Skip to main content
RSS Feed
·10 min read

Cybersecurity Risk Assessment Software for RIAs: Automate What the SEC Requires

The SEC expects every registered investment adviser to maintain a documented cybersecurity risk assessment. Most firms either pay a consultant $5-15K for a point-in-time report that goes stale in months, or fill out a self-assessment questionnaire that nobody verifies. Neither approach actually satisfies what examiners want to see.

What the SEC actually requires

Under the amended Reg S-P rule, every RIA must adopt written policies and procedures that are "reasonably designed" to protect customer records and information. The SEC has made clear — through examination priorities, risk alerts, and enforcement actions — that "reasonably designed" starts with a risk assessment.

That assessment must be annual at minimum. It must be documented in writing. It must be specific to your firm — not a generic template. And it must identify actual threats and vulnerabilities to your environment, evaluate your current controls against those threats, and prioritize what needs to be fixed.

This is not optional, and it is not new. The SEC has been examining for risk assessment documentation since the 2014 cybersecurity sweep. What has changed is the specificity of what examiners expect and the consequences of falling short.

The problem with manual risk assessments

Most RIAs handle risk assessments one of two ways, and both have serious gaps.

The consultant model

You hire a cybersecurity consulting firm. They spend a few days reviewing your infrastructure, interview your staff, and produce a 50-page report. It costs $5,000 to $15,000. The report is thorough — for that moment in time.

Three months later, a new vulnerability is disclosed in your email provider. Six months later, your IT vendor changes your DNS configuration. Nine months later, a staff member starts forwarding client emails to a personal account. The consultant's report says nothing about any of this because the consultant is not watching. By the time your next annual engagement rolls around, the report is a historical document, not a current assessment.

The self-assessment questionnaire

Your compliance vendor gives you a form. "Do you have multi-factor authentication? Do you encrypt data in transit? Do you have an incident response plan?" You check the boxes, sign at the bottom, and file it.

The problem is that nobody verifies any of it. The questionnaire assumes you know the answer. It assumes you know what DMARC is, whether your email provider enforces it, and whether your SPF record is correctly configured. It assumes "we have a firewall" means the firewall is properly configured, current on patches, and monitoring the right traffic.

Neither approach meets the SEC's standard. A point-in-time consultant report is not "reasonably designed" if it goes stale in months. A self-assessment questionnaire is not "reasonably designed" if nobody confirms the answers are accurate.

What good risk assessment software does

The right software does not hand you a questionnaire. It looks at your actual infrastructure and tells you what it finds. Specifically:

The self-assessment trap

Here is a specific example of why questionnaires fail.

A standard compliance questionnaire asks: "Does your firm have DMARC configured? [Yes / No / Not Applicable]."

We have scanned thousands of RIA domains. Based on that data, 83% of firms would check "yes" or "not applicable" — and be wrong. The reality is that most RIA domains either have no DMARC record at all, have a DMARC policy set to "none" (which provides monitoring but no protection), or have a DMARC record with syntax errors that prevent it from functioning.

The questionnaire does not catch this because the questionnaire trusts the person filling it out. That person is usually a CCO or operations manager who should not be expected to know how to query DNS TXT records and interpret the results. They are not lying — they genuinely believe their IT provider set it up correctly. But nobody checked.

Multiply this across every line item in a self-assessment — encryption, access controls, patch management, backup procedures, incident response — and you have a document that looks complete but reflects what the firm hopes is true rather than what actually is.

What examiners actually want to see

SEC examination staff have been increasingly specific about what constitutes an adequate risk assessment. Based on examination deficiency letters and published risk alerts, examiners want:

How BlackSheep handles risk assessment

BlackSheep takes a different approach from both the consultant model and the questionnaire model. Here is how it works for RIAs:

  1. Automated external scan.You enter your firm's domain. BlackSheep scans your DNS records, email authentication (SPF, DKIM, DMARC), SSL/TLS configuration, web application headers, exposed services, and publicly visible infrastructure. No questionnaire. No self-reporting.
  2. Findings mapped to Reg S-P. Every finding is tied to the specific Reg S-P requirement it relates to. Your report speaks the language your examiner uses, not generic cybersecurity jargon.
  3. Written assessment with your firm's data. The platform generates a documented risk assessment with your firm name, your specific findings, severity ratings, regulatory mappings, and remediation recommendations. It is your assessment, built from your actual infrastructure — not a template.
  4. Continuous monitoring. The scan is not a one-time event. BlackSheep monitors your infrastructure on an ongoing basis. When something changes — a certificate is about to expire, a DMARC policy is altered, a new vulnerability is detected — the assessment updates and you get notified.
  5. $249/mo vs. $5-15K per engagement. A consultant engagement that happens once a year costs more than continuous automated monitoring that runs every day. The math is straightforward.

What this does not replace

Automated external scanning covers the infrastructure layer — the things an attacker (or an examiner) can see from outside your network. It does not evaluate whether your staff clicks on phishing emails. It does not assess whether your access controls are properly segmented internally. It does not review your vendor management process.

Those internal controls still matter. But for most RIAs, the external infrastructure is where the biggest, most easily exploitable gaps exist. It is also where examiners can independently verify your claims. If your assessment says everything is fine but an examiner can see your DMARC is not enforced and your SSL is misconfigured, that discrepancy raises questions about the entire program.

See what an automated risk assessment finds on your domain.

Run your free scan with BlackSheep

Free download: SEC Reg S-P compliance checklist

27-point checklist covering every Reg S-P requirement. Know exactly where your firm stands before the June 2026 deadline.

No spam. Unsubscribe anytime.