. The data suggests that very few companies have (or at least disclose) a structured approach using known Risk Management frameworks.

Since this is the first ear of reporting, many companies were not certain what they should file and likely reviewed other filer’s disclosures. Future work could focus on how companies update their disclosures in future 10-Ks and whether we see a trend would homogenization of reporting, if companies change or improve their reporting and whether we can find any correlation between companies with more robust Item 1C filings and their ability to minimize the impact of cybersecurity incidents.

References