SEC Announces the 2nd wave of Cyber Security Audits for Investment Advisors and Broker Dealers

The SEC’s examinations concentrate on 6 audit items;

1.  Governance and Risk Assessment – Oversight of client data that is specific to a firm’s organization and business model and not just an off-the-shelf solution. Since every firm is different, the SEC likes to see firm specific procedures for the firm’s data security practices.

2.   Access Rights and Controls  How is the firm controlling application users and their levels of permission to access client data. For example, should the unregistered receptionist have access to the Order Management System? (The answer is no).

3.   Data Loss Prevention (DLP) – DLP consists of best practices and security tools which reduce the leaking of client data outside an organization’s control. Sending a client account number over non-secure communication like personal email accounts would be considered a high-risk item in a DLP Audit. Enterprise grade DLP systems react to these messages in real-time and prevent restricted data from leaving the firm’s environment by blocking delivery of the data.
4.    Vendor Management – An organization’s cloud application provider(s) should understand and manage security but the advisory firm is required to review and validate these provider’s disaster recovery plan (DRP), encryption standards, and information security policies. InvestCloud’s Chief Architect, Vincent Sos, is a specialist in cloud security and offers advice to RIAs when engaging cloud solution providers; “Ensure that your cloud vendors have regular security tests and can provide you with the results. For key vendors you may want to engage your own security specialists to verify or even “ethically hack” your cloud vendor’s solution.  Your cloud vendor should always be open to assist you in that exercise.

5.  Training – A firm is required to have a program that trains employees to identify threats and protect client information.

6.   Incident Response – There are many types of security incidents that all require a specific set of employee roles and responsibilities. A firm needs to have a plan for who is doing what if there is a breach or loss of client data?

Read more from InvestCloud by clicking here.

  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: