Attorney Tips
February 2, 2025
Responsible Use of AI Intelligent Agents in the Securities Industry
Artificial Intelligence (AI) Intelligent Agents (Algorithmic Trading Systems, AI/Machine Learning Models or Automated Investment Tools) are rapidly becoming part of the securities industry’s operational set up, from trade execution to compliance surveillance and client communication. But without proper governance, these tools can introduce regulatory, operational, and reputational risks.
Intelligent Agents should be governed as regulated participants, not just digital tools. Firms should approach them as high-tiered digital employees, with assigned responsibilities, monitored actions, and enforced accountability.
Action Items & Compliance Risk Mitigation:
• Supervisory Controls: Apply FINRA Rules 3110/3120 to Intelligent Agent activity. Implement logs, alerts, and audit trails.
• Digital Personnel Files: Maintain Intelligent Agent “profiles” with documented use case, data access, model lineage, and risk tier.
• Employee-Level Governance: Treat Intelligent Agents like high-sensitivity employees. Monitor behaviors, apply access controls, and regularly review for misconduct or drift.
• Explainability Standards: Enforce decision transparency, especially in client-facing logic or trading algorithms.
• Licensing Awareness: Evaluate whether Intelligent Agent functions require registered rep oversight or trigger licensing obligations.
• Human Oversight: Maintain active, qualified human supervision over Intelligent Agent activities. AI must support, not replace, compliance accountability.
• AI Incident Playbooks: Update cybersecurity response plans to include anomalies, data misuse, or model failure.
If you are considering or have implemented AI Intelligent Agents, we encourage you to review internal protocols to ensure compliance. For assistance, give us a call at 619.298.2880 or email [email protected].
Roadmap for Evolving Cybersecurity Regulations
The financial services sector continues to face mounting regulatory scrutiny and cybersecurity threats. RIAs, Broker-Dealers, and Investment Advisers must establish a comprehensive cybersecurity roadmap to meet evolving obligations under related regulations. Below is a sample five-year plan:
Year 1:
• Implement MFA across all internal systems
• Encrypt all stored client data
• Review and update cyber insurance coverage
• Maintain a current, written Incident Response Plan
Year 2:
• Strengthen endpoint detection tools
• Upgrade firewalls with advanced technology
Year 3:
• Conduct breach simulations to train staff
• Engage a trusted Managed Detection & Response provider with 24/7 monitoring
Year 4:
• Appoint a dedicated Privacy Officer
• Track compliance in line with jurisdictional regulations
Year 5:
• Provide clients with a secure portal and document vault
• Launch real-time fund dashboards for enhanced transparency
Cybersecurity Obligations: Implementing Regulation S-P
The SEC’s amendments to Regulation S-P significantly heighten cybersecurity obligations for financial firms. By December 3, 2025 (or June 3, 2026 for smaller entities), firms must have a comprehensive incident response program to detect, respond to, and recover from unauthorized access to customer information.
Key requirements include:
– Incident Response Program – Establish written policies to address data breaches and unauthorized access.
– Customer Notification – Notify affected individuals within 30 days of discovering unauthorized use of sensitive information.
– Service Provider Oversight – Ensure third-party vendors handling customer data maintain strong security measures.
Failure to comply could result in enforcement actions and reputational harm. Start now by reviewing your cybersecurity policies, vendor agreements, and incident response procedures to ensure compliance. The deadline may seem distant, but early preparation is critical.
For assistance with your cybersecurity compliance or to assess your firm’s readiness and mitigate risks, please call 619.298.2880 or email [email protected].
Importance of Implementing a Comprehensive Cyber-Attack Response Plan
Developing and maintaining a comprehensive cyber-attack response plan is essential for mitigating damage, ensuring swift response and recovery, maintaining integrity of operations, and meeting SEC and other regulatory agencies’ compliance requirements.
For those in the financial services sector, a comprehensive incident response plan should be created to guide the organization through the steps necessary to identify, contain, and mitigate the effects of a security breach. This plan must include:
– Communication Strategies: A clear approach for notifying affected clients, regulatory bodies, and internal stakeholders. These communications should be timely, transparent, and compliant with regulatory obligations to ensure proper disclosure and mitigate potential reputational harm.
– Regular Testing and Mock Scenarios: To ensure readiness, the plan should be tested through regular drills that simulate real-world cyber-attacks. This prepares staff to act quickly and efficiently under pressure, minimizing the potential impact of the breach.
– Proactive Threat Preparedness: Taking proactive measures to strengthen defenses against cyber threats not only reduces downtime but also ensures that client data remains secure. This enhances confidence among clients and regulators, fostering trust and maintaining the firm’s reputation.
Preparing for cyber incidents ahead of time can significantly reduce the impact of security breaches and ensure a quicker recovery while maintaining compliance and client trust.
MFA in Cybersecurity Compliance
Multi-factor authentication (MFA) is essential for enhancing security and meeting regulatory compliance in the finance sector. By requiring multiple forms of verification before granting access, MFA adds a layer of protection that reduces the risk of unauthorized access, even if passwords are compromised. It is vital for complying with regulations such as SEC Regulation S-P, FINRA Rule 4370, and the Gramm-Leach-Bliley Act, which mandate robust security measures for protecting financial data.
Key action steps for MFA compliance include:
For help with your cybersecurity policies and protocols, contact us at 619.298.2880 or email [email protected]
Kathryn Konzen, Esq., is the Director of Operations and Counsel at Jacko Law Group, PC. With over 15 years of experience in the legal profession, Ms. Konzen brings a diverse range of expertise in area...