{"id":318,"date":"2015-01-20T19:10:52","date_gmt":"2015-01-20T19:10:52","guid":{"rendered":"https:\/\/seci.wpenginepowered.com\/?p=318"},"modified":"2015-01-20T19:10:52","modified_gmt":"2015-01-20T19:10:52","slug":"cybersecurity-what-the-what","status":"publish","type":"post","link":"https:\/\/seciblog.pli.edu\/index.php\/cybersecurity-what-the-what\/","title":{"rendered":"Cybersecurity \u2013 What the what??"},"content":{"rendered":"<p>After all the chaos and drama surrounding the most recent cybersecurity hack at Sony, the focus on this area has become even more intense.<\/p>\n<p>Clearly, the first priority is doing whatever is possible to manage cybersecurity risk. Action steps must depend on each company\u2019s specific situation, and there is no one-size-fits-all solution. To help in this regard PLI is presenting a One Hour Briefing on February 18, 2015 titled \u201c Cyber Security After Sony: Practice Points and Risk Mitigation Strategies\u201d. You can learn more about the program at:<\/p>\n<p><a href=\"http:\/\/www.pli.edu\/Content\/Seminar\/Cyber_Security_After_Sony_Practice_Points\/_\/N-4kZ1z120mn?fromsearch=false&amp;ID=247142\">www.pli.edu\/Content\/Seminar\/Cyber_Security_After_Sony_Practice_Points\/_\/N-4kZ1z120mn?fromsearch=false&amp;ID=247142<\/a><\/p>\n<p>We also have archived the webcast of our one-day program on managing cybersecurity at:<\/p>\n<p><a href=\"http:\/\/www.pli.edu\/Content\/OnDemand\/Cybersecurity_2014_Managing_the_Risk\/_\/N-4nZ1z12f7s?fromsearch=false&amp;ID=178337\">www.pli.edu\/Content\/OnDemand\/Cybersecurity_2014_Managing_the_Risk\/_\/N-4nZ1z12f7s?fromsearch=false&amp;ID=178337<\/a><\/p>\n<p>From a disclosure perspective, the issues and the high public profile of the Sony hack raise the question whether cybersecurity risk should be disclosed in more detail or depth in upcoming filings. As a reminder, the SEC\u2019s current guidance for cybersecurity risk disclosures is in CorpFin Disclosure Guidance Topic 2 at:<\/p>\n<p><a href=\"http:\/\/www.sec.gov\/divisions\/corpfin\/guidance\/cfguidance-topic2.htm\">www.sec.gov\/divisions\/corpfin\/guidance\/cfguidance-topic2.htm<\/a><\/p>\n<p>A point to remember for now, which is brought out in the Disclosure Guidance Topic, is this area may not be just a risk factor disclosure. Depending on the nature of the cybersecurity risk your company faces and cybersecurity issues you have encountered, disclosure in:<\/p>\n<p>The business section<br \/>\nLegal proceedings<br \/>\nMD&amp; A, and<br \/>\nThe financial statements<\/p>\n<p>may be necessary.<\/p>\n<p>As always, we welcome your thoughts and feedback!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After all the chaos and drama surrounding the most recent cybersecurity hack at Sony, the focus on this area has become even more intense. Clearly, the first priority is doing whatever is possible to manage cybersecurity risk. Action steps must depend on each company\u2019s specific situation, and there is no one-size-fits-all solution. To help in &hellip; <a href=\"https:\/\/seciblog.pli.edu\/index.php\/cybersecurity-what-the-what\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Cybersecurity \u2013 What the what??<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[38,39,48,32,40,34,21,46,4,6,5],"coauthors":[163],"class_list":["post-318","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-accountancy","tag-accountant","tag-accounting","tag-audit","tag-business","tag-cyber-attack","tag-cybersecurity","tag-financial","tag-sec","tag-sec-professionals","tag-sec-reporting"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/posts\/318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/comments?post=318"}],"version-history":[{"count":0,"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/posts\/318\/revisions"}],"wp:attachment":[{"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/media?parent=318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/categories?post=318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/tags?post=318"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/coauthors?post=318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}