Saturday, August 16, 2025

Cybersecurity Risk Management Rule for Financial Entities


From the Publisher: Yigal M. Rechtman, CPA is the publisher of the CPA Publisher.

Executive Summary

The proposed cybersecurity rule takes a conservative stance, aiming to minimize perceived costs rather than prioritizing strong security measures. While we support a risk-based approach, the rule should shift from a passive compliance model to one that demands accountability and rigorous security standards. Rather than focusing on cost-benefit analyses, cybersecurity should be viewed as an essential regulatory function.

We recommend expanding coverage, refining definitions of incidents and breaches, and aligning policies with established risk frameworks like NIST 800-30. The proposed audit cost estimates are unrealistically low, and the rule should emphasize external inspections over internal audits to ensure effective compliance.

Detailed Analysis

1. Expanding the Scope of Covered Entities

The rule should explicitly include subcontractors, platform providers, consultants, and any third parties with access to financial recordkeeping systems. A comprehensive regulatory scope ensures that cybersecurity measures extend beyond primary entities to include all involved parties.

2. Notification Requirements and Incident Classification

The proposed 48-hour notification window is arbitrary and may lead to excessive, low-impact reporting. We suggest adopting a two-tier classification:

  • Incident: A potential security event that warrants investigation.
  • Breach: A confirmed event resulting in data compromise or harm.

This approach, modeled after HIPAA, would reduce unnecessary disclosures while maintaining vigilance over significant security breaches.

3. Aligning Cybersecurity Definitions with Industry Standards

Current definitions in the proposed rule do not align with established regulations such as HIPAA or state cybersecurity laws. We recommend referencing NIST 800-30 for risk assessments to create consistency across industries and regulatory frameworks.

4. Public Disclosure and Reporting Concerns

While transparency is critical, excessive public disclosure of cybersecurity incidents could expose organizations to further risk. The rule should specify safe disclosure methods that inform stakeholders without compromising security. The SEC should collaborate with existing agencies, such as the FBI’s National Cyber Investigative Task Force, rather than becoming an isolated reporting entity.

5. Strengthening Risk Management Policies

We support the proposed five core risk management areas:

  1. Risk assessment
  2. User security and access
  3. Information protection
  4. Cybersecurity threat and vulnerability management
  5. Incident response and recovery

However, audits should be externally managed to eliminate conflicts of interest. The estimated cost of $1,500-$20,000 per audit is unrealistic; we propose an adjusted range of $15,000-$35,000 to ensure high-quality assessments.

6. Addressing Crypto Asset Risks

The proposal acknowledges risks from cryptocurrency and smart contracts but fails to introduce meaningful action. We recommend:

  • Enhanced awareness training to mitigate phishing and fraud risks.
  • Exchange monitoring to detect potential blockchain attacks.
  • Stronger “Know Your Customer” (KYC) measures to prevent fraudulent transactions.
  • Hardware-based security measures against MitM attacks.
  • Air-gapped backups to mitigate ransomware threats.

Instead of merely recognizing threats, the rule should mandate proactive cybersecurity measures for entities handling digital assets.


Conclusion

The SEC must enforce stronger cybersecurity obligations, moving beyond minimum compliance to proactive protection of financial systems. Expanding coverage, refining risk definitions, and prioritizing external audits will significantly enhance security resilience. Additionally, the SEC should work in tandem with established cybersecurity agencies to avoid regulatory redundancy and ensure meaningful oversight.