Regulatory Compliance

SEC Cyber Disclosure Rules: Year Two

A senior engineer's view of the second-year impact of SEC cybersecurity disclosure rules, what filings actually look like, and where supply chain risk fits in.

Shadab Khan
Security Engineer
8 min read

The SEC cybersecurity disclosure rules, which require public companies to disclose material cybersecurity incidents on Form 8-K within four business days and to disclose their cybersecurity risk management and governance in their annual reports, have now seen two full years of operation. 2026 is the year where the practice has settled enough to look at what the rules actually produced, where they have shifted corporate behavior, and where supply chain incidents have fit into the disclosure picture. The headlines focused on the four-day timeline; the operational reality is more nuanced.

What do 8-K cybersecurity disclosures actually look like?

Two years of filings have produced a substantial public dataset of 8-K Item 1.05 disclosures and the related Item 1.05(c) follow-up amendments. The patterns are clear. Disclosures cluster around ransomware incidents, large-scale data breaches, and supply chain compromises, with the supply chain category growing as a share of total filings through 2025 and 2026. Most disclosures are short, declaring the existence of an incident and committing to update as the investigation progresses, with substantive detail withheld pending forensic completion.

The four-business-day timeline has been operationally achievable for most filers, though the materiality determination that triggers the timeline has been the source of most ambiguity. The SEC's guidance has been clear that materiality is the established federal securities law concept, not a new cybersecurity-specific test, but the application to evolving incidents requires fresh judgment as scope is established. Filings often include language explaining when the materiality determination was made, which reflects how registrants are managing this judgment internally.

Amendments to initial filings have become common. Initial 8-K disclosures typically describe a known incident with limited scope detail; amendments updated as investigation continues add detail on attacker access, affected systems, financial impact estimates, and remediation steps. The amendment pattern has effectively normalized the practice of "early initial disclosure plus continuing updates," which mitigates the tension between the four-day timeline and the slow reality of forensic investigation.

How are supply chain incidents being disclosed?

Supply chain incident disclosures are a distinctive category. When the registrant is the upstream vendor, the disclosure language describes the compromise of their own systems and the downstream customer impact. When the registrant is a downstream customer affected by an upstream compromise, the disclosure describes the third-party event, the registrant's exposure, and the steps taken to contain the impact.

The downstream-customer disclosures have been particularly informative. Multiple major incidents through 2025 and 2026 cascaded across hundreds of public companies, each of which had to make individual materiality determinations and individual filing decisions. The pattern that emerged is that companies with substantial reliance on the affected upstream typically filed even when the direct impact was unclear, because the materiality of the dependency itself was disclosable.

The SEC has not, through 2026, brought enforcement actions specifically targeting cybersecurity disclosure decisions, but the staff has been active in commenting on filings and in raising questions about disclosure timing in subsequent reviews. The signaling has been that the agency expects thoughtful materiality analysis with documented reasoning, not formulaic responses, and that supply chain incidents should not be treated differently than direct compromises when the registrant's exposure is comparable.

What did the annual report disclosures actually produce?

Item 106 of Regulation S-K requires registrants to describe their cybersecurity risk management processes, the role of management and the board, and how cybersecurity risks are integrated into the broader enterprise risk management framework. Two years of 10-K filings have produced a substantial corpus of these descriptions, and the patterns reveal more about corporate governance than about cybersecurity practice.

The strongest disclosures describe specific governance structures with named committees, defined reporting cadences, and integration with risk management workflows. Weaker disclosures use generic language that could apply to any company. The SEC staff has commented on weak disclosures, asking for more specificity in subsequent filings, and the trajectory through 2026 has been toward more concrete descriptions.

A subtle but consequential effect of Item 106 has been to elevate cybersecurity at the board level. Boards reviewing the disclosure language are forced to confirm that the described practices actually operate, which has driven board-level engagement with cybersecurity risk in companies where it had been delegated entirely to management. The disclosure rules effectively created a governance forcing function, which is more important than any specific text in the filings.

How are supply chain risks described in annual disclosures?

Supply chain risk has emerged as a consistent theme in Item 106 disclosures. Most registrants describe their reliance on third-party software and services, their vendor risk management processes, and their incident response posture for supply chain events. The depth of these descriptions varies widely, from generic acknowledgments of supply chain risk to detailed descriptions of SBOM programs, vendor security assessments, and tested incident response playbooks.

The 2026 wave of disclosures showed a sharp increase in the specificity of supply chain risk descriptions. Companies that experienced supply chain incidents during 2024 and 2025 are now describing the lessons learned and the program changes implemented, which provides useful market signal about what mature programs look like. Companies that have not experienced incidents are increasingly describing aspirational programs, and the gap between incident-tested and untested programs is visible to careful readers.

Investors and analysts are reading these disclosures more carefully than expected. Several rating agencies and proxy advisors use cybersecurity disclosure quality as input to their analyses, and registrants are responding by deepening their disclosures.

What changes for engineering and security teams?

The disclosure rules have changed the relationship between security teams and the rest of the organization. Materiality determinations require coordination with legal, finance, investor relations, and the board, and security teams that previously operated autonomously now have stakeholders who need timely information during incidents. The ability to produce reliable scope assessments quickly has become a security capability, not just a forensics niceness.

For supply chain specifically, the disclosure rules have created concrete operational expectations. Security teams need to know within hours which third-party compromises affect their organization, what data and systems are exposed, and what the financial and operational impact estimate is. This requires component-level inventories, supplier dependency mapping, and incident response workflows that integrate vendor disclosures into internal investigation. Spreadsheet-based vendor inventories do not support this.

The disclosure rules have also changed how security incidents are scoped and investigated. The forensic process has to produce material findings quickly enough to inform disclosure decisions, which has shifted investment toward telemetry that supports scope determination. Organizations that pre-invested in detailed asset inventories and dependency tracking are better positioned to meet the disclosure timeline.

What changes through 2026 and beyond?

The disclosure rules will continue to shape practice through 2026 and into 2027. Patterns of disclosure quality and disclosure timing will continue to converge as registrants learn from each other and as the SEC staff continues to comment on filings. Enforcement actions remain a possibility, and the first enforcement action specifically targeting disclosure timing will substantially shape industry practice when it arrives.

International convergence is also a factor. The EU's NIS2 reporting timelines, the UK's analogous rules, and the various sectoral incident reporting regimes are creating an international landscape where multinational companies are reporting incidents to multiple regulators on different timelines. The pragmatic answer for these companies is a unified incident response process that can produce regulator-specific disclosures from common operational data.

Supply chain disclosure is likely to deepen further. The trajectory of recent guidance and the pattern of recent filings suggest that supply chain risk descriptions in Item 106 will continue to grow in specificity, and that 8-K filings related to supply chain incidents will continue to be a substantial share of total cybersecurity filings. Companies that build the underlying operational capability to support this disclosure work will have advantages in compliance cost and in disclosure quality.

How Safeguard Helps

Safeguard provides the operational backbone that SEC cybersecurity disclosure programs require. Continuous component-level software inventories across every production system enable rapid scope determination during incidents, and supplier dependency mapping makes downstream impact analysis traceable in hours rather than days. Griffin reachability analysis tells you within minutes whether a third-party compromise actually affects your exposed systems, which is the core question behind most supply chain materiality determinations. Lino compliance produces Item 106-grade descriptions of your cybersecurity program from real telemetry, with audit trails that support board-level governance reporting. Incident response workflows integrate vendor disclosures, internal investigation, and stakeholder coordination, so the four-business-day timeline is operationally achievable rather than aspirational.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.