Incident Response

Incident Triage Techniques: Severity Classification, Materiality, and the SEC 4-Day Clock

Table of Contents

TL;DR

  • Triage is the decision everything else depends on. Wrong severity classification leads to wrong response intensity, wrong escalation, wrong disclosure decisions — and for public companies, potential SEC enforcement.
  • The SEC’s 4-day reporting clock starts when materiality is determined, not when the incident is discovered. That distinction matters enormously — but it doesn’t justify delay. The SEC expects companies to make materiality determinations without unreasonable delay after discovery.
  • Materiality has no bright-line dollar test. Quantitative and qualitative factors both count: reputational harm, customer relationship damage, regulatory exposure, and competitive impact can all tip a small breach into material territory.
  • The first year of Form 8-K cybersecurity filings (2024–2025) revealed the same failure across companies: no documented internal decision process. If your triage process doesn’t generate a paper trail in real time, it’s not going to hold up under examination.

The alert fired at 2am. By the time the security team has initial containment at 6am, there are already three questions the CISO needs answered before the board call at 9:

What happened, exactly? How bad is it? And do we need to tell the SEC about this within four business days?

The first two questions belong to incident response. The third belongs to triage — the classification process that determines severity, drives escalation, and, for public companies, starts a regulatory clock that doesn’t pause for remediation.

Most incident response programs are reasonably competent at detection and containment. Most are bad at triage — specifically, at translating technical findings into the business severity classifications that determine whether something goes to the board, to outside counsel, and to the SEC. The first year of Form 8-K cybersecurity filings produced a steady stream of SEC comment letters, and a disproportionate number focused not on what happened but on how companies decided — or failed to decide — whether it was material.

Here’s a practitioner framework for getting triage right.


Why Classification Errors Are So Costly

An underclassified incident (calling a P1 a P3) delays executive escalation, under-resources containment, and — for public companies — runs the clock down before the materiality clock even starts. Overclassification wastes resources, desensitizes leadership, and creates organizational pressure to keep future severity assessments low to avoid the false alarms. Both failure modes are real, and both have appeared in post-incident reviews.

The broader problem: most severity frameworks are designed for IT operations, not for the hybrid IT/legal/regulatory decision that SEC disclosure requires. A framework that works well for triaging a server outage may produce completely wrong outputs when applied to a data breach affecting 8,000 customer records where the affected data is a regulated data type.

Triage for incident response isn’t just a technical process. It’s a business decision process that needs to start at detection and run in parallel with containment.


A Working Severity Classification Framework

A four-tier framework with concrete business criteria works for most financial services organizations:

SeverityLabelKey CharacteristicsResponse Expectation
P1CriticalConfirmed data exfiltration of regulated data; active ransomware or destructive attack; confirmed material business impact; customer-facing systems offline; regulatory breach notification likelyImmediate executive escalation (CISO + CLO + CFO within 1 hour); external IR counsel engaged; SEC materiality assessment initiated
P2HighSuspected data exposure under investigation; successful unauthorized access to production systems; significant operational disruption; potential regulatory implicationsCISO notification within 4 hours; formal investigation open; legal counsel briefed; SEC clock awareness triggered
P3MediumAnomalous activity under investigation; policy violation with limited scope; contained incident with minor impact; no confirmed data exposureSecurity leadership notification within 24 hours; standard investigation workflow
P4LowInformational alerts; minor policy violations; phishing attempts blocked; precautionary investigationsStandard analyst workflow; no escalation required unless upgraded

The classifications need to be anchored in quantitative terms your team can apply consistently under pressure. “Significant operational disruption” means nothing if it’s not defined. Attach it to something concrete: “three or more customer-facing services offline for more than one hour,” or “more than 10,000 customer accounts affected.” Whatever the threshold is, write it down.

Critical calibration principle: Initial triage classifications should be conservative — assume higher severity, not lower, when data is incomplete. You can downgrade a P1 to a P2 as facts develop. Upgrading a P3 to a P1 three days later after delaying escalation is the pattern that produces SEC enforcement problems.


The Materiality Decision Process

For public companies, P1 and most P2 incidents require a materiality determination — a documented analysis of whether the incident rises to the threshold requiring 8-K disclosure under Item 1.05.

The SEC’s standard: information is material if there is a substantial likelihood that a reasonable investor would consider it important when making an investment decision. There is no financial bright line. In the SEC’s own guidance, materiality analysis must consider:

Quantitative Factors

  • Actual or projected financial impact (remediation costs, lost revenue, regulatory fines)
  • Insurance coverage and net exposure
  • Impact on financial results compared to recent reporting periods

Qualitative Factors

  • Harm to reputation or brand
  • Damage to customer, vendor, or business partner relationships
  • Likelihood of litigation or regulatory investigation
  • Negative competitive impact (exposure of trade secrets, competitive intelligence)
  • Number and type of individuals whose information was compromised
  • Sensitivity of affected data (health data, financial data, government IDs)

The “small breach, high sensitivity” scenario matters most here. A breach involving 500 records from a healthcare product’s waitlist — where the data includes names, email addresses, and preliminary financial screening information — may be material even with no operational impact. A breach of 50,000 internal email addresses with no customer PII may not be. The data type and relationship context matter as much as the volume.

Who Makes the Call

The SEC’s first-year comment letter review repeatedly flagged companies that lacked a documented internal escalation and decision-making procedure. The materiality determination should involve:

  • General Counsel or outside securities counsel
  • CFO or Controller
  • CISO or equivalent
  • Business unit heads where relevant

Document the deliberation. “Legal, finance, and security leadership reviewed available facts on [date] and determined no material impact for the following reasons: [specific factors]” is defensible. “We decided it wasn’t material” is not.


The SEC 4-Day Clock: Mechanics and Common Mistakes

Under Item 1.05 of Form 8-K (effective December 18, 2023 for large accelerated filers), the four-business-day clock runs from the date of materiality determination — not the date of discovery, detection, or containment.

This distinction creates genuine operational tension. A company that discovers a breach on Monday, completes its investigation by the following Wednesday, and determines materiality that day has four business days from Wednesday to file — not from Monday. But the SEC has been equally clear that the investigation itself cannot be stretched to avoid the clock. “Without unreasonable delay” means your investigation timeline needs to be defensible in proportion to incident complexity.

Lessons from the first year of Form 8-K filings (2024–2025):

From the NYU Compliance and Enforcement blog’s analysis of the first year of filings: of approximately 80 total filings in the first year, only about 14% were made under Item 1.05 as material. The rest were voluntary disclosures under Item 8.01 for non-material incidents. Following the SEC’s May 2024 guidance clarification — specifically, SEC Corp Fin Director Erik Gerding’s statement that Item 1.05 should only be used for confirmed material incidents — companies stopped over-disclosing under Item 1.05 and started using Item 8.01 as the appropriate vehicle for significant-but-not-material disclosures.

The practical implication: filing under Item 8.01 isn’t a red flag. It’s appropriate for incidents that are real and significant enough to warrant voluntary disclosure without meeting the materiality threshold. What creates problems is filing under Item 1.05 for incidents that aren’t material, or waiting until the SEC issues a comment letter to figure out which item applied.

The AT&T exception: AT&T filed its July 2024 Form 8-K 84 days after detection — the most prominent example of a delayed filing. The delay was authorized by the Department of Justice, which determined that immediate disclosure posed a substantial risk to national security or public safety. That exception exists but is extremely narrow. Don’t plan around it.


Escalation Protocols During Triage

Triage isn’t a solo activity. The escalation structure needs to be pre-built so it activates without deliberation when an incident hits.

A functional escalation protocol specifies, for each severity tier:

  • Who gets notified (by name and backup)
  • Within what timeframe (hours, not “promptly”)
  • Through what channel (phone call, not just email for P1/P2)
  • What information must be in the initial notification
  • What decisions or approvals are required before certain actions

For P1/P2 incidents, external parties often need notification too: outside IR counsel (to protect privilege over the investigation), cyber liability insurance carrier (most policies require timely notification), and in some cases regulators (banking regulators for material operational events, HIPAA covered entities for suspected health data breaches).

One underappreciated escalation requirement: your board or audit committee. Banking regulators under the November 2021 Computer-Security Incident Notification rules require notification within 36 hours of a material cybersecurity incident. The materiality standard there is different from (and generally lower than) the SEC standard — it covers incidents that disrupt business operations, impair the bank’s ability to deliver services, or affect financial stability. Dual-reporting obligations apply to many financial institutions that are both SEC registrants and bank subsidiaries.


Documentation in Real Time

The most consistent failure mode in the first wave of SEC comment letters wasn’t bad judgment — it was the absence of contemporaneous documentation. Reconstructed timelines, after-action summaries written two weeks after the incident, and gap-filled narratives don’t establish that you made a thoughtful, timely decision.

During triage, the incident record should be capturing in real time:

  • Detection timestamp and source (SIEM alert, external report, employee notification)
  • Affected systems, data types, and initial scope estimate
  • Analyst initial classification with stated rationale
  • Escalation notifications with timestamps and responses
  • Containment actions taken, by whom, and when
  • Materiality assessment trigger (when the determination process began)
  • Key facts considered in the materiality analysis
  • Final determination with names, dates, and rationale

This documentation isn’t just for the SEC. It’s your forensic chain of custody, your regulatory exam artifact, and your litigation evidence. Teams that treat the incident ticket as a technical log and handle escalation through Slack are creating a documentation gap that becomes costly when the regulators come asking.


Common Triage Failures (and Where They Show Up)

1. The “wait for more data” delay spiral. The investigation needs more time before escalating. Then a bit more. Before long, four business days have passed from the materiality determination and the filing is late. Set hard deadlines for escalation triggers regardless of investigation completeness.

2. Severity inflation pressure from business units. “If we call this a P1, we have to notify the board and the CEO will panic.” Severity ratings must be insulated from organizational pressure. Pre-define tiers in policy so the analyst isn’t making a judgment call about executive reactions.

3. Treating “not yet confirmed” as “not material.” The SEC standard doesn’t require certainty — it requires reasonable assessment. An incident that will likely be material once investigation confirms scope cannot be held in limbo indefinitely while investigation continues.

4. No backup for the person who knows the escalation path. The analyst who knows which escalation contacts to call is on PTO. The incident response plan lives in a shared drive the on-call engineer doesn’t have access to at 2am. Run tabletop exercises specifically focused on triage — not just containment — to find these gaps.


So What?

The triage decision is where incident response and regulatory compliance intersect. Getting severity wrong delays the right response. Getting the materiality determination wrong — in either direction — creates SEC enforcement exposure. And failing to document either decision in real time turns a manageable incident into an examiner finding.

The SEC’s clarifying guidance from May 2024 and the first-year filing analysis from Greenberg Traurig both point to the same underlying problem: companies that haven’t built the decision infrastructure before an incident happens. Severity tiers without dollar thresholds. Escalation paths with no backup contacts. Materiality processes with no cross-functional ownership.

Build the framework before the alert fires. When it does, you’ll be making one decision, not inventing a process.

The RiskTemplates Incident Response & Breach Notification Kit includes incident response playbooks with built-in severity classification tiers, a materiality decision worksheet for SEC purposes, escalation protocol templates, and breach notification timelines for all 50 states — plus tabletop exercise scenarios to test your triage process before an incident occurs.


Further Reading

Sources:

Frequently Asked Questions

What is the SEC 4-day reporting clock for cybersecurity incidents?
Under the SEC's cybersecurity disclosure rules (adopted July 2023, effective December 2023 for large accelerated filers), public companies must file a Form 8-K under Item 1.05 within four business days of determining that a cybersecurity incident is material. The critical nuance: the four-day clock starts when materiality is determined — not when the incident is discovered or contained. A company could discover a breach on Day 1, conduct an investigation through Day 10, determine materiality on Day 11, and still have four business days from Day 11 to file. The SEC's Division of Corporation Finance clarified in May 2024 that Item 1.05 should only be used for incidents that have been determined to be material. Non-material incidents may be voluntarily disclosed under Item 8.01.
What makes a cybersecurity incident material for SEC purposes?
The SEC applies the same materiality standard used across securities law: information is material if there is a substantial likelihood that a reasonable investor would consider it important in making an investment decision, or if it would significantly alter the 'total mix' of available information. There is no bright-line dollar threshold. The assessment must consider both quantitative factors (financial impact, revenue disruption, remediation costs) and qualitative factors (harm to reputation or brand, damage to customer or vendor relationships, litigation risk, regulatory investigation exposure, competitive impact). A breach involving a small number of records but high-profile customers or trade secret exposure could be material even without significant financial impact.
What severity levels should an incident response program use?
Most programs use a four- or five-tier severity classification: Critical (P1) — active attack on production systems, significant data exfiltration in progress, or confirmed material business impact requiring immediate executive escalation; High (P2) — contained breach or significant vulnerability exploitation requiring rapid response, but no confirmed material impact yet; Medium (P3) — anomalous activity requiring investigation, policy violation, or limited-scope impact; Low (P4) — informational alerts, minor policy issues, or precautionary investigations. The CISA National Cyber Incident Scoring System (NCISS) provides a federal reference framework. Whatever tiers you use, the definitions must be calibrated in concrete business terms — financial thresholds, affected system categories, data types involved — not just abstract descriptions like 'significant impact.'
Who should make the materiality determination for SEC purposes?
The SEC guidance is clear that materiality determinations should involve senior legal counsel, CFO or equivalent, and the CISO or security leadership — not be made unilaterally by the security team or, worse, default to 'not material' by inaction. The materiality analysis must consider multiple business dimensions: operations, finance, legal, customer relationships, reputation, and regulatory exposure. A cross-functional Incident Response Decision Committee (or equivalent) should own this decision, with a documented deliberation process and a recorded vote or sign-off. The process matters as much as the outcome — SEC comment letters in 2024 specifically called out companies that lacked documented internal escalation and decision-making procedures.
What's the difference between an incident and a security event?
A security event is any observable occurrence in an information system or network. An incident is a security event that has actually or potentially compromised confidentiality, integrity, or availability — or violated a security policy. NIST SP 800-61 Rev. 3 makes this distinction explicit. Effective triage starts with this question: has this event crossed the threshold into an incident? Most SOC alerts are events. Triage's first job is to identify the minority that are incidents, then classify them by severity. Organizations that treat every alert as a potential material incident burn out their teams and desensitize leadership to real escalations — the 'boy who cried wolf' dynamic that contributed to several delayed disclosures in the first year of SEC 8-K filings.
What documentation should be created during incident triage?
Triage documentation should capture: initial detection timestamp and source, affected systems and data types (at first assessment), analyst name and initial severity classification, evidence preserved and chain of custody, notifications made and to whom (with timestamps), any containment actions taken, the escalation path and who was notified at each tier, and the basis for any materiality determination or non-determination. For public companies, this documentation is not just operational — it becomes evidence in any SEC enforcement proceeding. The SEC's first wave of 8-K comment letters in 2024 focused heavily on companies that couldn't produce coherent timelines of their internal decision-making. If your triage process doesn't generate a written trail in real time, you don't have a triage process.
Rebecca Leung

Rebecca Leung

Rebecca Leung has 8+ years of risk and compliance experience across first and second line roles at commercial banks, asset managers, and fintechs. Former management consultant advising financial institutions on risk strategy. Founder of RiskTemplates.

Related Framework

Incident Response & Breach Notification Kit

Step-by-step incident response playbooks and breach notification templates for all 50 states.

Immaterial Findings ✉️

Weekly newsletter

Sharp risk & compliance insights practitioners actually read. Enforcement actions, regulatory shifts, and practical frameworks — no fluff, no filler.

Join practitioners from banks, fintechs, and asset managers. Delivered weekly.