SEC's 2025 Cyber Compliance Checklist: What Financial Firms Must Know Before December 3

SEC's 2025 Cyber Compliance Checklist: What Financial Firms Must Know Before December 3
Photo by Sean Pollock / Unsplash

The SEC's Division of Examinations has released its 2025 priorities, and cybersecurity compliance has never been more critical. With Regulation S-P amendments taking effect December 3, 2025, and heightened scrutiny on AI-enabled threats, financial institutions face a compliance landscape that demands immediate action.

Executive Summary

The Securities and Exchange Commission's Division of Examinations announced its 2025 examination priorities on October 21, 2024, maintaining cybersecurity as a "perennial examination priority" while introducing significant new compliance requirements. As detailed in our comprehensive 2025 compliance guide, the regulatory landscape has become increasingly complex across multiple jurisdictions. The priorities reveal three critical focus areas that every registered investment adviser, broker-dealer, and covered financial institution must address:

  • Regulation S-P compliance with staggered deadlines (December 3, 2025 for larger entities, June 3, 2026 for smaller)
  • AI-enabled threat detection and identity theft prevention programs
  • Emerging technology oversight including automated investment tools and trading algorithms

For the cybersecurity community, this represents the most comprehensive regulatory shift in data protection requirements since Regulation S-P's original adoption in 2000. Public companies must also remain aware of their Form 8-K cybersecurity disclosure obligations that run parallel to these new requirements.

Understanding the New Regulation S-P Requirements

Who's Affected and When

The amended Regulation S-P applies to "covered institutions," including:

  • Investment advisers registered with the SEC (larger entities: $1.5B+ AUM)
  • Broker-dealers (those with over $500,000 in total capital)
  • Investment companies
  • Funding portals
  • Transfer agents

Critical compliance dates:

  • December 3, 2025: Larger entities must be fully compliant
  • June 3, 2026: Smaller entities must be fully compliant

Five Mandatory Components

1. Written Incident Response Program

Covered institutions must develop, implement, and maintain written policies and procedures reasonably designed to:

  • Detect unauthorized access to or use of customer information
  • Respond to security incidents with documented assessment procedures
  • Recover from incidents while maintaining business continuity
  • Contain the scope and impact of security events

The incident response program must specifically outline procedures for assessing the nature and scope of security incidents, determining which customer information was compromised, and taking steps to contain and mitigate harm.

2. Customer Notification Requirements

Perhaps the most significant operational change: covered institutions must notify affected individuals within 30 days of determining that unauthorized access to "sensitive customer information" occurred or is reasonably likely to have occurred.

Sensitive customer information includes:

  • Social Security numbers
  • Driver's license numbers
  • Passport numbers
  • Account numbers combined with security codes or passwords
  • Biometric records

Notification must include:

  • Description of the incident
  • Types of information involved
  • Actions taken to protect the information
  • Contact information for the institution
  • Reminder to remain vigilant for identity theft

Limited exceptions:

  • Attorney General determination of national security risk (30-day delay, extendable)
  • Law enforcement requests for delay

3. Service Provider Oversight

The amendments impose stringent vendor management requirements. Covered institutions must establish written policies ensuring service providers:

  • Implement appropriate safeguards for customer information
  • Notify the covered institution within 72 hours of becoming aware of any security incident
  • Maintain documented information security controls

This 72-hour notification requirement represents a critical operational change. Organizations must immediately:

  • Review all existing service provider contracts
  • Amend agreements to include 72-hour breach notification clauses
  • Establish vendor risk assessment programs
  • Implement ongoing monitoring protocols

For contracts not up for renewal, institutions should document requirements through email confirmation or side letters to ensure compliance.

4. Enhanced Recordkeeping

Organizations must maintain written records documenting:

  • Incident response program policies and procedures
  • Security incident investigations and determinations
  • Customer notifications sent
  • Service provider oversight documentation
  • Compliance with safeguards and disposal rules

All records must be kept for five years, with the first two years in an easily accessible location.

5. Expanded Safeguards and Disposal Rules

The amendments broaden the definition of "customer information" from narrowly defined account data to include:

"Any record containing nonpublic personal information about a customer of a financial institution, whether in paper, electronic, or other form."

This significantly expands the scope of data subject to protection requirements.

AI-Enabled Malware and Identity Theft Prevention

The Emerging Threat Landscape

The SEC's 2025 priorities specifically call out artificial intelligence as both an operational tool and a threat vector. Recent threat intelligence reveals alarming trends:

AI-Generated Polymorphic Malware: Advanced malware strains now generate unique versions of themselves every 15 seconds during attacks, with polymorphic tactics present in an estimated 76.4% of all phishing campaigns in 2025.

Deepfake-Enabled Fraud: Financial services firms are experiencing surges in deepfake attempts to bypass KYC (Know Your Customer) checks, enabling anonymous money laundering through falsified credentials. CEO fraud has become increasingly difficult to detect as attackers use deepfake audio or video to impersonate senior leaders in real-time meetings.

Autonomous AI Cyberattacks: Research conducted by Carnegie Mellon University and Anthropic in 2025 demonstrated that large language models can autonomously plan and carry out sophisticated cyberattacks without human intervention, replicating attacks like the 2017 Equifax breach by exploiting vulnerabilities, installing malware, and stealing data.

Case Study: SEC Fines and the SolarWinds Cyber Attack – A Corporate Accountability Crisis
Introduction The SolarWinds cyber attack, first disclosed in December 2020, marked one of the most significant cybersecurity breaches in history. It involved a sophisticated supply chain attack that compromised SolarWinds’ Orion platform, affecting numerous organizations, including U.S. government agencies and major corporations. In the aftermath, the U.S. Securities

Read more

MongoBleed Vulnerability: Compliance Requirements and Regulatory Response Guide (CVE-2025-14847)

MongoBleed Vulnerability: Compliance Requirements and Regulatory Response Guide (CVE-2025-14847)

December 28, 2025 | Compliance Alert: Critical Organizations using MongoDB Server face immediate compliance obligations following the disclosure of CVE-2025-14847 (MongoBleed), a critical unauthenticated memory leak vulnerability. This guide addresses breach notification requirements, regulatory compliance implications, and mandated security controls across major frameworks. Executive Compliance Summary Vulnerability: CVE-2025-14847 - Unauthenticated MongoDB

lock-1 By Compliance Hub
Generate Policy Global Compliance Map Policy Quest Secure Checklists Cyber Templates