Updated for Reg S-P 2025-2026 Compliance

How to Pass an SEC
Cybersecurity Audit

The SEC has signaled that cybersecurity compliance is no longer optional. Examiners look beyond slide decks — they want evidence that you actually protect client data, operate under stress and meet documented requirements. This guide breaks down the audit preparation process into 12 discrete steps tailored to RIAs and small financial firms.

Before You Start

What Examiners Will Ask For

Familiarize yourself with what the SEC will request during a cybersecurity exam:

Written Information Security Program (WISP) — current and reflecting your real environment

Reg S-P compliance documentation with breach notification procedures

Multi-Factor Authentication (MFA) across email, CRM, trading platforms, remote access and workstations

Vendor risk management program with annual assessments

24/7 monitoring and security logs with documented evidence of detection and response

Employee training records demonstrating continuous cybersecurity education

Incident response and business continuity/disaster recovery (BCDR) plans

Step-by-Step

12 Steps to Pass Your SEC Cybersecurity Audit

1

Define Scope and Assign Ownership

Designate a leader and point of contact

Assign an internal audit lead (such as your Chief Compliance Officer) and backups. Identify points of contact at managed service providers and vendors.

Determine audit scope

Identify which systems, business units and data sets will be in scope. Include client data, trading platforms, email, file storage, remote access and any third-party applications. Examiners may tailor their review based on your business model and IT environment.

Know the regulations

Study Regulation S-P, Regulation S-ID (identity theft), Advisers Act Rule 206(4)-7 (compliance program) and Rule 204-2 (books and records). Understand the SEC's focus areas — governance, access controls, patch management, vendor oversight, training and incident response.

2

Update and Enforce Your Written Information Security Program (WISP)

Examiners often find that RIAs use outdated or templated policies that no longer match their environments. A modern WISP should include:

Data classification

Identify categories of data (client PII, financial data, internal business data) and assign protection levels.

Access control and authentication

Specify how users are authenticated (MFA, passkeys), the principle of least privilege, and procedures for onboarding/offboarding.

Incident response protocol

Detail roles, escalation paths, containment steps and notification timelines (Reg S-P requires notifying affected individuals within 30 days of a breach).

Vendor risk methodology

Outline how you evaluate, rank and monitor vendors.

Remote work policy

Include requirements for VPN, endpoint protection and secure handling of client data off-site.

Business continuity and disaster recovery

Define backup frequency, off-site storage, recovery time objectives and how you will continue operations under stress.

Review and update your WISP annually or when technology or regulations change. Generic templates will be flagged.

3

Assemble Your Evidence Pack

"If it isn't documented, it didn't happen." Gather evidence that proves you follow your policies:

Policies and procedures

WISP, AUP, incident response, vendor management, business continuity.

Risk assessment and asset inventory

Detail critical systems and data.

Access reviews

Show when privileges were granted, modified or revoked.

MFA deployment reports

Show coverage across all systems.

Training logs and phishing simulations

Demonstrate continuous education.

Incident records

Including post-incident analysis and lessons learned.

Vendor assessments

SOC 2 reports and contracts demonstrating due diligence.

Backup/restore proofs

Patch management logs and vulnerability scan reports.

Centralize these documents in a secure hub so they can be provided quickly during an exam.

4

Validate Critical Controls

Examiners will test whether your controls actually work:

Enforce MFA everywhere

Deploy MFA across email, CRM, trading platforms, remote desktop, VPN and workstations. Partial deployment leads to deficiencies.

Implement conditional access

Enforce device-based restrictions (e.g., only trusted devices can access systems) and disable outdated protocols like IMAP/POP.

Harden administrator accounts

Use separate admin accounts, strong authentication and privileged access management; regularly review admin privileges.

Verify encryption and endpoint protection

Encrypt data at rest and in transit, deploy EDR on all devices.

Conduct vulnerability scans

Document patch management and proof of remediation.

5

Implement 24/7 Monitoring and Logging

Establish or subscribe to a SOC

Continuous threat detection, behavioral analysis, rapid isolation and detailed logs.

Centralize logs in a SIEM

Capture identity events, administrator actions, endpoint telemetry and cloud activity.

Review and retain logs

Review logs regularly and retain them according to recordkeeping requirements.

6

Build a Documented Vendor Risk Management Program

Vendor oversight is a major exam focus. Your program should:

Inventory all vendors and data access levels

List every third-party service provider (custodians, cloud providers, IT vendors) and document what data they access.

Assess and rank risk

Conduct due diligence (financial stability, security controls, SOC 2 reports) and assign risk scores. Update assessments annually.

Include contractual requirements

Contracts should require vendors to maintain security controls, notify you of incidents and allow audits.

Monitor continuously

Track vendor performance, access logs and incident reports. Document reviews and remediation actions.

7

Train Employees Continuously

The SEC prefers continuous training over annual sessions. Your program should include:

Monthly micro-trainings

Cover phishing, secure data handling, remote work hygiene and reporting suspicious activity.

Quarterly phishing simulations

Run simulated attacks with targeted coaching for employees who click.

Role-specific training

Offer deeper training for advisors handling wire transfers or client onboarding.

Tracking and evidence

Maintain attendance records, quiz results and improvement metrics. This documentation doubles as audit evidence.

8

Prepare and Test Your Incident Response and BCDR Plans

Incident response is a core exam focus. Your plan should:

Assign roles and responsibilities

Define the incident commander, IT/security leads, legal/compliance contacts, communications and client relations.

Outline containment and recovery steps

Describe how you isolate affected systems, preserve evidence and restore services. Include playbooks for common scenarios (compromised email, ransomware, misdirected data).

Provide notification templates and timelines

Document how you notify clients, regulators (SEC, state agencies), vendors and law enforcement. Reg S-P requires notifying affected individuals within 30 days.

Include business continuity and DR

Identify essential functions, backup procedures, alternate work sites and communication channels.

Test at least annually

Run tabletop exercises to validate roles and processes and update the plan based on lessons learned.

9

Run Tabletop Exercises and Internal Audits

Simulate realistic scenarios

Use scenarios such as a compromised mailbox or misdirected client statement to practice decision-making, record action items and refine your plan.

Conduct internal audits

Review your controls and evidence internally or hire an external firm. Address findings immediately.

10

Brief Leadership and Align Messaging

Brief executives and board members

Senior leadership must understand the audit process and their responsibilities. Review your cybersecurity posture, evidence pack and incident response plan.

Align messaging

Ensure everyone knows how to respond to exam questions and discuss cybersecurity initiatives consistently.

11

Close Quick Wins and Maintain Documentation

Before the exam, remediate low-hanging issues:

Least-privilege on shared resources

Remove dormant accounts and enforce least-privilege access.

Standardize offboarding procedures

Document change approvals and ensure terminated employees lose access promptly.

Update stale policies

Ensure policies align with current workflows.

Verify backup restoration and patch status

Test restores and confirm patches are current.

Documentation must be maintained continuously — not assembled at the last minute. Examiners will ask for logs, reports and proof that controls operate as documented.

12

Engage Third-Party Experts and Keep Improving

Audit preparation is demanding. After your audit:

Prioritize findings

Assign owners and set timelines for remediation.

Update policies and procedures

Reflect current operations.

Close documentation gaps

Standardize artifact collection.

Schedule recurring checks

Access reviews, vendor diligence, backup tests and training refreshers.

Treat the audit as a progress report, not a finish line. Continuous improvement and a living evidence pack will make future exams smoother.

Why Partner with Katalism

Katalism Cybersecurity specializes in helping financial firms prepare for and pass SEC cybersecurity audits. We provide:

vCISO Services

Align your policies with SEC requirements and tailor them to your business.

Evidence Pack Assembly

Documentation management and centralized evidence collection for examiners.

MFA & Zero-Trust Deployment

Full MFA coverage and conditional access across all systems.

24/7 Threat Monitoring

Continuous SOC monitoring and incident response.

Tabletop Exercises

Realistic scenario-based testing of your incident response plan.

Staff Training

Continuous security awareness training with phishing simulations.

Frequently Asked Questions

What does the SEC look for in a cybersecurity audit?

The SEC's examination focuses on six key areas: governance and risk assessment, access rights and controls, data loss prevention, vendor management, training, and incident response. Examiners want evidence that your policies, controls and documentation align with your actual operations — not just paper compliance.

What is a Written Information Security Program (WISP)?

A WISP is a documented set of policies and procedures that describes how your firm protects sensitive information. It should cover data classification, access controls, incident response, vendor risk, remote work, and business continuity. The SEC expects your WISP to be current and reflect your real environment — generic templates will trigger findings.

When do firms need to comply with the SEC Regulation S-P amendments?

Larger firms (assets ≥ $1.5 billion) must comply by December 3, 2025. Smaller advisers (assets < $1.5 billion) must comply by June 3, 2026. The amendments require stricter safeguarding of customer information and notifying affected individuals within 30 days of a breach.

How often should we test our incident response plan?

At least annually. Run tabletop exercises with realistic scenarios — such as a compromised mailbox or ransomware event — to validate roles, processes and communication. Update the plan based on lessons learned from each exercise.

Can Katalism help my firm prepare for an SEC cybersecurity audit?

Yes. Katalism specializes in helping financial firms prepare for and pass SEC cybersecurity audits. We provide vCISO services, evidence pack assembly, MFA and zero-trust deployment, 24/7 threat monitoring, tabletop exercises, and staff training — all tailored to SEC requirements.

Ready to Prepare for Your SEC Audit?

Schedule a meeting to discuss your SEC compliance posture and build a defensible program that protects client data and withstands examiner scrutiny.