Skip to main content
RSS Feed
·10 min read

Your Cyber Insurance Renewal Is About to Get Harder — What RIAs Need to Know

Your next cyber insurance renewal will not look like the last one. Insurers burned by ransomware payouts are rewriting the rules, and RIAs without documented cybersecurity programs are getting hit with denied claims, doubled premiums, or flat-out non-renewal. This is not a compliance problem — it is a financial one.

The insurance market has shifted

Between 2020 and 2024, the cyber insurance market lost money. Carriers paid out billions in ransomware claims, many to organizations that had checked "yes" on their applications but had no actual controls in place. The industry responded the way insurance industries always respond — by tightening underwriting.

What this means in practice: your renewal application is no longer a formality. Carriers are asking specific, technical questions about your security controls. They want evidence, not assurances. And if you cannot provide it, they will either price you out or walk away.

For RIAs, this shift hits particularly hard. Most advisory firms carry E&O and cyber liability coverage as a baseline business requirement. Custodians expect it. Clients ask about it. Regulators view it as a risk management best practice. Losing coverage or paying dramatically more for it is not a minor line-item change — it affects your operating economics.

What insurers are requiring now

The specific requirements vary by carrier, but the industry has converged around a common set of controls. If you are renewing a cyber or E&O policy in 2026, expect questions about all of the following:

Multi-factor authentication (MFA)

This is the single most common requirement. Insurers want MFA on email, remote access, administrative accounts, and any system that touches client data. Not "we plan to implement it" — it must be active and enforced. Some carriers will not even quote a policy without MFA confirmation.

Incident response plan

A written plan that covers how your firm detects, contains, and recovers from a security incident. The plan should name roles and responsibilities, define escalation procedures, include contact information for legal counsel and your insurance carrier, and outline notification obligations. Insurers want to see a document, not a verbal understanding that "we would figure it out."

Email authentication (SPF, DKIM, DMARC)

Business email compromise is the number one claim type for professional services firms. Insurers know this, and they are increasingly asking whether your domain has SPF, DKIM, and DMARC configured. Some carriers run their own DNS checks during underwriting. If your domain does not have a DMARC policy at enforcement level, that is a red flag in the application.

Endpoint detection and response (EDR)

Traditional antivirus is no longer sufficient in the eyes of most underwriters. They want to see EDR — software that monitors endpoints for suspicious behavior, not just known malware signatures. If you are still running basic antivirus on workstations, expect questions about it.

Encrypted backups

Backups must exist, must be encrypted, and must be tested. Insurers learned from ransomware cases where firms had backups that were either connected to the same network (and got encrypted by the attackers) or had never been tested and failed during recovery. They now ask about backup frequency, encryption, isolation, and testing schedules.

Written security policies

A formal written information security program (WISP) that documents your firm's security controls, access management procedures, data classification, vendor oversight, and acceptable use policies. This is the same document the SEC expects under Regulation S-P. Your insurer and your regulator want the same thing.

Employee security training

Documented training, not a one-time slide deck from three years ago. Insurers want evidence that employees receive regular security awareness training — typically quarterly or at least annually — with records of completion. Phishing simulation results are a bonus.

What happens when you cannot provide proof

The consequences are financial and immediate:

The Reg S-P overlap — same controls, same documentation

Here is the part most RIAs miss: the controls your insurer demands are almost identical to what the SEC requires under the updated Regulation S-P. The 2023 amendments to Reg S-P require written policies and procedures for safeguarding customer information, an incident response program with notification obligations, and oversight of service providers.

MFA, incident response plans, email security, written policies, training documentation — your insurer and the SEC are asking for the same evidence. This means you do not need two separate compliance efforts. A single, well-documented cybersecurity program satisfies both. Build it once, use it for your renewal application and your next SEC exam.

The cost math

This is where the financial argument becomes unavoidable:

Spending $249/mo to avoid a $5K-15K premium increase — let alone a six-figure denied claim — is not a compliance expense. It is the most straightforward risk-adjusted investment your firm can make.

What to do before your renewal

If your renewal is coming up in the next 90 days, here is a practical checklist:

  1. Confirm MFA is enforced everywhere.Email, remote access, custodian portals, cloud storage, CRM. Not optional, not "available" — enforced for all users.
  2. Write your incident response plan. Or update the one from 2021 that names an employee who left two years ago. It should reflect your current team, your current systems, and your current notification obligations under Reg S-P.
  3. Check your DMARC record. Run a free scan to see what your domain's email authentication looks like. If you do not have a DMARC policy at enforcement, fix it before your carrier checks.
  4. Document your security policies. Get a current WISP in place. It should cover access controls, data classification, vendor management, acceptable use, and employee training requirements.
  5. Collect training records. If you run security awareness training, make sure you have completion records with dates and names. If you do not run training, start now — quarterly phishing simulations and annual security awareness sessions are the minimum most carriers expect.
  6. Review your application carefully.Do not check "yes" on anything you cannot back up with evidence. A "no" with a remediation plan is better than a "yes" that becomes a material misrepresentation during a claim.

How BlackSheep helps

BlackSheep's RIA compliance platform produces the exact documentation insurers want to see on your renewal application: the written information security policy, incident response plan, risk assessment, vendor oversight records, and training logs. Everything is timestamped, version-controlled, and exportable — so when your carrier asks for proof, you have it ready.

The same documentation satisfies your SEC examination requirements under Reg S-P. One platform, one set of documents, two problems solved.

Your next renewal application will ask about your cybersecurity program. Have an answer ready.

Get your documentation in order with BlackSheep

Free download: SEC Reg S-P compliance checklist

27-point checklist covering every Reg S-P requirement. Know exactly where your firm stands before the June 2026 deadline.

No spam. Unsubscribe anytime.