Compliance

Nick Shevelyov
CEO & managing partner
Published
Jan 8, 2026
If you’re leading security, privacy, finance, or legal at a growth company, the trend is clear: regulators are moving from “do you have a program?” to “prove you can execute under pressure.”
Two SEC-driven realities matter right now:
Public company cyber incident disclosure is time-bound.
Financial privacy safeguards and incident response expectations have new deadlines.
This post is about operational readiness—not legal advice. Consult counsel on your specific obligations.
The SEC cyber disclosure rule: speed starts at the moment of materiality
The SEC’s cybersecurity disclosure rules require registrants to disclose material cybersecurity incidents on Item 1.05 of Form 8‑K, generally due four business days after the company determines the incident is material. (SEC)
Notice what that means in practice: the clock isn’t tied to the moment you detect an incident. It’s tied to when leadership determines materiality—after evaluating facts, scope, and potential impact.
So the operational question becomes:
How fast can you develop a defensible fact base and reach a decision?
Regulation S‑P amendments: deadlines are here (or soon)
For firms covered by Regulation S‑P, regulators have clarified compliance dates for the 2024 amendments: “larger” entities generally had to comply by December 3, 2025, and “smaller” entities by June 3, 2026. (FINRA)
Among other requirements, summaries describe strengthened written policies and procedures and customer notification expectations following certain data incidents (consult counsel on applicability and exact triggers). (IAPP)
The takeaway: you need an incident response program that works in real time and produces clean documentation.
The disclosure-ready operating model: decide fast, document clean
A disclosure-ready organization does three things consistently:
Separates detection from decision (and gives the decision team a stable process)
Produces an evidence pack that stands up later (board, auditors, regulators)
Communicates with discipline (internally first, externally when appropriate)
1) Build a “materiality workflow” before you need it
Materiality isn’t a gut feel. Make it a workflow with owners, thresholds, and timing.
At minimum, define:
Who convenes the incident governance team
Who owns initial fact gathering (security + IT)
Who evaluates business impact (CFO/finance + ops)
Who advises on disclosure posture (legal; consult counsel)
Who informs the board and when (chair/audit committee)
The goal is not to decide “yes/no” instantly. The goal is to avoid improvisation.
2) Pre-stage the evidence pack
Your evidence pack should include:
Timeline of key events (with sources)
Impact statement (systems, customers, operations)
Containment actions taken and why
Confidence level and open questions
Decision log: what was decided, by whom, and based on what
This is what turns chaos into defensibility.
3) Align comms to the decision workflow
Use a three-layer approach:
Internal exec updates (every 2–4 hours early on)
Board updates (cadenced, decision-ready)
External/customer updates (plain language, scoped, consistent)
Avoid speculation. Say what you know, what you don’t, and what you’re doing next.
The tabletop exercise most companies skip (and shouldn’t)
Run one exercise per year on “materiality under uncertainty”: incomplete facts, conflicting early indicators, customer and press pressure, and decision deadlines.
A realistic 30-day readiness plan
Draft the materiality workflow and RACI
Create the evidence-pack template and a decision log
Pre-approve comms language patterns (legal + exec)
Identify your top 5 data systems and logging gaps
Schedule a 90-minute exec tabletop
If your board is demanding disclosure readiness, vCSO.ai can help you build a disclosure-ready incident governance workflow, evidence pack templates, and a tabletop that produces a decision memo and a 90-day improvement plan.

Nick Shevelyov
CEO & managing partner




