Cybersecurity Risk Assessment Checklist
Governance and Risk Management
Document the named CISO (or virtual CISO), incident response lead, and backup deputy in the firm's WISP. NYDFS Part 500 and the SEC's proposed Reg S-P amendments both expect a designated, documented owner — not a shared inbox. Confirm coverage during PTO and CCO transitions.
Walk the written information security program against the FTC Safeguards Rule elements: risk assessment, access controls, encryption, MFA, monitoring, training, incident response, and vendor oversight. Flag any element where the written policy doesn't match current practice — auditors compare both.
List every system that holds NPI (nonpublic personal information) or client account data: CRM (Wealthbox / Redtail / Salesforce FSC), portfolio management (Black Diamond / Orion / Tamarac / Addepar), planning (eMoney / MoneyGuide / RightCapital), custodian portals, email archive, and any shadow SaaS the team has signed up for.
Score likelihood and impact for each in-scope system using the firm's risk matrix (NIST CSF or CIS Controls mapping is typical). Document residual risk after compensating controls — not just inherent risk. The aggregate rating drives whether an emergency board session is convened.
Present residual risk, top three remediation priorities, and budget asks at the next regularly scheduled board or management committee meeting. Capture the meeting minutes — SEC examiners and NYDFS regularly ask for evidence that cybersecurity reaches the board, not just IT.
A High residual risk rating warrants a same-week briefing rather than waiting for the next quarterly meeting. Walk through the specific findings, recommended interim controls, and a 30/60/90-day remediation plan with named owners.
Access Controls and Authentication
Verify that Schwab Advisor Center, Fidelity Wealthscape, Pershing NetX360, Altruist, and the firm CRM all require MFA — preferably authenticator app or hardware key, not SMS. Spot-check a sample of advisor and CSA accounts; SMS-only fallback is a common audit finding.
Pull the HR JML log for the last 12 months and reconcile against current access lists in every regulated system. The recurring gotcha: a paraplanner who moved teams still has access to the prior team's client folder, or a terminated rep still has a Schwab login because IT closed Active Directory but not the custodian profile.
Admin rights in Tamarac, Orion Eclipse, iRebal, or Black Diamond can move money, change models, or export entire client books. Confirm each privileged user is still in role and that the count matches the last quarterly attestation.
Inventory non-human accounts: data feed credentials between the custodian and PMS, integration tokens between the CRM and planning software, vendor API keys. Rotate any key older than 12 months and disable any service account whose business owner can no longer be identified.
Verify that read access to NPI in the CRM, document portal, and custodian downloads is logged and retained per books-and-records (SEC Rule 204-2: 5 years, first 2 onsite). Sample a recent week's logs to confirm they are actually being captured, not just configured.
Data Protection and Encryption
Map each data store to a tier: NPI (SSN, account numbers, balances), confidential (planning assumptions, meeting notes), and internal. The classification drives encryption, retention, and disposal requirements downstream.
Daily position and transaction files from Schwab, Fidelity, and Pershing often land on a network share or local drive before import. Confirm those landing zones are encrypted (BitLocker, FileVault, or AES-256 on the file server) and that the import job purges the file after load.
A backup that has never been restored is not a backup. Restore a sample of the PMS database, CRM export, and document portal to an isolated environment and confirm the data opens cleanly. Capture screenshots and the restore timestamp as audit evidence.
Pull certificates of destruction for any laptop, server, or copier hard drive retired since the last assessment. Lease-return copiers are a recurring blind spot — the multifunction unit at the front desk has a hard drive that scanned every client tax return for three years.
Confirm Smarsh, Global Relay, or Bloomberg Vault is capturing every advisor's email, LinkedIn DMs, and approved texting channel (MyRepChat, Hearsay Relate). The SEC's $2B+ in off-channel sweep penalties through 2024 came from personal text and WhatsApp use — spot-check that the policy is enforced, not just written.
Incident Response and Recovery
Walk through a scenario where the CRM and document portal are encrypted on a Friday afternoon. Test the call tree, custodian notification, cyber insurance hotline, and outside counsel engagement. The most common gap surfaced: nobody has the cyber insurer's 24/7 hotline number in their phone.
Log each gap with a named owner, target date, and verification method. Examiners look for the loop being closed — a tabletop that surfaced gaps two years running with no remediation log is worse than not doing the tabletop.
Public companies (and many BDs) must file an 8-K Item 1.05 within four business days of determining a material cybersecurity incident. Confirm the materiality determination process is documented and that disclosure counsel is on the IR call tree. Even non-public RIAs should mirror the four-day cadence for client notification.
The amended FTC Safeguards Rule requires notification to the FTC within 30 days of discovering an incident affecting 500+ consumers. State breach notification laws (CCPA, NY SHIELD, MA 201 CMR 17) layer on top with their own timelines and content requirements. Confirm the template letter, FTC notification path, and state-by-state matrix are current.
If the primary office is down, can advisors still place trades and process distributions through the custodian's web portal from a clean device? Walk through the steps with a sample advisor on a non-firm laptop. Confirm that hardware MFA tokens travel with the advisor or are recoverable.
Revise the incident response plan with any updated phone numbers, vendor contacts, and decision-tree changes from the tabletop. Re-circulate to the IR team and capture acknowledgments — version control matters when an examiner asks which IRP was in effect during a real incident.
Vendor and Third-Party Risk Management
Critical vendors include the custodian, PMS, CRM, planning software, email archive, and managed IT provider. Refresh the due diligence questionnaire, ownership/control changes, financial health, and any reportable incidents in the past 12 months.
Read the exception sections — not just the cover page. Confirm the report covers the period since the last review with no gap, that complementary user entity controls (CUECs) the vendor expects you to perform are actually being performed, and that no material exceptions go unaddressed.
Request the vendor's remediation plan and target dates in writing. If the exception touches a control the firm relies on (encryption, access review, change management), document the compensating control the firm will run until the vendor closes the gap.
Each material vendor's MSA should commit to notification within 72 hours (or sooner) of a security incident affecting firm or client data. Older contracts often have weak or no notification language — flag for renegotiation at the next renewal.
Every vendor and its named principals should be screened against the OFAC SDN list at onboarding and re-screened at least annually. Tools like Refinitiv World-Check, LexisNexis Bridger, or ComplyAdvantage automate the recurring screen — manual one-time checks at onboarding are a recurring exam finding.
The CCO signs the consolidated vendor risk register and attaches it to the assessment file. The register should show every material vendor's tier, last DD date, SOC 2 status, and any open exceptions — this is the single document an examiner will ask for first.
Use this template in Manifestly
- Cybersecurity Protocol Checklist
- Cybersecurity Checklist for Real Estate
- Manufacturing Cybersecurity Checklist
- Cyber Security Checklist
- Data Security Checklist
- Disaster Recovery Checklist
- Cybersecurity Incident Response Checklist
- Network Security Checklist
- IT Asset Inventory Management Checklist
- Insurance IT Security Review Checklist
- Data Security Review Checklist
- Financial Services IT Security Audit Checklist
- Cybersecurity Incident Response Checklist
- Motor Carrier Cybersecurity Protocol Checklist
- Risk Management Checklist
- Regulatory Compliance Checklist
- Quarterly Internal Control Review Checklist
- Sales Tax Reporting Checklist
- Legal Entity Management Checklist
- Employee File Audit Checklist
- Anti-Money Laundering Compliance Checklist
- SOX Compliance Checklist
- GDPR Compliance Review Checklist
- IT Security Audit Checklist
- HR Compliance Checklist
- Payroll Processing Checklist
- Building Code Compliance Checklist
- Employee Records Management Checklist
- Legal Document Storage Checklist
- Security Audit Checklist
- Property Risk Assessment Checklist
- Property Safety Inspection Checklist
- Cybersecurity Protocol Checklist
- Fair Housing Compliance Checklist
- Legal Compliance Checklist for New Properties
- Lease Agreement Checklist
- Software Licensing Compliance Checklist
- PCI DSS Compliance Checklist
- Real Estate Legal Compliance Checklist
- HIPAA Compliance Checklist
- MLS Listing Review Checklist
- Real Estate License Renewal Checklist
- GDPR Compliance Checklist
- Real Estate Contract Review Checklist
- Fair Housing Compliance Audit
- Listing Agreement Intake Checklist
- ISO/IEC 27001 Compliance Checklist
- HR Compliance Checklist
- Real Estate Ethics & Compliance Review
- Brokerage Trust Account Management Checklist
- Real Estate Professional Development Checklist
- Brokerage Technology Inventory Audit
- Real Estate Website Audit Checklist
- Continuing Education Checklist
- Employee Termination Checklist
- Employee Records File Audit
- Regulatory Compliance Checklist
- Brokerage HR Policy Compliance Checklist
- Employee Handbook Annual Review
- Employee Termination Checklist
- Data Privacy Compliance Checklist
- Risk Management Checklist
- Insurance Compliance Checklist
- Complaint Resolution Checklist
- Financial Audit Checklist
- Data Security Checklist
- Risk Mitigation Checklist
- Claims Auditing Checklist
- Quarterly Industry Standards Compliance Review
- Insurance Training and Development Checklist
- Anti-Money Laundering Checklist
- Training Evaluation Checklist
- Manufacturing Regulatory Compliance Checklist
- Training Needs Assessment Checklist
- Skills Development Checklist
- Audit Preparation Checklist
- Network Security Checklist
- Employee Offboarding Checklist
- IT Asset Inventory Management Checklist
- Regulatory Reporting Checklist
- Compliance Audit Checklist
- Insurance Program Initiation Checklist
- Insurance Program Launch Project Monitoring Checklist
- Training Materials Checklist
- Quarterly Risk Monitoring Checklist
- System Backup Checklist
- Employee Benefits Checklist
- Insurance Program Launch Execution Checklist
- Insurance Marketing Campaign Checklist
- Email Compliance Checklist
- Law Firm Compliance Checklist
- Anti-Money Laundering Compliance Checklist
- Law Firm Compliance Checklist
- Professional Responsibility Compliance Review
- Data Privacy Compliance Checklist
- Law Firm Risk Management Checklist
- HR Audit Checklist
- HR Compliance Checklist
- Email Deliverability Checklist
- Law Firm Ethics Compliance Review
- Document Retention Policy Checklist
- Employee File Audit Checklist
- Law Firm Risk Management Checklist
- Cloud Security Checklist
- User Access Review Checklist
- IT Regulatory Compliance Review
- Compliance Audit Checklist
- Security Audit Checklist
- Business Continuity Checklist
- Employee Termination Checklist
- Quarterly Operations and Compliance QA Review
- Expense Management Checklist
- Advisor and Employee Onboarding Checklist
- Client Satisfaction Survey Checklist
- Operational Risk Checklist
- Know Your Customer (KYC) Checklist
- Litigation Preparation Checklist
- Contract Review Checklist
- New Hire Onboarding Checklist
- Client Onboarding Checklist
- Contract Review Checklist
- Regulatory Compliance Checklist
- Monthly Financial Reporting Checklist
- Regulatory Reporting Checklist
- Intellectual Property Management Checklist
- Internal Audit Checklist
- Lead Generation Checklist
- Annual Financial Reporting Checklist
- Annual Compliance Program Review
- Annual Risk Assessment Checklist
- Data Security Review Checklist
- Quarterly Performance Measurement Checklist
- Financial Services Project Initiation Checklist
- IT Policy Review Checklist
- Data Protection Checklist
- E-commerce Sales Tax Reporting Checklist
- Project Execution Checklist
- Project Planning Checklist
- Project Monitoring Checklist
- Financial Statement Review Checklist
- Quarterly Compliance Monitoring Checklist
- Project Closure Checklist
- Financial Services IT Security Audit Checklist
- PCI DSS Compliance Checklist
- Advisor and Staff Onboarding Checklist
- Cybersecurity Incident Response Checklist
- E-commerce Risk Management Checklist
- CRM Data Entry Checklist
- Business Continuity Plan Checklist
- E-commerce Legal Compliance Checklist
- Vendor Contract Review Checklist
- Annual Risk Management Review Checklist
- Risk Assessment Checklist
- Agency Compliance and Risk Management Checklist
- Annual School Compliance Audit
- School First Aid and Emergency Medication Audit
- Motor Carrier TSA Security Compliance Checklist
- Internal Controls Checklist
- Client Communication Checklist
- Restaurant Permit and Licensing Renewal Checklist
- New Hire Paperwork Checklist
- Restaurant Policy Update Checklist
- Restaurant New Hire Checklist
- Annual Attorney Professional Conduct Review
- International Fuel Tax Agreement (IFTA) Quarterly Filing Checklist
- Restaurant Licensing Renewal Checklist
- Marketing Strategy Checklist
- Department of Transportation (DOT) Audit Checklist
- Retail Policy Update and Compliance Checklist
- Business Continuity Checklist
- KYC Checklist
- Employee Termination Checklist
- Accounts Receivable Checklist
- Employee Performance Review Checklist
- Quarterly Operations and Compliance QA Review
- Quarterly Financial Reporting Checklist
- RIA Acquisition Due Diligence Checklist
- Credit Risk Checklist
- Daily Operations Checklist
- Client Satisfaction Survey Checklist
- Operational Risk Checklist
- Know Your Customer (KYC) Checklist
- Anti-Money Laundering (AML) Checklist
- Litigation Preparation Checklist
- Contract Review Checklist
- New Hire Onboarding Checklist
- Client Onboarding Checklist
- Contract Review Checklist
- AML / BSA Compliance Checklist
- Regulatory Compliance Checklist
- Monthly Financial Reporting Checklist
- Regulatory Reporting Checklist
- Practice Process Improvement Review
- Internal Audit Checklist
- Lead Generation Checklist
- Annual Financial Reporting Checklist
- Annual Compliance Program Review
- Month-End Close Checklist
- Disaster Recovery Checklist
- Annual Risk Assessment Checklist
- Advisory Firm Operational Efficiency Review
- Data Security Review Checklist
- Client Risk Profile Checklist
- Quarterly Performance Measurement Checklist
- Financial Services Project Initiation Checklist
- Client Retention Checklist
- Vendor Management Checklist
- Sales Pipeline Checklist
- Campaign Performance Checklist
- Data Protection Checklist
- Investment Due Diligence Checklist
- Asset Allocation Checklist
- Portfolio Management Checklist
- Project Execution Checklist
- Project Planning Checklist
- Project Monitoring Checklist
- Financial Statement Review Checklist
- Project Closure Checklist
- Financial Services IT Security Audit Checklist
- Advisor and Staff Onboarding Checklist
- Annual Budget Planning Checklist
- Business Continuity Plan Checklist
- Annual Risk Management Review Checklist
- Internal Controls Checklist
- Client Onboarding Checklist
- Client Communication Checklist
- Annual Client Review Checklist
- Market Risk Checklist
- Marketing Strategy Checklist
Ready to take control of your recurring tasks?
Start Free 14-Day TrialUse Slack? Sign up with one click
