Skip to main content
RSS Feed
·11 min read

What Actually Happens During a SEC Cybersecurity Exam (And How to Prepare)

Most CCOs have never been through a SEC cybersecurity examination. The uncertainty is the worst part — not knowing what they will ask, what they will check, or how long it takes. Here is what actually happens, step by step, so you can stop guessing and start preparing.

How firms get selected

The SEC's Division of Examinations does not examine every firm every year. They select firms using a combination of factors, and you will not know which factor put you on the list:

The key thing to understand: by the time you receive the examination notification letter, the scope is already set. You cannot influence what they will focus on. Your only option is to be ready before the letter arrives.

The document request

After the notification letter, the SEC sends a detailed document request list. This is where most firms start to panic. The request typically asks for:

You typically have two to four weeks to produce these documents. That sounds like enough time until you realize you need to locate, compile, and review everything. If your WISP is a template you downloaded three years ago and never updated, that two-week window is going to feel very short.

What they check technically

This is the part that surprises most firms. SEC examiners do not just read your documents — they verify your claims against observable reality. Examination staff have become increasingly technical over the past several years, and their tooling has improved.

Examiners can and do check your public-facing technical posture:

The technical checks serve a specific purpose: they test whether your written policies reflect what is actually deployed. A WISP that claims "the firm maintains email authentication controls" while the domain has no DMARC record is a finding. Not because of the missing record alone, but because the policy does not match the practice.

You can see exactly what examiners would find on your domain right now. Run a free scan and compare the results to what your policies claim.

On-site or remote examination

SEC examinations can be conducted on-site at your office, remotely, or as a hybrid of both. Remote examinations became more common after 2020 and remain a standard option. Regardless of format, expect interviews with:

The interviews are process-oriented. Examiners ask questions like "Walk me through what happens when an employee reports a suspicious email" or "How do you evaluate a new vendor before granting them access to client data?" They are testing whether your team actually follows the procedures described in your policies, or whether the policies exist on paper only.

Common findings

SEC examination deficiency letters follow patterns. These are the findings that appear again and again, across firms of all sizes:

No written information security policy

The most basic finding. The firm either has no WISP at all, or has a generic template that was never customized to reflect the firm's actual environment, systems, and procedures. A WISP that references "the company's mainframe" when you are a 10-person RIA using cloud-based tools is not a WISP — it is evidence of inattention.

No documented risk assessment

Regulation S-P and SEC guidance require firms to identify and assess risks to client information. Many firms either skip this entirely or confuse a risk assessment with a penetration test. A risk assessment identifies threats, evaluates their likelihood and impact, and documents what controls are in place. A penetration test checks whether specific controls work. You need both, but they are not the same thing.

No incident response plan

When examiners ask "What would you do if you discovered a data breach tomorrow?" and the answer is "We would figure it out," that is a finding. An incident response plan documents roles, responsibilities, communication procedures, containment steps, and regulatory notification obligations. It should be written, reviewed, and tested before you need it.

No multi-factor authentication

MFA on email, client-facing systems, and any application that accesses client data is now a baseline expectation. The SEC has cited MFA failures in enforcement actions, including cases where a single compromised email account led to fraudulent wire transfers from client accounts.

No email authentication

Missing or misconfigured DMARC, SPF, and DKIM records. This is increasingly flagged because business email compromise is one of the top attack vectors against financial firms. If your domain can be spoofed, your clients are at risk.

Vendor agreements missing breach notification clauses

Firms rely on third-party vendors — custodians, CRM providers, portfolio management systems, cloud storage — but their service agreements do not include provisions requiring the vendor to notify the firm in the event of a security incident. If your vendor gets breached and you do not find out for months, that is your problem when the SEC asks about it.

What happens after the examination

After the examination concludes, one of three things happens:

  1. No action letter. The examination did not identify significant issues. This is the best outcome, but it does not mean you are exempt from future examinations.
  2. Deficiency letter.The most common outcome. The SEC sends a letter listing specific findings and areas where the firm's practices fell short. You are expected to respond with a remediation plan and timeline. Most firms receive some form of deficiency letter — the question is how many findings and how severe.
  3. Referral for enforcement. In cases of serious noncompliance, willful violations, or repeated failures to remediate known deficiencies, the matter can be referred to the Division of Enforcement. Enforcement actions can result in civil penalties, censure, suspension, or revocation of registration.

The deficiency letter gives you a window to fix things. Firms that respond promptly, document their remediation, and demonstrate improvement rarely escalate to enforcement. Firms that ignore deficiency letters or make superficial changes create a paper trail that makes enforcement action more likely in the next examination.

How to prepare

The firms that handle SEC examinations well share one trait: they are not scrambling. Their documents exist, are current, and are accessible. Their people can describe their processes because they actually follow them. Here is how to get there:

  1. Assemble your core documents now. WISP, risk assessment, incident response plan, BCP, vendor inventory with agreements. If any of these do not exist, create them. If they exist but are outdated, update them. Store them in a single, organized location where you can produce them within a day of receiving a document request.
  2. Verify your technical posture matches your policies. If your WISP says you enforce email authentication, confirm your DMARC record exists and is set to p=reject or p=quarantine. If your policy says you use MFA, confirm it is enabled on every system that accesses client data. The gap between what you write and what you deploy is the single most dangerous finding in an examination.
  3. Train your team on the interview. The CCO should be able to describe the cybersecurity program. The IT contact should be able to explain patch management, access controls, and incident detection. The principal should be able to articulate their role in cybersecurity governance. These are not trick questions — they just require that the people responsible actually know what they are responsible for.
  4. Review your vendor agreements. Check every third-party service provider agreement for breach notification clauses, data handling terms, and right-to-audit provisions. If those clauses are missing, negotiate amendments now — not after the document request arrives.
  5. Maintain an incident log.Even if nothing has happened, document that. A log showing "No reportable incidents during this period" with dates is better than no log at all. If incidents did occur, document the detection, response, and resolution.
  6. Do a dry run. Pull out the SEC's published cybersecurity examination checklist and go through it as if the document request just arrived. Can you produce everything? How long does it take? Where are the gaps? Finding gaps now is preparation. Finding them during an exam is a deficiency.

How BlackSheep fits in

BlackSheep's RIA compliance platform is built around the SEC examination process. It generates and maintains your WISP, risk assessment, and incident response plan with the language examiners expect. It continuously monitors your domain for the same technical signals examiners check — DMARC, SPF, SSL, security headers — and flags gaps between your policies and your actual posture before an examiner does.

When the document request arrives, everything is already organized, current, and exportable. No scrambling. No two-week fire drill.

Find out what a SEC examiner would see on your domain today.

Run a free security scan

Free download: SEC Reg S-P compliance checklist

27-point checklist covering every Reg S-P requirement. Know exactly where your firm stands before the June 2026 deadline.

No spam. Unsubscribe anytime.