How RIAs can strengthen cybersecurity compliance

How RIAs can strengthen cybersecurity compliance
Find out how recent changes in cybersecurity compliance rules impact how RIAs handle sensitive investor data
AUG 19, 2025

RIAs have become a prime target for cybercriminals due to the sensitivity of data they hold and the value of assets they manage. If successful, a cyberattack often results in devastating losses not just for advisory firms but also for their clients.   

To protect investors and maintain market integrity, the SEC has imposed strict cybersecurity compliance rules for financial institutions. Among these is Regulation S-P, which was amended recently.  

In this guide, we’ll discuss what these changes mean for your RIA and what you can do to remain compliant. We also talked to an industry expert who shared insights into the most important aspects of SEC’s new regulations. 

What is Regulation S-P and what does it mean for RIAs? 

Regulation S-P is a rule established by the Securities and Exchange Commission (SEC) governing how financial institutions, including RIAs, handle sensitive costumer information. Also called the Privacy of Consumer Financial Information rule, it is designed to protect private client data against unauthorized access, misuse, and theft. 

Regulation S-P requires financial institutions to:  

  • send clients privacy notices explaining their information-sharing practices 

  • provide customers with an opt-out mechanism for certain disclosures, limiting the sharing of their personal information to non-affiliated third parties 

  • implement written policies and procedures to safeguard private client records and information 

  • establish procedures for the proper disposal of consumer report information 

For RIAs, protecting sensitive customer information is not just a matter of regulatory compliance; it is also key to building trust and improving reputation. The recent spate of cyberattacks, however, has prompted the SEC to make amendments to the S-P rule.  

Get more information about cybersecurity compliance by visiting our Technology News Section. Don’t forget to bookmark this page for easy access to breaking news and the latest industry updates.  

What are the changes to Regulation S-P? 

In May 2024, the SEC finalized the changes to Regulation S-P, which have major implications on cybersecurity compliance. According to the SEC, these updates are designed to “modernize and enhance the protection of consumer financial information.”  

Here are some of the key amendments to the rule and what they mean for RIAs: 

Incident response program 

RIAs must develop and maintain written policies and procedures for an incident response plan. The program must be “reasonably designed to detect, respond to, and recover from unauthorized access to or use of customer information.” 

The program must also have these core elements: 

  • assessment of incidents involving unauthorized access to client data  
  • measures to contain the data breach  
  • steps for notifying clients if their private information is compromised 

Breach notification procedures 

Firms must notify individuals “whose sensitive customer information was, or is reasonably likely to have been, accessed, or used without authorization.” The table details what can be considered sensitive client data under Regulation S-P: 

Table listing what are considered as sensitive client data under SEC's cybersecurity compliance rules

RIAs must also notify affected clients of the data breach within 30 days after it was first detected, unless a waiver applies. The notifications must include:  

  • the nature and date of the incident 
  • the type of sensitive customer information breached 
  • the firm’s contact information 

Even a suspected data breach can trigger notification requirements under the new Regulation S-P.   

Service provider oversight 

As part of their incident response programs, firms must have procedures for managing service providers, including due diligence and monitoring. This is aimed at ensuring providers are managing potential privacy risks effectively.  

Expanded scope of safeguards and disposal rules 

The 2024 Regulation S-P broadened the definition of “customer information” to include any record containing non-public personal information (NPI) about a client. This is regardless of whether the records are on paper, digital, or other forms.  

Firms must also keep written records detailing their compliance with the safeguards and disposal rules. For RIAs, the retention period is five years; certain records must be easily accessible for the first two years.  

Compliance dates 

The compliance period varies depending on the firm’s size:  

Size 

Assets under management 

Compliance date 

Larger RIAs 

$1.5 billion or more  

December 2025 

Smaller RIAs 

Less than $1.5 billion 

June 2026 

  So, what are the most important aspects of the SEC’s new cybersecurity regulation that RIAs must pay attention to? Jonathan Addington, president of CyberSecureRIA, points out “three non-negotiables:” 

  • written cybersecurity policies 
  • 30-day customer breach notifications 
  • complete vendor accountability  

“The SEC is done with handshake agreements and informal procedures – they want everything documented and provable,” Addington explains. “Here's the kicker: you can outsource IT tasks, but you can't outsource liability. Your cloud provider's security failure becomes your compliance nightmare.”  

Part of maintaining cybersecurity compliance is building an effective RIA tech stack. This guide shows you how.  

How can RIAs maintain cybersecurity compliance under SEC rules? 

The SEC’s cybersecurity rules are designed to better prepare financial firms against looming cyber threats. While compliance can be complicated, there are practical ways for RIA firms to meet new requirements.  

Here’s a step-by-step guide: 

Step 1: Do an in-depth risk assessment 

To create an effective cybersecurity compliance program, the first step is identifying and evaluating potential risks. Begin with an inventory of your digital assets, including hardware, software, and data. Assess vulnerabilities and document your findings. Prioritize cyber risks based on potential losses and come up with steps to safeguard against them.  

“If you don't know where your data is, you can't protect it,” Addington says. “Start with a comprehensive inventory of every piece of client information and implement technical controls like multi-factor authentication and endpoint detection.” 

Step 2: Develop and maintain written policies and procedures 

Your policies and procedures must align with the findings of your risk assessment. These must be as detailed and clear as possible. Be sure that your policies cover all aspects of your cybersecurity program. Some key areas include:  

  • access controls: limiting access to sensitive data and systems to authorized personnel 

  • data encryption: encrypting private data both at rest and in transit 

  • password management: implementing strong password policies and multi-factor authentication (MFA) 

  • malware protection: using anti-malware software and keeping it updated 

  • phishing awareness training: educating employees about phishing scams and how to identify them 

  • incident response plan: having a documented program for responding to cybersecurity incidents, including notification procedures and data recovery 

  • business continuity and disaster recovery: ensuring that the firm can continue operations in the event of a cyberattack  

“The SEC doesn't want to hear about your cybersecurity program – they want to see it in writing,” Addington says. “Develop tested incident response plans and conduct rigorous vendor due diligence with SOC 2 reports and contractual security commitments. Documentation isn't just good practice anymore; it's your get-out-of-jail-free card during an SEC examination.” 

It is also important to review your procedures regularly and update them as new cybersecurity threats emerge.  

Step 3: Boost incident response readiness 

Your incident response plan must provide detailed steps for detecting and responding to a cyberattack. It must also establish a clear process for determining which incidents require reporting to the SEC and how these should be reported. It also helps to test your incident response plan regularly through tabletop exercises. 

Step 4: Strengthen vendor management 

Practice due diligence when choosing a service provider. Find out if they have sufficient cybersecurity controls in place. It helps to include cybersecurity compliance requirements, including breach notifications, in vendor contracts. Have a plan ready for addressing vendor-related cyberattacks.  

Step 5: Establish continuous training and monitoring 

To maintain compliance, your RIA firm needs to monitor your cybersecurity status regularly. This includes conducting vulnerability assessments and penetration testing. You also need to provide employees with ongoing training to increase awareness of evolving cyber risks.  

Performing a cyber mock audit is a good strategy that’s often underutilized. This lets your firm identify the strengths and weaknesses of your cybersecurity program. It also allows you to correct gaps before getting a regulatory audit.   

The SEC does annual reviews of cybersecurity programs, so take steps to ensure that your firm remains compliant.  

Step 6: Keep records accurate and secure 

Regulation S-P requires RIAs to maintain accurate records of all cybersecurity activities. These include: 

  • policies and procedures 
  • risk assessments 
  • incident response plan 
  • vendor due diligence 

Make sure that your recordkeeping practices comply with SEC requirements.  

Here’s a downloadable checklist of the steps on how to make your RIA cyber-compliant: 

Downloadable checklist of cybersecurity compliance steps for RIAs  

Having the right tools is also key to maintaining cybersecurity compliance. Among these is RIA in a Box. Find out if the platform fits your business’ needs in this review.  

What other cybersecurity regulations must RIAs comply with? 

There are a few more rules that the SEC has imposed to protect investors and ensure that RIAs are prepared to address cybersecurity threats. These include: 

SEC Rule 206(4)-7 

Also known as the Investment Adviser Compliance Program Rule, this requires RIAs to develop and maintain written compliance policies and procedures. These include measures to protect client data and prevent cyber breaches.  

Regulation S-ID 

Also known as the Identity Theft Red Flags Rule, this requires RIA firms to develop and implement a program to detect, prevent, and mitigate identity theft. Rule 201, in particular, states that firms must implement an identity theft prevention program (ITPP) related to the opening or maintenance of covered accounts. 

Compliance is among the hallmarks of a top wealth management team. Get to know America’s most distinguished firms in the industry in this special report.  

Why is cybersecurity important for RIAs? 

RIAs handle sensitive client information, making them attractive targets for hackers.  

“RIAs are sitting on a goldmine of sensitive data that cybercriminals desperately want – Social Security numbers, account details, and complete financial profiles,” Addington explains. “To boot: this is often data on the wealthiest individuals!”  

He adds that unlike many businesses, RIAs act as fiduciaries with a legal obligation to protect client interests, which extends to safeguarding their data. 

“A single breach can destroy decades of trust and trigger regulatory penalties. With the SEC's updated Regulation S-P amendments, cybersecurity has moved from 'nice to have' to 'must have;' it's now both a legal requirement and a business survival issue.” 

For more information on cybersecurity compliance and SEC regulations, subscribe to InvestmentNews+. Here, you can access premium content, data, and investment analysis. 

Latest News

Ric Edelman, ex-Orion CEO Eric Clarke join board for TaxStatus
Ric Edelman, ex-Orion CEO Eric Clarke join board for TaxStatus

Two longtime RIA industry figures have joined the board of directors at TaxStatus, a fintech company that garners thousands of IRS data points on clients to share with advisors for improved financial planning oversight and time savings.

Andy Sieg faces internal HR investigation into conduct at Citigroup: Report
Andy Sieg faces internal HR investigation into conduct at Citigroup: Report

Sieg, 58, was head of Merrill Wealth Management, left in 2023 and returned that September to Citigroup, where he worked before being hired by Merrill Lynch in 2009.

Advisor moves: Wells Fargo FiNet, LPL Financial, Raymond James, Janney, Ameriprise
Advisor moves: Wells Fargo FiNet, LPL Financial, Raymond James, Janney, Ameriprise

Firms announce new recruits including wirehouse breakaways.

Ashton Thomas-linked Amplify debuts QuantumRisk to help RIAs weather market shocks
Ashton Thomas-linked Amplify debuts QuantumRisk to help RIAs weather market shocks

"QuantumRisk, by design, recognizes that these so-called "impossible" events actually happen, and it accounts for them in a way that advisors can see and plan for," Dr. Ron Piccinini told InvestmentNews.

Turning conversations into clients: Attract prospects and gain new clients with these five strategies
Turning conversations into clients: Attract prospects and gain new clients with these five strategies

Advisors who invest time and energy on vital projects for their practice could still be missing growth opportunities – unless they get serious about client-facing activities.

SPONSORED How advisors can build for high-net-worth complexity

Orion's Tom Wilson on delivering coordinated, high-touch service in a world where returns alone no longer set you apart.

SPONSORED RILAs bring stability, growth during volatile markets

Barely a decade old, registered index-linked annuities have quickly surged in popularity, thanks to their unique blend of protection and growth potential—an appealing option for investors looking to chart a steadier course through today's choppy market waters, says Myles Lambert, Brighthouse Financial.