Cyber Risk Transparency Practices: An Analysis of CAC 40 Companies’ Annual Reports
Une analyse des rapports annuels des entreprises du CAC 40
Keywords:
Cyber risks, cybersecurity, transparency, scoring grid, annual reportAbstract
Cyber risk disclosure is an essential transparency lever for publicly traded companies, particularly since the European Securities and Markets Authority (ESMA) has tightened its requirements. This study analyzes the compliance of CAC 40 companies' annual reports with these new standards, between 2019 and 2022, by developing a specific evaluation grid. Our results highlight recent progress, but also persistent heterogeneity in cyber risk disclosure, as CAC40 companies do not always follow these transparency standards. Few studies have proposed criteria for assessing cyber risk disclosure, especially in a European context. By opening up this issue to the field of information systems management, our research highlights the key role of regulation in reducing information asymmetry, raising stakeholder awareness and building investor confidence. It thus provides a useful analytical tool for researchers and cybersecurity professionals to help companies move towards greater transparency and better governance of information systems.
References
Abraham, S., & Shrives, P. J. (2014). Improving the relevance of risk factor disclosure in corporate annual reports. British Accounting Review, 46(1), 91–107.
Amar, W. B., & Boujenoui, A. (2008). Transparence de l'information au sujet des pratiques de gouvernance d'entreprise au Canada. Comptabilité-Contrôle-Audit, 14(1), 169-190.
Amir, E., Levi, S., & Livne, T. (2018). Do Firms Underreport Information on Cyber-Attacks? Evidence from Capital Markets. Review of Accounting Studies, 23, 1177–1206.
Ashraf, M., Jiang, J. (Xuefeng), & Wang, I. Y. (2022). Are there trade-offs with mandating timely disclosure of cybersecurity incidents? Evidence from state-level data breach disclosure laws. The Journal of Finance and Data Science, 8, 202–213. https://doi.org/10.1016/j.jfds.2022.08.001
Bansal, & Axelton, Z. (2023). Impact of Cybersecurity Disclosures on Stakeholder Intentions. The Journal of Computer Information Systems, 1–14. https://doi.org/10.1080/08874417.2023.2180785
Bae, S., Masud, M., & Kim, J. (2018). A Cross-Country Investigation of Corporate Governance and Corporate Sustainability Disclosure: A Signaling Theory Perspective. Sustainability, 10(8), 2611-. https://doi.org/10.3390/su10082611
Baillette, P., Barlette, Y., & Berthevas, J. F. (2022). Intérêts et risques de la Shadow IT dans le domaine de la santé: Une revue narrative de la littérature. Systèmes d'information et management, 27(2), 35-35.
Barlette, Y., Gundolf, K., & Jaouen, A. (2017). CEO’s information security behaviour in SMEs: Does ownership matter? Systèmes d’Information et Management, 22(3), 7–45.
Barlette, Y., & Jaouen, A. (2019). Information security in SMEs: determinants of CEOs’ protective and supportive behaviors. Systèmes d’information et Management, 24(3), 7–40. https://doi.org/10.3917/sim.193.0007
Benaroch, M., & Fink, L. (2021). No Rose without a thorn: Board IT competence and market reactions to operational IT failures. Information & Management, 58(8), 103546.
Boncori, A. L., & Cadet, I. (2013). Le comply or explain, un avatar de l'accountability. Revue française de gestion, (8), 35-55.
Calderon, & Gao, L. (2022). Changes in corporate cybersecurity risk disclosures after SEC comment letters. Journal of Accounting and Public Policy, 41(5), 106993–. https://doi.org/10.1016/j.jaccpubpol.2022.106993
Cecchini, Mark, Haldun Aytug, Gary J. Koehler, and Praveen Pathak (2010). “Making Words Work: Using Financial Text as a Predictor of Financial Events.” Decision Support Systems 50 (1): 164–75. https://doi.org/10.1016/j.dss.2010.07.012.
Chen, J., Henry, E. & Jiang, X. (2023). Is Cybersecurity Risk Factor Disclosure Informative? Evidence from Disclosures Following a Data Breach. Journal of Business Ethics. 187, 199–224. https://doi.org/10.1007/s10551-022-05107-z
Cheong, Yoon, K., Cho, S., & No, W. G. (2021). Classifying the Contents of Cybersecurity Risk Disclosure through Textual Analysis and Factor Analysis. The Journal of Information Systems, 35(2), 179–194. https://doi.org/10.2308/ISYS-2020-031
COSO-ERM. (2017). Internal control-Integrated Framework: Compendium of Illustrative Examples. A supplement to COSO’s 2013 Internal Control - Integrated Framework. AICPA.
Dagorn, & Poussing, N. (2012). Engagement et pratiques des organisations en matière de gouvernance de la sécurité de l’information. Systèmes d’information et management, 17(1), 113–143. https://doi.org/10.3917/sim.121.0113
D’Elia, D. (2018). Industrial policy: the holy grail of French cybersecurity strategy? Journal of Cyber Policy, 3(3), 385–406. https://doi.org/10.1080/23738871.2018.1553988
Duhamel, J. C., Fasterling, B., & Refait-Alexandre, C. (2009). La transparence: outil de conciliation de la finance et du management. Revue française de gestion, (8), 59-75.
Elshandidy, T., Shrives, P. J., Bamber, M., & Abraham, S. (2018). Risk reporting: A review of the literature and implications for future research. Journal of Accounting Literature, 40, 54–82.
EUR-Lex, Cybersécurité des réseaux et des systèmes d'information, consulté le Juillet 26, 2024.
EUR-Lex, Regulation of the European Parliament and of the Council of 14 December 2022 on digital operational resilience for the financial sector, consulté 26 Juillet, 2024.
European Securities and Monetary Authority. (2019). Guidelines on Risk Factors under the Prospectus Regulation, 43.
Février, R. (2020). Covid-19 et cyberattaques. Revue française de gestion, 293. 81-94.
Franceinfo, Ce que l’on sait de la cyberattaque qui a touché France Travail. consulté le 24 Juillet, 2024.
Franceinfo, Panne informatique mondiale. consulté le 24 Juillet, 2024.
Frank, M.L., Grenier, J.H., Pyzoha, J.S., & Zielinski N.B. (2023). Implications of Enhanced Cybersecurity Risk Management Reporting and Independent Assurance. Current issues in auditing, 17(1), 11–18.
Gao, L., Calderon, T. G., & Tang, F. (2020). Public companies’ cyber risk disclosures. International Journal of Accounting Information Systems, 38.
Gordon, L.A., Loeb, M.P. & Sohail, T., 2010. Market value of voluntary disclosures concerning information security. MIS Quarterly, 34 (3), 567–594.
Granados, N. F., & Gupta, A. (2013). Competing with Information in a Digital World. MIS Quarterly, 37(2), 637-641.
Gupta, R., Biswas, B., Biswas, I., & Sana, S. S. (2021). Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach. Information & Computer Security, 29(1), 73–104. https://doi.org/10.1108/ICS-02-2020-0028
Habib, A., & Hasan, M. M. (2020). Business strategies and annual report readability. Accounting & Finance, 60(3), 2513-2547.
Hellemann, N. (2023). Normalising radical transparency in cyber security. Computer Fraud & Security, 2023(6). https://doi.org/10.12968/S1361-3723(23)70025-0
Héroux, S., & Fortin, A. (2020). Cybersecurity Disclosure by the Companies on the S&P/TSX 60 Index. Accounting Perspectives, 19(2), 73-100.
Héroux, S. & Fortin, A. (2022). Board of directors’ attributes and aspects of cybersecurity disclosure. Journal of Management and Governance. 1-46.
Humpherys, S. L., Moffitt, K. C., Burns, M. B. Burgoon, J. K., & Felix, W. F.. (2011). “Identification of Fraudulent Financial Statements Using Linguistic Credibility Analysis.” Decision Support Systems 50 (3): 585–94. https://doi.org/10.1016/j.dss.2010.08.009.
Jensen, M. C., & Meckling, W. H. (1976). Theory of the firm: Managerial behavior, agency costs and ownership structure. Journal of financial economics, 3(4), 305-360.
Johnson, W., Ferber, S. & Hanson, M. (2021). SEC Returns Spotlight to Cybersecurity Disclosure Enforcement, Harvard Law School Forum on Corporate Governance.
Joshi, A., Bollen, L., Hassink, H., De Haes, S., & Van Grembergen, W. (2018). Explaining IT governance disclosure through the constructs of IT governance maturity and IT strategic role. Information & Management, 55(3), 368–380.
Kvochko, E., & Pant, R. (2015). Why data breaches don’t hurt stock prices. Harvard Business Review.
Li, F. (2008). Annual report readability, current earnings, and earnings persistence. Journal of Accounting and Economics, 45(2-3), 221–247.
Li, No, W. G., & Wang, T. (2018). SEC’s cybersecurity disclosure guidance and disclosed cybersecurity risk factors. International Journal of Accounting Information Systems, 30, 40–55. https://doi.org/10.1016/j.accinf.2018.06.003
Linsley, P. M., & Shrives, P. J. (2006). Risk reporting: A study of risk disclosures in the annual reports of UK companies. British Accounting Review, 38(4), 387–404.
Loughran, T., & McDonald, B. (2014). Measuring readability in financial disclosures. The Journal of Finance. 1643‑1671.
Magnusson, C., Arppe, A., Eklund, T., Back, B., Vanharanta, H. & Visa, A.. 2005. “The Language of Quarterly Reports as an Indicator of Change in the Company’s Financial Status.” Information and Management 42 (4): 561–74. https://doi.org/10.1016/j.im.2004.02.008.
Mazumder, M. M. M., & Hossain, D. M. (2023). Voluntary cybersecurity disclosure in the banking industry of Bangladesh: does board composition matter? Journal of Accounting in Emerging Economies, 13(2), 217–239. https://doi.org/10.1108/JAEE-07-2021-0237
Miller, G. A. (1956). The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological review, 63(2), 81.
Ntim, C. G., Lindop, S., & Thomas, D. A. (2013). Corporate governance and risk reporting in South Africa. International Review of Financial Analysis, 30, 363–383.
Patterson, C. M., Nurse, J. R. C., & Franqueira, V. N. L. (2024). “I don’t think we’re there yet”: The practices and challenges of organisational learning from cyber security incidents. Computers & Security, 139, 103699-. https://doi.org/10.1016/j.cose.2023.103699
Posey, C. , Bennett, R.J. & Roberts, T.L., 2011. Understanding the mindset of the abusive insider: an examination of insiders’ causal reasoning following internal security changes. Computer & Security, 30(4), 86–4 97.
Pras, B., & Zarlowski, P. (2013). Obligation de rendre des comptes. Revue française de gestion, (8), 13-32.
Radu, C., & Smaili, N. (2022). Board gender diversity and corporate response to cyber risk: evidence from cybersecurity related disclosure. Journal of Business Ethics, 177(2), 351-374.
Ramírez, M., Rodríguez Ariza, L., Gómez Miranda, M. E., & Vartika. (2022). The Disclosures of Information on Cybersecurity in Listed Companies in Latin America—Proposal for a Cybersecurity Disclosure Index. Sustainability, 14(3), 1390-. https://doi.org/10.3390/su14031390
Richardson, V. J., Smith, R. E., & Watson, M. W. (2018). Much Ado about Nothing: The (lack of) economic impact of data privacy breaches. Journal of Information Systems, 33(3), 227–265.
Safi, R., Browne, G., & Naini, A. J. (2021). Mis-spending on information security measures: Theory and experimental evidence. International Journal of Information Management, 57(1), 102291.
Securities and Exchange Commission (2018), Commission Statement and Guidance on Public Company Cybersecurity Disclosures, 1-24.
Securities and Exchange Commission (2023), Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure, 1-186.
Simon, M., & Looten, V. (2020). Description of Data Breaches Notifications in France and Lessons Learned for the Healthcare Stakeholders. Studies in Health Technology and Informatics, 275, 192–196. https://doi.org/10.3233/SHTI200721
Soomro, A., Shah, M. H., & Lancashire, J. A. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215–225.
Stone G., & Parker L.D. (2013). Developing the Flesch reading ease formula for the contemporary accounting communications landscape. Qualitative Research in Accounting & Management. 10(1), 31-59.
Strupczewski, Grzegorz. (2021). Defining cyber risk. Safety Science. 135.
Wang, Yen, J.-C., & Yoon, K. (2022). Responses to SEC comment letters on cybersecurity disclosures: An exploratory study. International Journal of Accounting Information Systems, 46, 100567–. https://doi.org/10.1016/j.accinf.2022.100567
Zimmermann, V., & Renaud, K. (2021). The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions. ACM Transactions on Computer-Human Interaction, 28(1), 1–45. https://doi.org/10.1145/3429888
Published
How to Cite
Issue
Section
License
The author bears the responsibility for checking whether material submitted is subject to copyright or ownership rights (e.g. figures, tables, photographs, illustrations, trade literature and data). The author will need to obtain permission to reproduce any such items, and include these permissions with their final submission.
It is our policy to ask all contributors to transfer for free the copyright in their contribution to the journal owner. There are two broad reasons for this:
- ownership of copyright by the journal owner facilitates international protection against infringement of copyright, libel or plagiarism;
- it also ensures that requests by third parties to reprint or reproduce a contribution, or part of it, in either print or electronic form, are handled efficiently in accordance with our general policy which encourages dissemination of knowledge within the framework of copyright.
In conformity with the French law, the author keeps the 'moral rights' related to the article:
- The 'authorship right': It is the author's right to have his name associated with each publication and exploitation of the article.
- The 'integrity right': It can be claimed by the author if he finds that during an exploitation, his work has been distorted (cutting, reassembly...).

