← Back to all briefings

Cybersecurity · Credibility 86/100 · · 2 min read

Cybersecurity Briefing — November 2025: SEC Regulation S-P incident response compliance hits final month

SEC Regulation S-P amendments give large broker-dealers, investment advisers, funds, and transfer agents until 3 December 2025 to operationalise breach notification programmes, service-provider oversight, and five-year incident records—making November the last full month to close gaps.

Executive briefing: The Securities and Exchange Commission’s June 2024 amendments to Regulation S-P impose an 18-month compliance period on larger covered institutions, ending 3 December 2025. By that date broker-dealers, investment companies, SEC-registered investment advisers, and transfer agents must run written incident-response programmes that investigate unauthorised access, notify affected individuals within 30 days, and prove oversight of third-party service providers handling customer information.

Key compliance pressure points

  • Notification clock. Programmes must deliver individual breach notices "as soon as practicable" and no later than 30 days after confirming sensitive customer information was, or was likely to be, accessed without authorisation.
  • Service-provider governance. Policies and contracts have to compel vendors to maintain safeguards, escalate incidents, and support notification obligations, with registrants enforcing oversight.
  • Documentation duty. Covered institutions need records that evidence incidents, notifications, and remediation for at least five years, with the first two years kept in an easily accessible place.

Operational priorities for November

  • Run tabletop validations. Rehearse 30-day notification workflows across security, legal, investor relations, and call-centre teams to confirm timeline assumptions and DOJ delay procedures.
  • Vendor attestation sweep. Refresh due diligence questionnaires, right-to-audit clauses, and breach-reporting SLAs for service providers with customer data access; document enforcement evidence.
  • Recordkeeping readiness. Ensure incident management tooling and GRC repositories can export the artefacts Regulation S-P expects—investigation logs, risk analyses, and notification templates—on demand.

Enablement moves

  • Align the Regulation S-P programme with state breach statutes, NYDFS Part 500, and banking agency guidance to minimise duplicate notifications.
  • Brief audit committees on evidentiary expectations so December surveillance reviews focus on control effectiveness rather than documentation gaps.
  • Coordinate with defence contracting teams preparing for DoD’s 10 November CMMC Phase 1 enforcement so shared vendors can supply DFARS 252.204-7021 evidence alongside Reg S-P oversight artefacts.

Sources

  • SEC Regulation S-P
  • Financial services cybersecurity
  • Incident response
  • Breach notification
Back to curated briefings