Updated for 2026 SEC Regulation S-P Compliance

2026 Cybersecurity Checklist
for Financial Advisors

Financial advisors hold a unique fiduciary responsibility: you steward your clients' life savings and the sensitive personal data that goes with it. This checklist distills current best practices and regulatory guidance into plain-language tasks that any adviser can implement.

2,200+

Cyberattacks per day

$10.22M

Avg. U.S. breach cost

74%

Incidents involve human error

30 Days

SEC breach notification window

How to Use This Checklist

1

Assess your starting point

Complete a risk assessment before implementing controls. Document your existing policies, assets and vulnerabilities. Each firm must identify its own risks and tailor controls to its size and services.

2

Assign responsibility

Designate a senior person or team (Chief Compliance Officer, CIO or outsourced provider) to oversee cybersecurity governance and ensure policies are implemented and reviewed.

3

Customize and review

Use the following sections as a guide. Some items may already be in place; others will need to be adopted. Review the checklist at least annually and whenever regulations or business operations change.

4

Partner with experts

Katalism offers tailored assessments, security architecture, managed detection & response, and regulatory compliance services. We can help your firm implement this checklist, monitor for threats and respond quickly when incidents occur.

The Checklist

42 Tasks Across 12 Categories

1

Governance & Risk Assessment

Conduct a risk assessment

Identify critical assets (client data, account systems, trading platforms) and evaluate potential threats. The NIST CSF's Identify function stresses understanding the business context, resources and associated risks.

Map data flows and storage

Document where client information is collected, stored and transmitted — whether in CRM systems, cloud platforms or third-party custodians.

Determine regulatory obligations

Ensure compliance with SEC Regulation S-P, FINRA rules, state privacy laws and industry standards (GDPR, FTC Safeguards Rule, PCI DSS, ISO 27001). New SEC amendments require policies "reasonably designed to detect, respond to and recover from unauthorized access" and to notify customers within 30 days.

Assign a cybersecurity leader

Appoint a chief compliance or security officer or engage a qualified vendor to oversee cybersecurity strategy, incident response and compliance.

Review policies regularly

Policies should be updated at least annually or after major changes in technology or regulation.

2

Policies & Compliance

Data protection policy

Document how client data is collected, used, stored and protected. The average U.S. data breach cost is $10.22 million — a data protection policy is essential.

Acceptable use policy (AUP)

Define acceptable behavior for employees and contractors when using company systems and devices. Human error accounts for 36% of breaches; clear policies reduce risky behavior.

Incident response & disaster recovery plan

Create a written plan detailing how to identify, contain and recover from a cyber-incident and how to communicate with clients and regulators. Test regularly and include communication trees, escalation procedures and contact information.

Regulatory compliance

Ensure written policies align with SEC Regulation S-P amendments (incident response and customer notification), SEC/FINRA cybersecurity guidance, and NIST CSF. Registered investment advisers must comply with Regulation S-P by December 3, 2025 (assets ≥ $1.5 billion) or June 3, 2026 (assets < $1.5 billion).

Third-party oversight

Include clauses in contracts requiring service providers to implement security controls and notify you of breaches.

3

Identity & Access Management

Use strong passwords and multi-factor authentication (MFA)

81% of hacking-related breaches involve stolen or weak credentials. Require unique, long passwords and enforce MFA for all systems and client portals. Consider password managers.

Limit privileged access

Only grant administrators and advisors access to systems they need. Reduce privileged access and rotate service-account keys. Review permissions regularly.

Implement least-privilege & role-based access control (RBAC)

Define roles (advisor, assistant, administrator) and assign the minimum permissions needed. Regularly review and update access rights.

Control vendor and partner access

Limit third-party access to necessary data and revoke access when no longer needed.

4

Software & Patch Management

Keep software up-to-date

Regular software updates patch vulnerabilities. Configure all systems to update automatically to reduce exploitation. Prioritize patching based on active exploitation and verify coverage.

Standardize secure configurations

Apply baseline security configurations to operating systems, applications and devices and monitor for configuration drift.

Remove unused applications

Maintain an inventory of software and uninstall obsolete or unused programs to reduce the attack surface.

5

Data Protection & Encryption

Classify and encrypt sensitive data

Identify non-public personal information (NPI) and encrypt it both in transit and at rest. Use tokenization, MFA and off-site backups to protect client data even if stolen.

Secure backups

Maintain immutable, off-site or air-gapped backups and test restore procedures. Automate backup schedules and store backups separate from production systems.

Limit data retention

Only keep client information as long as necessary to meet legal and business requirements; securely destroy data when no longer needed.

6

Network & Endpoint Security

Deploy firewalls, IDS/IPS and endpoint protection

Use both hardware and software firewalls to monitor network traffic and block threats. Implement intrusion detection/prevention systems and endpoint protection with a zero-trust model.

Secure remote work and BYOD

Hybrid work environments create more entry points. Require VPN connections with strong encryption and endpoint security on all devices. Implement clear BYOD policies, enforce MDM and regularly update mobile apps.

Implement anti-malware and DNS filtering

Install reputable anti-malware on all endpoints and use DNS filtering or secure web gateways to block malicious websites.

7

Monitoring & Detection

Centralize logging and monitoring

Enable logging on identity systems, administrator actions, endpoints and cloud services and send logs to a SIEM platform for analysis.

Regularly audit, scan and test

Conduct vulnerability scans, penetration tests and third-party red-team exercises. Address findings promptly. Schedule periodic security audits to evaluate network security, access controls and encryption.

Continuous threat monitoring

Adopt threat-intelligence feeds and behavioral analytics to identify anomalies and suspicious activity. Maintain a weekly security cadence to review vulnerabilities, detection coverage and emerging threats.

8

Vendor & Third-Party Risk Management

Inventory all vendors

List every service provider (cloud hosting, CRM, payroll, custodians, IT support) and identify the data they access.

Assess vendor security

Require evidence of compliance with SOC 2, ISO 27001 or equivalent, and review policies on data protection and incident response.

Include cybersecurity clauses in contracts

Contracts should require vendors to maintain specified controls, allow audits and promptly notify you of security incidents.

Restrict vendor access

Grant vendors only the minimum privileges needed, monitor their activities and terminate access when no longer required.

9

Employee Training & Human Risk Management

Conduct regular security awareness training

Since human error contributes to 74% of incidents, training is critical. Educate staff to recognize phishing and social-engineering attacks, practice safe internet use and follow data-handling procedures. Simulated phishing exercises improve awareness and reduce click-through rates.

Establish a reporting culture

Encourage employees to report suspicious emails or activity without fear of punishment. Reward timely reporting and integrate lessons learned into training.

Provide role-specific training

Offer deeper training for advisors handling account transfers, wire instructions or trading to prevent fraudulent requests.

10

Incident Response & Recovery

Develop and test an incident response plan

Document roles, communication procedures and steps to contain and eradicate threats. Regular testing ensures the plan works when needed.

Notify clients and regulators promptly

SEC Regulation S-P requires notifying affected individuals within 30 days of determining that sensitive information was accessed.

Conduct post-incident reviews

After any incident, review what happened, analyze root causes and update policies, controls and training accordingly.

11

Artificial Intelligence & Emerging Technology Risk

Inventory AI use

Identify all AI and machine-learning tools in use (portfolio management algorithms, chatbots, analytics platforms). Control access and log activities.

Control AI access and data

Restrict who can deploy and interact with AI systems; avoid feeding confidential client information into generative AI models without proper safeguards.

Review AI vendor security

Ensure AI providers meet cybersecurity and privacy standards and include AI-specific clauses in contracts.

12

Continuous Improvement

Regularly review and update your program

Cyber threats evolve rapidly. Review this checklist at least annually and after significant regulatory changes or business expansions. Incorporate lessons from incidents, audits and industry advisories.

Engage third-party experts

External assessments and managed security services can provide objective insight and 24/7 monitoring. Consider regular third-party audits and penetration tests.

Partner with Katalism Cybersecurity

We help financial advisors implement comprehensive cybersecurity programs — from risk assessments and policy development to secure infrastructure design, continuous monitoring, incident response and compliance reporting.

Need Help Implementing This Checklist?

Katalism helps financial advisors implement comprehensive cybersecurity programs — from risk assessments to continuous monitoring and compliance reporting.

Schedule a Free Assessment

Additional Resources

FINRA Small Firm Cybersecurity Checklist (2024)

A template derived from the NIST CSF that can be adapted to your firm's size and services.

NIST Cybersecurity Framework 2.0 (2024)

Defines six concurrent functions — Govern, Identify, Protect, Detect, Respond and Recover — for building a comprehensive program.

SEC Regulation S-P Amendments (2024-2025)

Require written cybersecurity policies, incident response programs and customer notification within 30 days.

Frequently Asked Questions

When do financial advisors need to comply with the SEC Regulation S-P amendments?

Larger firms (assets ≥ $1.5 billion) must comply by December 3, 2025. Smaller advisers (assets < $1.5 billion) must comply by June 3, 2026. The amendments require written cybersecurity programs, incident response plans, and customer notification within 30 days of a breach.

How often should a financial advisory firm review its cybersecurity program?

At minimum, review annually. You should also review after any significant regulatory change, business expansion, technology change, or security incident. The NIST Cybersecurity Framework emphasizes continuous improvement as a core function.

What is the biggest cybersecurity risk for financial advisors?

Human error. The 2023 Verizon DBIR reported that 74% of incidents involve a human factor — phishing, credential theft, and social engineering remain the most common attack vectors. Regular security awareness training and simulated phishing exercises are critical.

Can Katalism help my firm implement this checklist?

Yes. Katalism specializes in compliance-first IT for financial services firms. We can assess your current posture, implement the technical controls and policies on this checklist, provide ongoing monitoring and incident response, and prepare you for SEC and FINRA compliance.

Protect Your Firm. Protect Your Clients.

Schedule a meeting to discuss your SEC Regulation S-P compliance and find out exactly where your firm stands.