homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured

    Get a Free Hour of SANS Training

    Free Course Demos

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured: Solutions for Emerging Risks

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. Summary of the New SEC Rules and Regulations
Lee_Kim.jpg
Lee Kim

Summary of the New SEC Rules and Regulations

Deciphering the details of the new mandates by Security and Exchange Commission

September 25, 2023

The Securities and Exchange Commission (SEC) has finalized new rules to enhance and standardize disclosures regarding cybersecurity risk management, strategy, governance, and incidents by public companies that are subject to the Securities Exchange Act of 1934 reporting requirements.

Specific to disclosures, the SEC amendments require:

  • Disclosures of material cybersecurity incidents be made in a timely manner.
  • Disclosures about a registrant’s processes to assess, identify, and manage material cybersecurity risks, management’s role in assessing and managing material cybersecurity risks, and the board of directors’ oversight of cybersecurity risks be provided periodically.
  • Disclosures to be presented in Inline eXtensible Business Reporting Language (Inline XBRL).

Summary of Disclosure Requirements

Additional information can be found at 88 Fed. Reg. 51896 (August 4, 2023).

  1. Regulation S-K Item 106(b) – Risk management and strategy. Beginning with annual reports for fiscal years ending on or after December 15, 2023, registrants must periodically disclose their processes, if any, for the assessment, identification, and management of material risks from cybersecurity threats, and describe whether any risks from cybersecurity threats have materially affected or are reasonably likely to materially affect their business strategy, results of operations, or financial condition. On an annual basis, registrants must disclose material information in regard to their risk management and strategy on Form 10-K (Form 20-F for foreign private issuers). Inline XBRL tagging of the disclosures is required by December 15, 2024.

  2. Regulation S-K Item 106(c) – Governance. Beginning with annual reports for fiscal years ending on or after December 15, 2023, registrants must describe the board’s oversight of risks from cybersecurity threats and describe management’s role in assessing and managing material risks from cybersecurity threats. On an annual basis, registrants must disclose material information in regard to their governance on Form 10-K (and for foreign private issuers on Form 20-F). Inline XBRL tagging of the disclosures is required by December 15, 2024.

  3. Form 8-K Item 1.05 – Material Cybersecurity Incidents. For all registrants other than smaller reporting entities, mandatory disclosure of cybersecurity incidents goes into effect on December 18, 2023. (Smaller reporting companies are given an additional 180 days from this date to comply, no later than June 15, 2024.) Registrants must disclose any cybersecurity incident they experience that is determined to be material, and describe the material aspects of its nature, scope, and timing and impact or reasonably likely impact. This disclosure must be filed within four (4) business days of determining an incident was material and without unreasonable delay. However, a registrant may delay filing, if the United States Attorney General determines immediate disclosure would pose a substantial risk to national security or public safety. Inline XBRL tagging is required for such disclosures of material cybersecurity incidents and must occur by December 18, 2024 (i.e., beginning one year after initial compliance with the related disclosure requirement). Additionally, registrants must amend a previously filed Item 1.05 Form 8-K to disclose any information called for in Item 1.05(a) that was not determined or was unavailable at the time of the initial Form 8-K filing.

    In summary, after a cybersecurity incident has been deemed to be material, Form 8-K Item 1.05 must be filed within four business days and without unreasonable delay. There is an exception, however, if the United States Attorney General has deemed that the immediate disclosure would pose a substantial risk to national security or public safety. Previously filed Item 1.05 Form 8-K disclosures may be amended, if such information was not determined or otherwise unavailable at the time of the initial Form 8-K filing.

  4. Form 6-K – Material Cybersecurity Incidents (Foreign Private Issuers). Foreign private must furnish on Form 6-K information on material cybersecurity incidents that they disclose or otherwise publicize in a foreign jurisdiction, to any stock exchange, or to security holders.

  5. Form 20-F (Foreign Private Issuers (FPIs)). Foreign private issuers must describe the board’s oversight of risks from cybersecurity threats and describe management’s role in assessing and managing material risks from cybersecurity threats.

  6. Inline XBRL (Inline eXtensible Business Reporting Language) tagging. Disclosures required by these rules must be in Inline XBRL format. This enables automated extraction and analysis of the information. Large-scale analysis and comparison of the information across registrants is also possible. Automatic comparison and redlining of disclosures against prior periods can also be done. Targeted artificial intelligence or machine learning assessments of language used in the cybersecurity disclosures can also be performed, considering factors such as tonality, sentiment, risk words, and others.

The Inline XBRL tagging requirement begins one-year after the initial compliance date for any issuer for the related disclosure requirement. Specifically:

  • For the disclosure of material cybersecurity incidents (Item 1.05 of Form 8–K and Form 6–K), Inline XBRL tagging must start on December 18, 2024.
  • For the disclosure of material information relating to risk management and strategy as well as governance (Item 106 of Regulation S-K and item 16K of Form 20-F), Inline XBRL tagging must begin with annual reports for fiscal years ending on or after December 15, 2024.

Summary of Form Changes

The following table is an excerpt from the published final rules, 88 Fed. Reg. 51896 (August 4, 2023).

Final Amendments and Effects

Affected Forms

Form 8-K

  • Add Item 1.05 requiring disclosure of material cybersecurity incidents within four business days following determination of materiality. 

[Special note for Form 8-K – General Instructions: “A report pursuant to Item 1.05 is to be filed within four business days after the registrant determines that it has experienced a material cybersecurity incident.”]

 

Form 8-K

Form 6-K

  • Add “cybersecurity incident” to the list in General Instruction B of information required to be furnished on Form 6-K.

 

Form 6-K

Regulation S-K Item 106

  • Add Item 106(b) requiring disclosure regarding cybersecurity risk management and strategy.
  • Add Item 106(c) requiring disclosure regarding cybersecurity governance.

Form 10-K and

Form 20-F

Things to Consider

Cybersecurity Management, Strategy, and Governance (Regulation S-K Item 106)

The SEC will now require disclosures regarding cybersecurity risk management, strategy, and governance since it believes that such disclosures are important to investors. The following sections will discuss how these disclosures relate to processes, management’s role and relevant expertise, and cybersecurity risk oversight. These requirements are intended to improve the timeliness and amount of informative detail in cybersecurity disclosures reported to the SEC. In the published final rules, the SEC asserts that such required disclosures may lower companies’ capital costs and increase the value of companies, thereby benefiting investors. These disclosures also should be filed in Inline XBRL format.

Processes (Item 106(b))

Registrants must describe the processes by which such persons or committees are informed about and monitor the prevention, detection, mitigation, and remediation of cybersecurity incidents. As stated in the final rules, investors need to ascertain a registrant’s cybersecurity practices, including whether there is a risk assessment program in place, and to obtain enough information to understand the registrant’s cybersecurity risk profile. But the SEC stated that the final rules only refer to “processes” since the disclosure should not include operational details that could be weaponized by threat actors.

According to the SEC, the registrant should describe the registrant’s process, if any, for assessing, identifying, and managing material risks from cybersecurity threats in sufficient detail to understand those processes. In providing this disclosure, a registrant should address, as applicable, the following non-exhaustive list of disclosure items (also referred to as “elements”):

  • Whether and how any such processes have been integrated into the registrant’s overall risk management system or processes;
  • Whether the registrant engages assessors, consultants, auditors, or other third parties in connection with any such processes; and
  • Whether the registrant has processes to oversee and identify such risks from cybersecurity threats associated with its use of any third-party service provider.

The registrant should also describe whether any risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have materially affected or are reasonably likely to materially affect the registrant, including its business strategy, results of operations, or financial condition and if so, how.

Based upon these requirements and considerations, there is a fine line between what is sufficient disclosure to the SEC (and to investors) versus what may not be enough. Readers are encouraged to monitor Electronic Data Gathering, Analysis, and Retrieval System (EDGAR) filings for reports that are filed pursuant to this requirement, review investor relations resources of US publicly traded companies, and to look for any future SEC guidance on this point. EDGAR is a public database that provides access to the SEC filings of registered companies. These filings include financial and operational information.

Governance (Item 106(c))

Registrants must describe the board of directors’ oversight of risks from cybersecurity threats and describe management’s role in assessing and managing the registrant’s material risks from cybersecurity threats.

Governance: Board Oversight (Item 106(c)(1))

Registrants must describe the board of directors’ oversight of risks from cybersecurity threats and, if applicable, identify any board committee or subcommittee responsible for the oversight of risks from cybersecurity threats. (For foreign private issuers with a two-tier board of directors, the term “board of directors” means the supervisory or non-management board, according to Instruction 1 of Item 106(c).) Registrants also need to describe the processes by which the board or board committee is informed about these cybersecurity risks.

Now is the time for registrants to examine how the board has oversight of risks from cybersecurity threats and, if it applies, whether there is a board committee or subcommittee that is responsible for such oversight. Public companies must now disclose this in their annual reports, namely, in Form 10-K for U.S. public companies and Form 20-F for foreign private issuers, for fiscal years ending on or after December 15, 2023. Because these are public filings with the EDGAR system, an individual (such as an investor or otherwise) can access the system to review the disclosures that are filed in compliance with this disclosure requirement.

Additionally, this disclosure requirement provides that the board itself may have oversight of risks from cybersecurity threats or, in the alternative, that a board committee or subcommittee may be responsible for oversight of risks from cybersecurity threats. While the rules do not go into this level of detail, the board committee or subcommittee – if one is used for such oversight -- may be comprised of both board members and non-board members. Board committees or subcommittees may be helpful, especially when the board may not necessarily have a director with cybersecurity expertise.

Governance: Management’s Role (Item 106(c)(2))

Registrants must also describe management’s role in assessing and managing material risks from cybersecurity threats. While the SEC provides a non-exclusive list of elements for such a disclosure, this list includes the disclosure of management positions or committees that are responsible for assessing and managing such risks and the relevant expertise of such persons or members with sufficient detail to fully describe the nature of the expertise. The SEC also explains (Instruction 2 to Item 106(c)) that previous cybersecurity work experience, relevant degrees or certifications, and any knowledge, skills, or other background in cybersecurity would provide salient information regarding the relevant expertise of management.

Other requirements in this list include disclosing the processes by which the persons or committees that are informed about and monitor the prevention, detection, mitigation, and remediation of cybersecurity incidents and whether these persons or committees report information about these risks to the board of directors or a committee or a subcommittee of the board of directors.

Based upon these elements, it may be time to look at the organizational chart and make sure it is clear, well-defined, and up to date. Establish a clear chain-of-command and delineation of duties. Make sure that individuals in management roles are adequately informed of what is happening at any given time. Ensure that there is a mechanism to regularly report information about cybersecurity risks to the board of directors or a committee or subcommittee of the board of directors. (This mechanism should account for normal times and abnormal times, such as in the case of a significant cybersecurity incident.) Make sure your organization adheres to the Inline XBRL tagging requirement for responsive disclosures. 

Material Cybersecurity Incidents (Form 8-K Item 1.05; Form 6-K for Foreign Private Issuers)

When assessing the materiality of cybersecurity incidents, risks, and related issues, companies should do this through the lens of the reasonable investor and take into account all relevant facts and circumstances. Factors to consider include, but are not limited to, the immediate consequences and any longer-term effects on operations, finances, brand perception, customer relationships, as well as other relevant factors.

When assessing the materiality of cybersecurity incidents, risks, and related issues, companies should do this through the lens of the reasonable investor and take into account all relevant facts and circumstances. Factors to consider include, but are not limited to, the immediate consequences and any longer-term effects on operations, finances, brand perception, customer relationships, as well as other relevant factors. Registrants have four (4) business days (and otherwise without unreasonable delay) to disclose: 1) a material cybersecurity incident to the SEC and 2) describe the material aspects of its nature, scope, and timing, as well as the 3) impact or reasonably likely impact. The materiality determination regarding a cybersecurity incident must be made without unreasonable delay after discovery of the incident. Notwithstanding this, if the U.S. Attorney General notifies the SEC in writing that the disclosure would pose a substantial risk to national security or public safety, then the disclosure may be delayed, as more fully described in the published final rules, 88 Fed. Reg. 51896 (August 4, 2023).

Nonetheless, it is important to note that disclosure requirement does not necessarily start from the time that the cybersecurity incident was discovered, but only after it has been determined to be a material cybersecurity incident. (Of course, not all cybersecurity incidents are material in nature. The determination is very much fact specific.) Additionally, in terms of the content of the disclosure, the SEC clarified in the final published rules that registrants do not have to disclose specific or technical information about the planned response to the incident or its cybersecurity systems, related networks and devices, or potential system vulnerabilities in such a detailed manner that would impede the registrant’s incident response or remediation. Remember that Inline XBRL tagging also applies for this material cybersecurity incident disclosure requirement.

Learn everything you need to know about the new SEC ruling and gain actionable insights at the SANS Cyber Compliance Countdown event on November 2, 2023.

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Cybersecurity Insights

Related Content

Blog
Why SANS - Blog - Zero Trust - Best Practices for Securing Your Network with Zero Trust Network Access_340 x 340.jpg
Cybersecurity Insights
August 16, 2024
Best Practices for Securing Your Network with Zero Trust Network Access
Zero Trust Network Access has emerged from the rapidly evolving world of cybersecurity as a critical strategy for protecting networks.
SANS_social_88x82.jpg
SANS Institute
read more
Blog
SCA_-_Blog_-_SANS_Cyber_Academy_Awards_108_Students_Scholarships_to_Launch_Careers_in_Cybersecurity_-_340x340.jpg
Cybersecurity Insights
September 14, 2023
SANS Cyber Academy Awards 108 Students Scholarships to Launch Careers in Cybersecurity
SANS continues its push toward diversity of the cyber workforce.
SANS_social_88x82.jpg
SANS Institute
read more
Blog
Blog - Network Engineer Salary Skills and Career Path
Cybersecurity Insights
August 9, 2023
Network Engineer Salary, Skills, and Career Path
Learn what it takes to become a network engineer.
thomas.jpg
Thomas Wolfe
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn