The U.S. Securities and Exchange Commission has filed civil charges against Meridian Financial Holdings, a publicly traded financial services company, for allegedly misleading investors about the severity of a data breach disclosed in mid-2025. The enforcement action represents the most significant test of the SEC’s cybersecurity disclosure rules since they took effect in December 2023.

Case overview

AttributeDetails
DefendantMeridian Financial Holdings
Individual defendantsCISO David Rourke, General Counsel Patricia Hanover
Breach discoveryApril 2025
Records compromised~14.2 million customers
Filing dateJanuary 17, 2026
Stock impact-12% after-hours

What the SEC alleges

According to the SEC’s complaint, Meridian discovered a breach of its customer data systems in April 2025 that compromised the personally identifiable information of approximately 14.2 million customers, including Social Security numbers, financial account details, and transaction histories.

Disclosure vs. reality

What was disclosedWhat was true
”Limited subset of customer records”14.2 million customers affected
”Primarily contact information”SSNs, financial data, transaction histories
No mention of SSNsFull Social Security numbers exposed
No mention of financial dataBank accounts and transaction details compromised

The SEC alleges that Meridian’s CISO and General Counsel were both aware of the full scope of the breach at the time the 8-K was filed. Internal communications obtained during the investigation reportedly show executives discussing the decision to minimize the disclosed impact to avoid stock price volatility ahead of a planned secondary offering.

“Companies that downplay the severity of a breach to protect their stock price are engaging in securities fraud, plain and simple.” — SEC Acting Chair Jaime Lizárraga

Prior SEC cybersecurity enforcement

The Meridian charges follow a pattern of increasingly aggressive SEC enforcement on cyber disclosures.

October 2024 enforcement actions

CompanyPenaltyAllegation
Unisys Corp.$4 millionMisleading disclosures + disclosure control violations
Avaya Holdings$1 millionMisleading cyber disclosures
Check Point$995,000Misleading cyber disclosures
Mimecast$990,000Misleading cyber disclosures

All four companies were impacted by the SolarWinds Orion compromise. The SEC found they “downplayed the extent of a material cybersecurity breach” by framing known risks “hypothetically or generically when the companies knew the warned of risks had already materialized.”

Key findings from October 2024 cases

CompanySpecific issue
UnisysDescribed cyber risks as hypothetical despite knowing two SolarWinds-related intrusions had occurred
UnisysExfiltration of gigabytes of data not disclosed
AvayaMinimized known incident scope
Check PointGeneric risk language despite specific knowledge
MimecastSimilar pattern of understating known risks

SolarWinds case evolution

DateDevelopment
October 2023SEC files charges against SolarWinds and CISO Timothy Brown
July 2024Federal judge dismisses portions of the case
November 20, 2025SEC voluntarily dismisses remaining claims with prejudice

The SolarWinds dismissal in late 2025 marked a significant shift. It was the first SEC cybersecurity enforcement action against an individual CISO and the first to assert accounting control claims based on technical cybersecurity failings. The SEC’s decision to drop the case signals a change in enforcement philosophy under new leadership.

Shifting enforcement landscape

The SEC under Chairman Paul Atkins (appointed April 2025) has signaled a different approach than the prior administration.

Leadership transition

FactorChange
ChairmanPaul Atkins (April 2025)
PhilosophyFocus on “genuine harm” to investors
Criticism of prior approachLarge corporate fines unfairly penalize shareholders
Core mission”Hold accountable those who lie, cheat, and steal”

2025-2026 enforcement priorities

Focus areaStatus
Cybersecurity disclosuresStill active, but refined
Material misrepresentationsPrimary focus
Pre-breach security posture claimsReduced emphasis
Post-incident disclosure accuracyIncreased emphasis
Investor harmRequired for enforcement

“Consistent with Atkins’ stated goal of focusing on ‘genuine harm,’ the SEC is expected to continue to police material cybersecurity misrepresentations and omissions that led to investor harm.” — Cleary Gottlieb 2025 Year-in-Review

Cyber and Emerging Technologies Unit

The SEC created a Cyber and Emerging Technologies Unit (CETU) focused on:

  • Public issuer fraudulent disclosure relating to cybersecurity
  • Combating misconduct in emerging technology areas
  • Investigating material misrepresentations that harm investors

How the disclosure rules work

The SEC’s cybersecurity disclosure rules (adopted July 2023, effective December 18, 2023):

8-K requirements

RequirementDeadline
Material incident disclosure4 business days after materiality determination
Nature of incidentMust be described
Scope of incidentMust be described
Timing of incidentMust be described
Material impactMust be described

10-K requirements

Annual disclosureContent
Risk managementDescription of cybersecurity program
StrategyHow cyber risk affects business strategy
GovernanceBoard oversight description
Management roleWho assesses and manages cyber risk

Charges and potential penalties

ChargeBasis
Securities fraudSection 10(b) and Rule 10b-5
Disclosure control violationsSection 13(a)
Aiding and abettingAgainst individual defendants

Sought remedies

RemedyTarget
Disgorgement of profitsCorporate and individual
Civil monetary penaltiesPotentially hundreds of millions
Officer-and-director barsBoth individual defendants

Meridian issued a statement saying it “disagrees with the SEC’s characterization of events” and intends to “vigorously defend” against the allegations.

Cumulative enforcement context

SEC FY2025 enforcement activity

The SEC announced record enforcement actions in the first quarter of fiscal year 2025, signaling continued aggressive posture on disclosure violations.

MetricStatus
Q1 FY2025 enforcementRecord levels
Cybersecurity focusMaintained
Individual accountabilityEmphasized
Investor harm requirementPrimary criterion

Cases under review

The Division of Enforcement is reportedly reviewing more than a dozen cases involving potentially misleading breach notifications filed since December 2023.

Implications for security leaders

Incident response process changes

AreaRecommendation
Materiality determinationsDocument thoroughly with clear rationale
Internal communicationsTreat as potential evidence from day one
CISO involvementEnsure not pressured to minimize findings
Board oversightDocument disclosure decisions
Legal reviewIndependent review of technical findings

CISO liability considerations

DevelopmentImpact
SolarWinds precedentCISOs named individually in SEC actions
Meridian chargesExtended to post-incident disclosures
D&O insuranceMany policies now explicitly cover CISOs
IndemnificationOrganizations updating agreements

“Every CISO I know is watching this case. The message is clear: if you know the breach is bad and you sign off on a disclosure that says otherwise, you are personally on the hook.” — Jake Williams, former NSA hacker and cybersecurity consultant

Industry response

PerspectivePosition
Pro-enforcementNecessary for investor transparency
CautiousMay discourage CISOs from disclosure roles
LegalPost-incident disclosure cases easier to prove
PracticalDocumentation requirements increasing

2026 outlook

TrendLikelihood
More post-incident disclosure casesHigh
Individual CISO chargesModerate
Large corporate penaltiesHigh
Focus on investor harmRequired
Pre-breach posture casesReduced

Enforcement philosophy

Prior approachCurrent approach
Broad cybersecurity program claimsFocus on specific misrepresentations
Proactive security posture assertionsPost-incident disclosure accuracy
Technical security failingsMaterial impact on investors
Internal controlsFraudulent disclosure

Recommendations

For public companies

PriorityAction
ImmediateReview incident response disclosure procedures
HighEnsure legal independence in materiality determinations
HighDocument all disclosure decisions and rationale
OngoingTrain executives on disclosure obligations
CriticalPreserve all communications during incidents

For CISOs

PriorityAction
ImmediateReview D&O insurance coverage
HighEstablish clear escalation procedures
HighDocument technical findings independently
OngoingUnderstand personal liability exposure
CriticalDo not sign off on disclosures you believe are inaccurate

Disclosure best practices

PracticeRationale
Err toward disclosureUnderstatement creates liability
Update as facts emergeInitial filings can be amended
Document materiality analysisShow good faith process
Separate technical from legalIndependent assessments
Board involvementDemonstrates governance

Context

The Meridian case establishes that the SEC will pursue enforcement not just for inaccurate pre-breach security claims, but for misleading post-incident disclosures. The combination of individual liability and substantial corporate penalties creates strong incentives for accurate, complete disclosure.

RealityImplication
Post-incident cases easier to proveHigher enforcement risk
Individual liability establishedPersonal exposure for executives
Documentation is evidenceEvery email matters
Investor harm is keyTie disclosure to material impact

The shift under Chairman Atkins—emphasizing “genuine harm” and the SEC’s core mission—suggests enforcement will focus on clear cases of misleading investors rather than technical cybersecurity program deficiencies. However, the Meridian charges demonstrate that the SEC remains willing to pursue aggressive action when companies materially misrepresent breach severity to protect stock prices.

Organizations should treat breach disclosure as a high-stakes compliance exercise requiring the same rigor applied to financial reporting.