
New proposed regulations for cyber incident reporting
Discover the implications of proposed updates to the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) and its requirements on covered entities.
Calendar year-end companies have made a significant effort to comply with the new SEC cybersecurity rules. The first wave of disclosures in Form 10-K have resulted in greater overall transparency on cybersecurity risk management, strategy and governance practices compared to disclosures in annual reports from previous years.
As expected, given the expanded disclosure requirements, nearly all companies disclosed more details on key components of cyber leadership and management roles, management strategy of third-party risk, board cyber risk oversight responsibilities and incident response protocols.
To help current and future filers enhance their understanding of how the disclosures can benefit their reporting and capabilities assessments, PwC conducted detailed research and analysis of an initial set of 10-K filings.
A new disclosure requirement in the 10-K is intended to provide investors transparency into the filer’s strategy and process for managing cybersecurity risks.
We previously highlighted the capabilities that should align with SEC disclosure requirements in the following PwC framework. These are core tenets of a cybersecurity program.
Here’s what we’ve learned so far on how program disclosures of capabilities match up with our framework and recommendations.
Initial filings reveal that over 80% of companies included details on how cyber risk and enterprise-wide risk management are integrated. Organizations also disclosed risk assessment standards they have adopted, cybersecurity frameworks used, resilience efforts and how cybersecurity fits more broadly with enterprise-wide risk management (ERM) assessment processes.
Disclosure patterns we’re seeing:
What it all means
Filers are disclosing that they’re following leading cybersecurity standards and practices to guide their strategies, processes, technologies and controls.
10-K disclosures don’t require specific details on the implementation or effectiveness of these practices — or if there are areas of the standards that haven’t been fully implemented. However, cross-functional coordination, monitoring and reporting of risk management practices can help companies assess the state of their cyber program.
It’s critical that the effectiveness of outlined practices be tested and verified to uphold cyber resilience posture. These standards can not only drive a collective ability to quickly respond to cyber risks and threats, but also help programs stay current and keep investors informed.
The initial sample revealed reminders for future filers that they can apply (or confirm) depending on where they are in the filing cycle. Companies filing later ultimately disclosed more details about their cybersecurity programs, perhaps indicating a benefit from observing the types of responses in the disclosures from earlier filers and the chance to align closely with SEC elements.
It’s important for companies that haven’t filed yet to keep in mind that this is a reference point of disclosures so far. A more complete view of disclosures is still emerging after a full reporting cycle and potentially further SEC guidance. It’s also important to remember that this is not a stagnant disclosure. As companies continue to modify their cyber risk management and governance practices, they should update their disclosures to reflect significant changes.
Establish a reporting baseline
As a general way to determine disclosure standards, especially accounting for industry and potentially sector similarities, there are several examples from initial filers on what to potentially avoid:
Earlier filers laid the groundwork for disclosures that registrants can more confidently benchmark with their peers. However, this is a consistent priority. All filers (current and future) should continue to reflect on the robustness of not only their disclosures but also their programs to determine any gaps as well as where enhanced transparency may benefit their stakeholders.
This cross-industry analysis of companies of different sizes is an ongoing effort and the first in a series of additional perspectives to come from PwC on 10-K cyber disclosures.
Research methods and objectives
This is an early stage proof of concept of over 200 filers that will scale up with additional registrant filings. This analysis was initially conducted through automated crawling and ingestion of filings and the use of a custom-developed prompts with PwC’s in-house generative AI model implementation.
These methods enabled us to efficiently parse filings against 100+ relevant data points based on PwC's SEC cyber disclosure readiness methodology — data points that are commonly sourced when supporting clients in their SEC cyber disclosure readiness efforts.
Discover the implications of proposed updates to the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) and its requirements on covered entities.
Check out the latest findings of PwC’s 2025 Global Digital Trust Insights Survey, reflecting the views of over 4,000 executives.
How a tech tipping point is fueling reinvention, resilience and growth.