The SEC Drops Another Shoe: The OCIE Cybersecurity Initiative

by Reed Smith

On April 14, 2014, the Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (“OCIE”) issued a Cybersecurity Initiative Risk Alert (“Risk Alert”), further highlighting the importance being placed on cybersecurity preparedness by the Securities and Exchange Commission (“SEC”). The Risk Alert is the latest in a series of public statements and guidance on cybersecurity issues coming from the SEC and other financial markets regulators in 2014. Earlier this year, OCIE included cybersecurity preparedness in its 2014 National Examination Priorities, and the Financial Industry Regulatory Authority (“FINRA”) made a similar priorities announcement and issued cybersecurity sweep letters. The U.S. Commodity Futures Trading Commission (“CFTC”) weighed in with cybersecurity guidance as well. The comments of both SEC Chair Mary Jo White and Commissioner Louis Aguilar at the SEC’s recent Cybersecurity Roundtable made clear that financial institutions and regulated firms must be proactive in developing and maintaining effective information security programs. What that program should look like has been brought into sharp focus with the release of the Risk Alert.

The Risk Alert is essentially a “take home test” for any financial institution or regulated firm preparing for an OCIE examination, or conducting internal testing to strengthen its security program. While the Roundtable discussions addressed the “why” and “what” of cybersecurity in the securities industry and financial markets, the Risk Alert provides an outline of “how” OCIE is going to assess cybersecurity preparedness in the securities industry, and how it will obtain information about the industry’s recent experiences with certain types of cyber threats. OCIE will conduct examinations of more than 50 registered broker-dealers and registered investment advisors in the areas of cybersecurity governance, identification and assessment of cybersecurity risks, protection of networks and information, risks associated with remote customer access and funds transfer requests, risks associated with third parties, detection of unauthorized activity, and experiences with “certain cybersecurity threats” (which seems to translate to Distributed Denial of Service attacks).

The real eye-opener in the Risk Alert is the attached seven-page sample document request consisting of 28 comprehensive questions for registered entities covering information technology asset management (including network maps, logging capability, and destruction or disposition of equipment); information security organization and policies (and whether the policies used cybersecurity risk management standards such as those published by the National Institute of Standards and Technology or the International Standards Organization); risk assessments; access management; removable media and data loss prevention; encryption; incident response planning; system and data backup and disaster recovery/business continuity; and cyber insurance. The Risk Alert addresses threats associated with remote customer access and fund transfer requests. The questions include the use of authentication, detection of anomalous transaction requests and procedures for verifying requests, and information provided to customers regarding cybersecurity risks or security guarantees. There is a request for information regarding the firm’s implementation of the joint CFTC/SEC Identify Theft Red Flags Rules that became effective in 2013.

As seen in guidance from other financial regulators, the Risk Alert addresses third-party relationships, including vendor assessment policies, practices and questions, standard contract language relating to cybersecurity risk, training, control of remote network access for maintenance, and the extent to which a firm assesses the “segregation of sensitive network resources from resources accessible to third parties” (i.e., the “Target Stores problem”). The assessment questions discuss detection of unauthorized activity in the network, including rogue and non-permitted device detection, event correlation, network monitoring, malware detection, alert thresholds, penetration testing and vulnerability scans, and implementation of lessons learned from events. The substance of the information OCIE seeks through these questions is consistent with FINRA’s requests in the FINRA sweep letters it issued earlier this year. However, while the Risk Alert includes questions related to physical security, that is absent from the FINRA letter. Conversely, the FINRA letter requests information about internal communications or reporting to executive management or the board of directors, as well as information-sharing externally within the industry or from private-sector sources.

Last, but certainly not least, OCIE asks a series of questions relating to disclosure, seeking specifics as to reporting cybersecurity events and corporate assessment of cybersecurity risk and best practices. These questions appear to be designed to elicit information sought by Commissioner Aguilar at the SEC Roundtable regarding whether the SEC’s Division of Corporation Finance 2011 Disclosure Guidance is working or should be revised. While the questions seem to be carefully crafted to limit responsive information to only significant events, the data that is obtained from responding firms should be carefully evaluated to ensure incorrect or valid but irrelevant conclusions do not affect disclosure considerations. For example, critical network resources could be impacted by software or hardware malfunctions having nothing to do with cybersecurity issues and may not, in fact, adversely impact service delivery because of redundancy or the availability of backup systems.

Those SEC-regulated entities that are affiliated with national banks should have many, if not all, of the programs described in the Risk Alert questions already in place, given the comprehensive compliance programs required by the Federal Financial Institutions Examination Council. The SEC will most likely get its best assessment of the state of cybersecurity in the securities industry through its interaction with small and medium-sized firms. This analysis will presumably result in updated disclosure guidance and possibly another review of the proposed revision to Regulation S-P. Whatever the result, all firms that are regulated by the SEC are now on notice that they must be able to answer the basic questions of whether they have an information security program, employee training, event response process, business continuity plan, and some level of network monitoring and access management. While the nature and extent of these programs will vary with the size and complexity of the firm and the cybersecurity risk presented, the basic elements have been identified in these questions.

Written by:

Reed Smith

Reed Smith on:

Readers' Choice 2017
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
Privacy Policy (Updated: October 8, 2015):

JD Supra provides users with access to its legal industry publishing services (the "Service") through its website (the "Website") as well as through other sources. Our policies with regard to data collection and use of personal information of users of the Service, regardless of the manner in which users access the Service, and visitors to the Website are set forth in this statement ("Policy"). By using the Service, you signify your acceptance of this Policy.

Information Collection and Use by JD Supra

JD Supra collects users' names, companies, titles, e-mail address and industry. JD Supra also tracks the pages that users visit, logs IP addresses and aggregates non-personally identifiable user data and browser type. This data is gathered using cookies and other technologies.

The information and data collected is used to authenticate users and to send notifications relating to the Service, including email alerts to which users have subscribed; to manage the Service and Website, to improve the Service and to customize the user's experience. This information is also provided to the authors of the content to give them insight into their readership and help them to improve their content, so that it is most useful for our users.

JD Supra does not sell, rent or otherwise provide your details to third parties, other than to the authors of the content on JD Supra.

If you prefer not to enable cookies, you may change your browser settings to disable cookies; however, please note that rejecting cookies while visiting the Website may result in certain parts of the Website not operating correctly or as efficiently as if cookies were allowed.

Email Choice/Opt-out

Users who opt in to receive emails may choose to no longer receive e-mail updates and newsletters by selecting the "opt-out of future email" option in the email they receive from JD Supra or in their JD Supra account management screen.


JD Supra takes reasonable precautions to insure that user information is kept private. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. However, please note that no method of transmitting or storing data is completely secure and we cannot guarantee the security of user information. Unauthorized entry or use, hardware or software failure, and other factors may compromise the security of user information at any time.

If you have reason to believe that your interaction with us is no longer secure, you must immediately notify us of the problem by contacting us at In the unlikely event that we believe that the security of your user information in our possession or control may have been compromised, we may seek to notify you of that development and, if so, will endeavor to do so as promptly as practicable under the circumstances.

Sharing and Disclosure of Information JD Supra Collects

Except as otherwise described in this privacy statement, JD Supra will not disclose personal information to any third party unless we believe that disclosure is necessary to: (1) comply with applicable laws; (2) respond to governmental inquiries or requests; (3) comply with valid legal process; (4) protect the rights, privacy, safety or property of JD Supra, users of the Service, Website visitors or the public; (5) permit us to pursue available remedies or limit the damages that we may sustain; and (6) enforce our Terms & Conditions of Use.

In the event there is a change in the corporate structure of JD Supra such as, but not limited to, merger, consolidation, sale, liquidation or transfer of substantial assets, JD Supra may, in its sole discretion, transfer, sell or assign information collected on and through the Service to one or more affiliated or unaffiliated third parties.

Links to Other Websites

This Website and the Service may contain links to other websites. The operator of such other websites may collect information about you, including through cookies or other technologies. If you are using the Service through the Website and link to another site, you will leave the Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We shall have no responsibility or liability for your visitation to, and the data collection and use practices of, such other sites. This Policy applies solely to the information collected in connection with your use of this Website and does not apply to any practices conducted offline or in connection with any other websites.

Changes in Our Privacy Policy

We reserve the right to change this Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our privacy policy will become effective upon posting of the revised policy on the Website. By continuing to use the Service or Website following such changes, you will be deemed to have agreed to such changes. If you do not agree with the terms of this Policy, as it may be amended from time to time, in whole or part, please do not continue using the Service or the Website.

Contacting JD Supra

If you have any questions about this privacy statement, the practices of this site, your dealings with this Web site, or if you would like to change any of the information you have provided to us, please contact us at:

- hide
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.