{"id":72392,"date":"2023-09-20T11:43:55","date_gmt":"2023-09-20T03:43:55","guid":{"rendered":"https:\/\/version-2.com\/?p=72392"},"modified":"2023-09-15T11:45:37","modified_gmt":"2023-09-15T03:45:37","slug":"sec-cyber-reporting-requirements-tailoring-your-security-strategy","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/09\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/","title":{"rendered":"SEC Cyber Reporting Requirements: Tailoring Your Security Strategy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"72392\" class=\"elementor elementor-72392\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/SEC-Cyber-Reporting-Requirements.png\" width=\"800\" height=\"500\" \/><\/p><div class=\"fl-module-content fl-node-content\"><p>The Securities and Exchange Commission (SEC) has made a significant stride in promoting transparency in the corporate sector. It has introduced new regulations obligating publicly traded companies to reveal significant cybersecurity incidents, offering investors a more transparent view of their cybersecurity risk management, strategy, and governance. Aimed at fostering informed investment decisions, the new SEC cyber reporting requirements mark a turning point in how public companies handle cybersecurity risks.<\/p><h3>The SEC Rules Unraveled<\/h3><p>At the heart of these rules is a requirement for public companies to announce material cybersecurity incidents within four business days of identifying their material nature. Materiality is discerned based on factors like the incident\u2019s scale and character, repercussions on company operations, and possible effects on financial standing.<\/p><p>Additionally, these rules compel public companies to provide more comprehensive information about their cybersecurity risk management, strategy, and governance.<\/p><h3>Disclosure Obligations for Public Companies<\/h3><p>After determining a <a href=\"https:\/\/www.sec.gov\/news\/press-release\/2023-139\" target=\"_blank\" rel=\"noopener\">cybersecurity incident is material:<\/a><\/p><ul><li>Companies must disclose on Item 1.05 of Form 8-K the incident\u2019s nature, scope, and timing along with its impact on the company\u2019s operations and financial health within 4 business days. Details regarding compromised data and ongoing or completed <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/sec-now-requires-companies-to-disclose-cyberattacks-in-4-days\/\" target=\"_blank\" rel=\"noopener\">remediation efforts<\/a> should also be included.<\/li><li>Registrants must provide details on Form 10-K (Regulation S-K Item 106) that discuss how they assess, identify, and manage material risks from cybersecurity threats. Details on board oversight of risks from cybersecurity threats and management\u2019s role in assessing and managing them must also be included .<\/li><li>Foreign private issuers are required to provide similar disclosures for material cybersecurity incidents and to detail cybersecurity risks management, strategy, and governance on Form 20-F.<\/li><\/ul><p>The new regulations will be enacted in December or 30 days after publication in the Federal Register. Smaller companies will be allowed an additional 180 days to submit their Form 8-K disclosures.<\/p><p>Additionally, disclosures may be delayed if the United States Attorney General determines that immediate disclosure would pose significant national security or public safety risks and notifies the Commission of this in writing.<\/p><h3>Tailoring Your Security Strategy for Optimal Compliance<\/h3><p>These technologies and frameworks can provide a multi-layered approach for compliance:<\/p><h5>Network Access Control: Your First Line of Defense<\/h5><p>In the face of the SEC\u2019s new regulations, the implementation of <a href=\"https:\/\/www.portnox.com\/solutions\/network-access-control\/\" target=\"_blank\" rel=\"noopener\">Network Access Control<\/a> (NAC) can be a game-changer. NAC solutions provide real-time <a href=\"https:\/\/www.portnox.com\/solutions\/network-visibility\/\" target=\"_blank\" rel=\"noopener\">visibility<\/a> of all devices connected to the network, along with their user credentials and activities. By enforcing strong access policies, a NAC can ensure only authorized users and devices gain access to critical data, keeping potential threats at bay while aligning with the SEC\u2019s push for improved cybersecurity risk management.<\/p><h5>Trust but Verify: Leveraging the Zero Trust Framework<\/h5><p>Additionally, adopting a <a href=\"https:\/\/www.portnox.com\/cybersecurity-101\/zero-trust-framework\/\" target=\"_blank\" rel=\"noopener\">zero trust framework<\/a> provides a structured and secure approach to compliance. Zero trust operates the belief that no user or device \u2013 whether inside or outside the network should be trusted by default. Each access request is verified before access is granted, significantly reducing the risk of breaches while allowing easier compliance with SEC regulations.<\/p><h5>Passwordless Authentication: The Future of Secure Access<\/h5><p>Password-based systems have long been a weak link in the cybersecurity chain. By making the move towards<a href=\"https:\/\/www.portnox.com\/solutions\/passwordless-authentication\/\" target=\"_blank\" rel=\"noopener\"> passwordless authentication<\/a>, companies can address this issue head-on. Replacing easily cracked, often forgotten passwords for stronger alternatives like biometrics, hardware tokens, or one-time passcodes, offer a user-friendly approach that bolsters security measures while meeting SEC directives.<\/p><h3>Closing Thoughts<\/h3><p>As we embrace the digital era, public companies face escalating cybersecurity risks. The new SEC cyber reporting requirements shine light on the traditionally opaque world of cyber risk in public companies, while increasing critical transparency with investors. By leveraging a multi-layered security approach, companies can secure an effective path to compliance while mitigating malicious threats.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Securities and Exchange Commission (SEC) has made a [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,1075,61],"tags":[1076,352,423],"class_list":["post-72392","post","type-post","status-publish","format-standard","hentry","category-portnox","category-year2023","category-press-release","tag-1076","tag-network","tag-portnox"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SEC Cyber Reporting Requirements: Tailoring Your Security Strategy - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SEC Cyber Reporting Requirements: Tailoring Your Security Strategy - Version 2\" \/>\n<meta property=\"og:description\" content=\"The Securities and Exchange Commission (SEC) has made a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-20T03:43:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/SEC-Cyber-Reporting-Requirements.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/09\\\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"SEC Cyber Reporting Requirements: Tailoring Your Security Strategy\",\"datePublished\":\"2023-09-20T03:43:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/09\\\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\\\/\"},\"wordCount\":624,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/SEC-Cyber-Reporting-Requirements.png\",\"keywords\":[\"2023\",\"Network\",\"Portnox\"],\"articleSection\":[\"Portnox\",\"2023\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/09\\\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\\\/\",\"name\":\"SEC Cyber Reporting Requirements: Tailoring Your Security Strategy - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/SEC-Cyber-Reporting-Requirements.png\",\"datePublished\":\"2023-09-20T03:43:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/SEC-Cyber-Reporting-Requirements.png\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/SEC-Cyber-Reporting-Requirements.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SEC Cyber Reporting Requirements: Tailoring Your Security Strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SEC Cyber Reporting Requirements: Tailoring Your Security Strategy - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/","og_locale":"zh_HK","og_type":"article","og_title":"SEC Cyber Reporting Requirements: Tailoring Your Security Strategy - Version 2","og_description":"The Securities and Exchange Commission (SEC) has made a [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/","og_site_name":"Version 2","article_published_time":"2023-09-20T03:43:55+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/SEC-Cyber-Reporting-Requirements.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/09\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"SEC Cyber Reporting Requirements: Tailoring Your Security Strategy","datePublished":"2023-09-20T03:43:55+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/09\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/"},"wordCount":624,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/SEC-Cyber-Reporting-Requirements.png","keywords":["2023","Network","Portnox"],"articleSection":["Portnox","2023","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.portnox.com\/blog\/cyber-attacks\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/09\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/","url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/","name":"SEC Cyber Reporting Requirements: Tailoring Your Security Strategy - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/SEC-Cyber-Reporting-Requirements.png","datePublished":"2023-09-20T03:43:55+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/cyber-attacks\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/SEC-Cyber-Reporting-Requirements.png","contentUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/SEC-Cyber-Reporting-Requirements.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/sec-cyber-reporting-requirements-tailoring-your-security-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"SEC Cyber Reporting Requirements: Tailoring Your Security Strategy"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-iPC","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/72392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=72392"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/72392\/revisions"}],"predecessor-version":[{"id":72396,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/72392\/revisions\/72396"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=72392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=72392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=72392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}