New SEC Cyber Rules: Will Your Firm Be Ready?

SEC Rules

The SEC has proposed new rules around cyber risk management for investment advisers and funds. There’s a lot to unpack in the 224-page SEC document that delineates the new rules. But the takeaway is that investment advisers and funds must take specific actions around seven core aspects of cyber risk management: policies and procedures, access management, data protection, vulnerability management, incident response, reporting, and accountability.

To prepare your organization for compliance and protect it against cyber risk, take these 7 actions now:

 

1. ESTABLISH WRITTEN CYBERSECURITY PLANS, POLICIES, AND PROCEDURES.

  • Document a robust cyber risk plan.
  • Formalize your cybersecurity policies and procedures.
  • Assess, categorize, and prioritize your unique risks.
  • Classify your datasets.
  • Identify critical service providers that have access to your data.
  • Review policies and procedures at least annually.
  • Update based on business changes that could affect cyber risk.
  • Make sure documentation is easily retrievable.

 

2. REVIEW, DOCUMENT AND ENFORCE ACCESS MANAGEMENT BEST PRACTICES.

  • Understand that best practices for data access management are now SEC policy.
  • Create and enforce an acceptable use policy (AUP).
  • Create policies for passwords, least-privilege access, and remote access.
  • Implement multifactor authentication (MFA).
  • Closely involve IT for access management, device management, endpoint protection,and training.
  • Review and update policies regularly.

 

3. DEPLOY DATA PROTECTION POLICIES AND TECHNOLOGIES.

  • Monitor and protect data from unauthorized access.
  • Safeguard data based on sensitivity level and importance to operations.
  • Protect data when it’s stored and as it’s transmitted.
  • Leverage methods such as encryption, network segmentation, access controls, and automated threat detection.
  • Document which vendors have access to data.
  • Require vendors to meet cybersecurity standards and report cyber incidents.


 

4. MANAGE THREATS AND VULNERABILITIES.

  • Perform regular vulnerability scans.
  • Track, prioritize, and remediate known vulnerabilities.
  • Update and patch software promptly.
  • Don’t overlook device and application configuration.
  • Conduct regular penetration tests.

 

5. IMPLEMENT CYBERSECURITY INCIDENT RESPONSE PLANNING AND RECOVERY.

  • Develop and document an incident response plan and recovery procedure.
  • Include metrics for speed and effectiveness of response.
  • Test the response plan and fine-tune it based on results.
  • Identify ways to handle data if vendor systems become unavailable.


 

6. REPORT AND DISCLOSE CYBERSECURITY INCIDENTS.

  • Realize that reporting of cyber incidents is a major new SEC requirement calling for a new level of transparency.
  • Report significant cyber incidents to the SEC.
  • Publicly disclose cyber risks and incidents from the previous two fiscal years to both clients and the SEC.


 

7. FORMALIZE CYBERSECURITY RESPONSIBILITY AND ACCOUNTABILITY. 

  • Recognize that new SEC rules formalize cybersecurity accountability.
  • Boards of directors must review and approve cybersecurity policies and procedures.
  • Boards must also understand and address cyber threats in the marketplace.
  • Alert boards to cyber incidents.
  • Inform boards about vendors that handle sensitive data.

 

WANT TO LEARN MORE? DOWNLOAD OUR IN-DEPTH WHITE PAPER, “NEW SEC RULES FOR CYBERSECURITY RISK MANAGEMENT: HOW INVESTMENT ADVISERS AND FUNDS SHOULD RESPOND TODAY.”

Microsoft 365 Copilot

Speak With One Of Our Experts Today

Learn How ECI Can Unlock Real Value For Your Firm.