Threat Landscape
Capital markets infrastructure has the highest disclosure obligation, the lowest tolerance for downtime, and the most opaque attack surface.
Capital markets infrastructure occupies a regulatory niche distinct from retail banking. The institutions concerned — exchanges, central counterparty clearers, settlement systems, broker-dealers, investment advisers, transfer agents — operate under prescriptive regulatory regimes (SEC Regulation SCI, Regulation S-P, FINRA rules, the EU Markets in Financial Instruments Directive, and equivalents) that impose specific notification, recordkeeping, and operational-resilience obligations. Cyber incidents in these institutions are themselves regulated events.
The 2024 SEC enforcement action against Intercontinental Exchange, the New York Stock Exchange, and seven affiliated registered entities is the canonical illustration. ICE detected a VPN intrusion in April 2021 and concluded internally within four days that the event was de minimis. The SEC found that the four-day delay itself constituted a violation: under Regulation SCI, registered entities must immediately notify the Commission of cyber intrusions and provide an update within 24 hours unless they can immediately conclude the event is de minimis. The respondents settled by paying USD 10 million collectively. [01]
In capital markets, the disclosure obligation is the second-order risk. The first-order risk is the breach you cannot disclose because you cannot prove what was disclosed.
The 2024 amendments to SEC Regulation S-P, effective August 2024, brought broker-dealers, registered investment advisers, investment companies, and transfer agents within a 30-day individual-notification window for breaches of sensitive customer information. The amendments mark the SEC's commitment to converging financial-services breach standards on the model already established for banking under Gramm-Leach-Bliley. [02]