In our onboarding calls with financial services firms, the first question we ask is structural: are you an RIA, a broker-dealer, or both? The answer changes almost everything about the technology program we recommend. The two frameworks share common ground on client data protection and cybersecurity hygiene, but the examination cadence, the records regime, the supervision obligations, and the regulator relationships are materially different. Firms that run a single unified IT program across both registrations usually end up under-serving one side of the house.
The Framework Overview
A registered investment adviser is regulated primarily by the SEC (for advisers managing more than $110 million in assets) or by state securities regulators (for smaller advisers). The core obligations live in the Investment Advisers Act of 1940, its associated rules — especially Rule 206(4)-7 on compliance programs and Rule 204-2 on books and records — and the recently amended Regulation S-P. Examinations are conducted by the SEC's Division of Examinations, with a focus on fiduciary duty, disclosures, and the compliance program.
A broker-dealer is regulated by the SEC and FINRA, with a heavier emphasis on FINRA rulemaking and enforcement. Supervision (Rule 3110), books and records (Rule 4511 and SEC 17a-4), electronic communications retention, and customer protection dominate the examination focus. The technology expectations are higher in several areas — WORM-compliant archiving, systematic supervisory review, mandatory communications capture — because the rule text is more prescriptive than the adviser equivalents.
Dually registered firms have to satisfy both frameworks simultaneously. In practice, that means the broker-dealer side drives the technology baseline, because its requirements are almost always stricter, and the RIA side layers on specific obligations — performance advertising recordkeeping, adviser-specific disclosures, the fiduciary supervision framework — that the BD requirements do not cover.
Books and Records: The Biggest Technical Divergence
The records regime is where the two frameworks diverge most visibly in IT terms. Under SEC Rule 204-2, RIAs must retain specific categories of records for at least five years, with the first two immediately accessible. The rule lists roughly a dozen record classes — advisory contracts, performance records, communications, written policies, complaint files, and others — with some variations for corporate documents and trade records.
Under SEC Rule 17a-4, broker-dealers face a longer list of record classes with different retention periods — six years for some records, three for others, and a lifetime obligation for partnership agreements and articles of incorporation. More importantly, 17a-4 requires specific technical characteristics for electronic storage: non-rewriteable, non-erasable preservation, serialized indexing, automated verification, and a third-party downloader designation. RIAs have a general obligation to maintain records in a reliable format, but the WORM-specific technical attestations do not apply in the same way.
Operationally, this means a dually registered firm needs WORM-grade archive infrastructure for the BD side, which by extension protects the RIA records as well. A pure RIA can satisfy its obligations with a well-governed cloud archive that does not carry the full 17a-4 technical attestations — though the trend among larger RIAs is to adopt WORM-grade infrastructure anyway, because institutional clients and cyber insurers are starting to expect it.
Supervision of Electronic Communications
FINRA Rule 3110 imposes a systematic supervisory review obligation on broker-dealers: every electronic communication by a registered rep must flow into a supervision system with lexicon-based alerting, principal review, and a documented audit trail. The rule does not require human review of every message, but it does require a reasonable program that detects the patterns FINRA has flagged in enforcement actions.
RIAs have a more general supervision obligation under Rule 206(4)-7 — the compliance program must be reasonably designed to prevent violations of the Advisers Act. Many large RIAs voluntarily operate a similar supervisory review program, and the SEC has signaled in recent risk alerts that it expects some level of systematic review for firms of size. But the rule text is less prescriptive, and smaller RIAs can often satisfy the obligation through a combination of written policies, training, and spot-check review rather than a full supervision platform.
For dually registered firms, the BD requirement drives the solution. Once you have a supervision platform in place for the rep population, extending it across the adviser population is incremental effort with meaningful compliance benefit.
Examination Cadence and Style
The examination experience differs sharply between the two frameworks. FINRA runs its own examination program for broker-dealers, typically on a one-to-four-year cycle depending on firm risk profile, with cause exams triggered by complaints, terminations, or anomalous activity. The SEC's exam program for RIAs has historically been less frequent — a typical adviser goes years between routine examinations — though the SEC has increased coverage and the cadence is now closer to every five to seven years for most advisers.
The evidentiary expectations also differ. A FINRA exam is typically more granular on supervision and records — expect to produce specific communication samples, a trial-balance export, and evidence that your supervisory reviews actually happened. An SEC adviser exam tends to go broader, covering the compliance program, fiduciary conduct, disclosures, and portfolio management practices alongside records and cybersecurity.
For a dually registered firm, this means maintaining two sets of exam-readiness artifacts that overlap but are not identical. The technology team should know which repository the FINRA examiner wants and which one the SEC examiner wants.
Cybersecurity: Converging Rather Than Diverging
The one area where the two frameworks are converging is cybersecurity. FINRA's Notice 22-29 and the SEC's 2024 Reg S-P amendments describe a strikingly similar baseline: MFA everywhere, EDR with monitored response, immutable backups, a written incident response program exercised annually, vendor risk management, comprehensive logging, and customer authentication controls. A firm that builds its cybersecurity program to the higher of the two bars usually satisfies both.
The remaining differences are procedural. Reg S-P imposes a specific 30-day customer notification obligation under defined conditions; FINRA guidance does not carry the same federal clock, though state breach notification laws apply. FINRA's supervision lens puts more weight on e-communications controls, while the SEC's adviser lens puts more weight on the integration of cybersecurity into the compliance program.
Practical Implications for Your IT Program
If you are a pure RIA: build to Reg S-P plus Rule 204-2. Your baseline is MFA, EDR, incident response, vendor oversight, archive with five-year retention, and a compliance program that integrates cybersecurity. WORM-grade archiving is optional but increasingly expected.
If you are a pure broker-dealer: build to Rule 17a-4, Rule 3110, Rule 4511, and Notice 22-29. Your baseline is WORM archive, full e-communications capture and supervisory review, formal branch-level controls, and the full cyber hygiene package.
If you are dually registered: build to the broker-dealer baseline and extend it to cover the adviser-specific record categories, performance advertising retention, and the fiduciary compliance program. Run one unified cybersecurity program with clear documentation for each registration.
For a deeper walk through your specific registration and technology stack, our financial services team can run a structured assessment that maps existing controls to each framework and identifies gaps. Schedule a consultation to get started.
About the Author
Team Techvera
Techvera Team
Articles written collaboratively by the Techvera team, combining expertise across cybersecurity, managed services, and digital transformation.
