C · 10 / Financial-Services Security

Security for institutions
that regulators audit annually.

FFIEC Cybersecurity Assessment Tool readiness. SOX Section 404 / ITGC. GLBA Safeguards including the 2023 30-day notification amendment. PCI-DSS v4.0.1. SEC Rule 17a-4. NYDFS 23 NYCRR 500. Tennessee Department of Financial Institutions and Mississippi Department of Banking state requirements. FinCEN / Bank Secrecy Act for MSBs and virtual-asset service providers. Delivered with audit-ready evidence packets, board-ready decks, examiner-ready Plans of Action and Milestones, and remediation roadmaps with regulatory priority tagging. When the examiner shows up, you will already have answered their questions.

FrameworksFFIEC · GLBA · SOX PCI · NYDFS · SEC · FinCEN
Client typesBanks · CUs · Broker-dealers RIAs · fintech BaaS · MSBs
Practice leadSecurityX · CISM · CySA+ DoD 8140 baseline
IR notificationOCC · FDIC · SEC State · FinCEN · NYDFS
Audit prepEvidence · POA&M · board examiner-ready
Tennessee postureTN DFI ready Memphis HQ
9
Regulatory frameworks
FFIEC, GLBA, SOX ITGC, PCI-DSS v4, SEC 17a-4, NYDFS, state banking (TN + MS), FinCEN / BSA, and FTC Safeguards — covered end-to-end under one engagement.
30 d
GLBA amendment clock
The 2023 FTC amendment to the GLBA Safeguards Rule now requires notification of notification events affecting 500+ consumers. Our IR retainer includes the workflow.
36 hr
Bank incident notification
Federal banking agencies' Computer-Security Incident Notification rule requires notification of primary federal regulator within 36 hours. We coordinate for you.
Annual
FFIEC CAT cadence
The Cybersecurity Assessment Tool isn't mandatory, but examiners expect it. We refresh it annually and keep the evidence binder exam-ready.
01 / Why a dedicated practice

Financial services is
its own discipline.

A community bank in Tennessee, a credit union in Mississippi, a broker-dealer in Memphis, a Nashville fintech running a Banking-as-a-Service program with a chartered bank partner — every one of these institutions operates under a regulatory stack that a generalist cyber practice will get wrong in two ways: it will miss requirements that are load-bearing during exam week, and it will over-engineer in places the examiner does not care about. We run this practice because the cost of either failure is measurable in dollars and sometimes in charter conditions.

Financial-services cyber is not just NIST with a different cover page. It is FFIEC's inherent-risk-versus-maturity framing, which examiners use as a conversation starter and then follow wherever the answers lead. It is GLBA's Safeguards Rule, which the FTC amended in 2023 with a 30-day notification obligation for non-bank financial institutions — a change that caught a surprising number of programs flat-footed. It is SOX ITGC, where the external audit partner cares about a different set of controls than any cyber framework ever enumerates. It is PCI-DSS v4.0.1, whose future-dated requirements — authenticated scanning, phishing-resistant MFA for CDE access, customized-approach option, scope reduction — are now in effect as of March 31, 2025. It is NYDFS 23 NYCRR 500, which effectively sets the state-level floor because institutions operating across multiple states find it easier to comply with DFS once than to manage a fifty-state patchwork.

We run a team that has lived through FDIC exams, OCC visits, NCUA ISE reviews, state DFI exams in Tennessee and Mississippi, PCAOB-aligned SOX audits, SEC broker-dealer recordkeeping reviews, and FinCEN MSB examinations. The discipline is the same across regulators: know the framework, know the evidence, know the control owner, know the narrative. When your examiner walks in, your program should be telling them what they are about to find before they find it. That is what a mature examiner-readiness program looks like, and it is what this practice is built to deliver.

The work ties directly into our penetration-testing practice, our secure code review, our incident-response retainer, and our managed SOC. A financial-services client who wants all of it under one contract gets one commander, one after-action process, and one signature on the board deck.

02 / Regulatory frameworks

Nine frameworks.
One coordinated program.

Most institutions we work with operate under four to six of these frameworks simultaneously. We map them against a single control baseline so evidence work is not duplicated, and we tag each control with the regulators that cite it — so when an examiner requests evidence for FFIEC Control 7.2, we can pull the same artifact that satisfies NYDFS 500.2, GLBA 314.4, and PCI-DSS 8.3 without running the control test four times.

01
Federal banking

FFIEC CAT & IT Examination Handbook

The de facto framework for US bank and credit union exams. Inherent Risk Profile plus Cybersecurity Maturity across five domains. Used by FDIC, OCC, Federal Reserve, and NCUA. Annual refresh, board presentation, examiner binder.

FDIC · OCC · Fed · NCUA
02
Public companies

SOX 404 / ITGC

Section 404 IT general controls supporting financial reporting: change management, logical access, computer operations, SDLC. PCAOB-aligned workpapers, external-audit coordination, control-owner interview preparation.

SEC · PCAOB · external audit
03
GLBA

GLBA Safeguards Rule (2023 amendment)

Qualified-individual designation, written risk assessment, access controls, encryption at rest and in transit, MFA, secure-development practices, training, incident-response plan, and the new 30-day customer notification for 500+-consumer notification events.

FTC · federal banking agencies
04
Card payments

PCI-DSS v4.0.1

Full v4.0.1 scope across the twelve requirements. Future-dated requirements (now in effect as of March 31, 2025) including authenticated vulnerability scans, phishing-resistant MFA for CDE access, targeted risk analyses, and the customized-approach option.

PCI SSC · QSA · card brands
05
Broker-dealers

SEC Rule 17a-4

Broker-dealer records-retention including the 2022 amendment that permits electronic storage with audit-trail or WORM alternatives. Records inventory, retention-schedule mapping, third-party designated-officer arrangement, and the reasonable-accessibility standard.

SEC · FINRA · DTCC
06
New York

NYDFS 23 NYCRR 500

Covered-entity risk assessment, CISO designation, written program, MFA, encryption, training, incident reporting (72-hour and 24-hour for ransomware payment), independent audit for Class A, annual Certification of Material Compliance.

NYDFS · BitLicense overlap
07
State banking

TN DFI & MS DOB

Tennessee Department of Financial Institutions and Mississippi Department of Banking each run their own IT examinations aligned with FFIEC. State-specific requirements for money transmitters, trust-company subsidiaries, and state-chartered institutions.

TN DFI · MS DOB · state exams
08
AML / MSBs

FinCEN / Bank Secrecy Act

BSA/AML programme IT controls, SAR/CTR filing-system security, 314(a) / 314(b) data handling, MSB registration IT dependencies, state money-transmitter IT components, and FinCEN exam coordination. Legal program runs with your FinCEN counsel.

FinCEN · IRS · state MT regulators
09
FTC Safeguards

FTC Non-bank Financial Rule

FTC jurisdiction over non-bank financial institutions — mortgage lenders, payday lenders, tax-prep firms, automobile-financing companies — under the revised Safeguards Rule. Same core controls as GLBA but with FTC enforcement posture.

FTC · CFPB-adjacent
03 / Institution types

Ten institution types.
One practice.

Each institution type lands in a different regulatory envelope. We staff and scope accordingly — a community bank's exam stack is not a broker-dealer's, a fintech-partnered BaaS arrangement is not a pure-play RIA, and a crypto on-ramp under FinCEN is not a chartered bank. Ten shapes; one cohesive practice.

Type 01
Community banks

State and federally chartered, $500M–$5B, FFIEC exam track with state DFI overlay.

Type 02
Credit unions

State-chartered and federally chartered. NCUA ISE reviews and state-specific supervisory cycles.

Type 03
De novo banks

Pre-charter and first-three-years. OCC, state, or Fed examination preparedness baseline.

Type 04
Regional bank branches

Out-of-state institutions operating in TN and MS. Branch-level cyber oversight plus HQ reporting.

Type 05
Fintech BaaS

Fintechs partnered with a chartered bank. Joint program with the partner-bank's cyber and compliance teams.

Type 06
Wealth & RIA

Registered Investment Advisers, SEC or state. Custody-rule cyber obligations plus SOX where relevant.

Type 07
Broker-dealers

FINRA member firms. SEC Rule 17a-4 plus FINRA cyber guidance. Exam-cycle coordination.

Type 08
Crypto / MSBs

FinCEN-registered money services businesses and virtual-asset service providers. State MT licensing overlay.

Type 09
Mortgage lenders

State-licensed and federally supervised. FTC Safeguards under Non-bank Financial Rule.

Type 10
Payment processors

Merchant acquirers, ISOs, and payment-facilitator arrangements. PCI-DSS Level 1 and card-brand compliance.

04 / Service bundle

Eight engagement shapes.
One signature.

The service bundle is modular. Most institutions engage for one or two items initially and expand from there; a few engage for the full stack when a new CISO is on-boarding, when an exam finding requires broad remediation, or when a de novo charter is preparing for its first supervisory cycle.

01 · FFIEC CATAnnual

FFIEC CAT readiness

Cybersecurity Assessment Tool workbook completion, maturity-claim evidence validation, gap-to-target roadmap, and board presentation. Annual refresh on a subscription cadence for continuous examiner readiness.

Workbook · evidence · board deck
02 · SOX ITGCAudit support

SOX ITGC audits

Section 404 ITGC testing-support engagements. PCAOB-aligned workpapers, external-audit firm coordination, control-owner interview prep, issue-tracking into your internal audit platform.

PCAOB · external audit · IA
03 · GLBARisk + notification

GLBA risk assessments

Full Safeguards Rule risk assessment against the 2023 amendment. Qualified-individual program, access controls, encryption, MFA, training, IR plan, and the new 30-day notification workflow — tested in a tabletop before it is ever needed.

Safeguards · 30-day amendment
04 · PCI-DSSv4.0.1

PCI-DSS scope reduction

Scope-reduction architecture first — tokenization, P2PE, CDE segmentation. Then v4.0.1 ROC or SAQ preparation, authenticated-scan integration, phishing-resistant MFA for CDE, and customized-approach where a different control path fits better.

v4.0.1 · ROC / SAQ · QSA-aligned
05 · NYDFS23 NYCRR 500

NYDFS 500 compliance

Gap assessment, CISO advisory support, MFA, encryption, training, 72-hour and 24-hour notification workflows, Class A independent audit prep, and the annual Certification of Material Compliance co-signed by executive and CISO.

CISO · certification · Class A
06 · Pen testFinancial-scoped

Penetration testing

Penetration testing scoped specifically to financial-services regulatory needs — internal and external network, web-app, API, and social-engineering. Delivered via our vulnerability-assessment practice, reported against FFIEC and PCI evidence format.

FFIEC · PCI · FINRA-aligned
07 · Code reviewAppSec

Secure code review

SAST, DAST, SCA, IaC, secrets, and manual review for banking cores, mobile banking apps, broker-dealer platforms, and fintech APIs. Delivered via our code-review practice, scoped to PCI Requirement 6 and SOX ITGC SDLC controls.

PCI 6 · SOX ITGC · SDLC
08 · IR + NotificationRegulatory

IR with regulatory notification

24/7 incident-response retainer tied to regulatory-notification workflow — OCC, FDIC, state banking, SEC, FinCEN, NYDFS, and customer notification under GLBA's 30-day rule. We draft, you review, counsel signs. The clock does not wait for a team to figure out who is on call.

OCC · FDIC · SEC · FinCEN · NYDFS
Regulator / Rule Window Trigger Filed to
Federal banking agencies 36 hours Computer-security incident affecting banking services "Good-faith belief" Primary federal regulator
NYDFS 500.17 72 hours Cybersecurity event required to be notified Superintendent NYDFS Superintendent portal
NYDFS 500.17(c) 24 hours Ransomware payment by covered entity 2023 amendment NYDFS Superintendent
GLBA Safeguards 314.4(j) 30 days Notification event affecting 500+ consumers FTC — non-bank FIs FTC web portal
SEC Form 8-K Item 1.05 4 business days Material cybersecurity incident Public-company issuers SEC EDGAR
State breach laws Varies (30–90 d) Unauthorized acquisition of PII 50-state patchwork State AG + affected residents
FinCEN SAR 30 days Suspicious activity threshold met BSA-regulated FinCEN BSA E-Filing
05 / How an engagement runs

Seven stages.
Audit-ready on delivery.

Every engagement runs the same seven stages. A full-stack engagement — new CISO on-boarding, de novo charter preparation, or post-exam remediation — runs all seven. A single-framework refresh (say, annual FFIEC CAT) runs stages one, two, five, six, seven in compressed form. The rigor is identical either way.

01

Regulatory scoping

We confirm every framework in play, every regulator with jurisdiction, every pending exam date, and every outstanding Matter Requiring Attention or exam finding. Output is the regulatory-stack memo that drives everything else.

DeliverableRegulatory stack memoDuration3–5 business days
02

Control-set mapping

Every required control across every in-scope framework mapped to a single de-duplicated master control list, with a named owner and a citation trail back to each regulator's specific citation. Evidence work is done once, used many places.

DeliverableMaster control matrixDuration5–10 business days
03

Evidence testing

Every control tested against actual operating artifact — screenshots, exports, policy documents, signed attestations, log samples. Every artifact stamped with collection date, method, owner, and framework citations it serves.

DeliverableEvidence binderDuration10–30 business days
04

Gap + POA&M

Every gap identified, characterized by severity and regulatory weight (which regulator cares, how much), and placed into a Plan of Action and Milestones with owner, timeline, budget, and verification method. The POA&M is examiner-ready on day one.

DeliverableExaminer-ready POA&MDuration5–7 business days
05

Board presentation

Executive deck covering posture, gaps, plan, budget, timeline, and residual risk — in the language boards and examiners both use. Delivered as PDF plus live presentation to the board (or the ISO committee that rolls up to the board).

DeliverableBoard deck + presentationDuration3–5 business days
06

Remediation execution

For engagements that extend into execution, we project-manage the remediation — stand up the controls, collect the evidence, tune the tooling, train the staff. Weekly status to your internal audit and risk committee; every milestone closed with evidence.

DeliverableWeekly status · milestone evidenceDurationOngoing · scoped
07

Exam support

When the examiner is on-site (or remote), we run a war room with your team — answer questions, pull artifacts, walk examiners through the evidence binder, and log everything into your internal issue-tracker so nothing goes missing between exam and exit meeting.

DeliverableWar-room support · exit memoDurationPer-exam · 2–4 weeks
06 / Deliverables

Four artifacts.
Examiner-ready on day one.

What you get, every engagement. Each deliverable is usable on the day it is handed over — examiner-ready, board-ready, auditor-ready, counsel-ready. Not a deck that still needs review.

Artifact 01

Audit-ready evidence packets

Organized by regulator, by framework, and by control citation. Each artifact stamped with collection date, owner, method, and reusable citation trail. Readable by your next examiner without a walk-through.

Evidence · citation-tagged
Artifact 02

Board-presentation decks

Posture summary, material gaps, plan of remediation, timeline, budget, residual risk. Written in the language examiners read when they flip to your board minutes — calm, specific, non-defensive.

Board · ISO committee-ready
Artifact 03

Examiner-ready POA&M

Plan of Action and Milestones with every gap, named owner, realistic timeline, regulatory priority tag (which regulator cares most), and verification method. Ready to hand the examiner on entry conference.

POA&M · regulatory-priority tagged
Artifact 04

Remediation roadmap

Twelve-month programme plan with regulatory priority tagging, dependency mapping, budget alignment, and a delivery cadence tied to exam-cycle windows. Every item has an owner; every item has a measurable close criterion.

12-month · regulatory-tagged
Who signs the engagement

Practice led by a director
with the three-cert stack.

Every financial-services engagement is signed off by our Cyber Command lead — a director with prior military cyber-operations experience, including adversarial-simulation and red-team operational roles, holding CompTIA SecurityX (formerly CASP+) for senior-technical practice, ISACA CISM for management and governance, and CompTIA CySA+ for analyst and SOC depth. Three ANSI-accredited credentials, each accepted as a DoD 8140 baseline.

That stack matters in this practice specifically because financial-services compliance lives at the intersection of technical controls, governance program design, and analytic discipline around evidence. The SecurityX credential speaks to the hands-on architecture review. The CISM credential speaks to the program design a board and an examiner will recognize as mature. The CySA+ credential speaks to the day-to-day discipline of distinguishing real issues from false positives — which matters the day a finding lands on a Matter Requiring Attention. The director signs every engagement and every examiner-facing artifact personally.

  • SecurityX (CASP+)Senior technical practice · DoD 8140 IAT III / IAM II baseline.
  • ISACA CISMManagement & governance · DoD 8140 IAM II baseline · program design.
  • CompTIA CySA+Analyst discipline · DoD 8140 CSSP-Analyst baseline · detection work.
  • Prior military cyberAdversarial-simulation and red-team operational experience.
  • ANSI-accredited stackAll three credentials maintained current and verifiable on file.
  • Direct sign-offEvery engagement, every examiner artifact, every POA&M — signed personally.
07 / Financial-Services FAQ

Questions we
hear every week.

If your question is not answered here, the senior director who would run your engagement takes the call directly. Dispatch routes you in under five minutes — and for active incidents or imminent exams, the lead will be on the phone in thirty.

Do you have experience with FDIC exams?

Yes. FDIC IT examinations follow the FFIEC IT Examination Handbook with focused reviews on information security, business continuity, and vendor management — scoped to institution size and risk profile. We work with state-chartered, FDIC-insured banks to prepare the pre-exam questionnaire responses, organize the evidence binder by the examiner's request list, validate the information-security program against FFIEC CAT maturity levels, and stand up a side-by-side war room during exam week.

Our role is to make the examiner's job fast, not to adversarially minimize findings — examiners appreciate the difference, and cooperative exams tend to produce better outcomes than defensive ones. If your last exam produced Matters Requiring Attention or an informal enforcement action, we can scope a remediation engagement tied specifically to closing those items before the next supervisory cycle.

What about OCC exams?

OCC exams apply to national banks, federal savings associations, and federal branches of foreign banks. The framework is still FFIEC — OCC examiners use the same IT Examination Handbook and the same CAT — but OCC has specific guidance around operational resilience (Heightened Standards for large banks, community-bank scaled guidance for smaller institutions), third-party risk management (the 2023 Interagency Guidance on Third-Party Relationships), and the ever-evolving OCC bulletins.

We track OCC bulletins as they publish and fold any change into active engagements for affected clients. For de novo national banks or recent charter conversions we provide structured first-exam preparation since the OCC's ramp expectations are materially different from a renewal exam — the supervisory letter after a first exam sets the tone for the next several cycles, and we treat it accordingly.

NYDFS DFS-500 compliance — do you cover that?

Yes. 23 NYCRR 500 — universally called DFS-500 or 500 — applies to any entity operating under a DFS license, charter, or authorization: banks, insurers, mortgage lenders, virtual-currency businesses, money transmitters, and more. The 2023 amendment raised the bar substantially: mandatory CISO reporting to the board, annual risk assessments, 72-hour cybersecurity-event notification, 24-hour ransomware-payment notification, independent audit for Class A companies, enhanced MFA, encryption, asset inventory, business-continuity testing, and the annual Certification of Material Compliance signed by the highest-ranking executive and the CISO.

We cover the program end-to-end: initial gap assessment, remediation roadmap, CISO advisory support, incident-response coordination with DFS, and the annual certification workflow. Many clients we work with outside New York still use DFS-500 as their internal baseline, because DFS effectively sets the US state-level floor — institutions operating across multiple states find it easier to comply with DFS once than to manage a fifty-state patchwork of differing requirements.

GLBA 30-day notification — how does it actually work?

The FTC's 2023 amendment to the GLBA Safeguards Rule added Section 314.4(j), requiring non-bank financial institutions to notify the FTC within 30 days of discovering a notification event affecting the information of 500 or more consumers. Banks are covered separately by the federal banking agencies' Computer-Security Incident Notification rule, which requires notification of the primary federal regulator within 36 hours of a good-faith belief that a covered incident has occurred.

In practice: an incident is discovered, the clock starts, the IR team confirms scope and consumer impact, privacy counsel reviews the notification threshold, and if 500+ consumers are affected the FTC notification is filed via the portal with detailed incident characterization. Customer notification timing is separate and governed by state law — we coordinate both, because missing the FTC deadline is a separate violation from missing the state-law customer notification window. Our IR retainer package includes notification-support hours specifically for this workflow, so when the event happens the team is not figuring the process out for the first time.

What's in scope for SOX ITGC?

SOX Section 404 ITGC — IT general controls — covers the IT systems, processes, and access that support financial reporting. The four classic domains: change management (who changes what, who approves, evidence of testing), logical access (provisioning, deprovisioning, role changes, privileged access, periodic access review), computer operations (backup, scheduling, monitoring, incident response), and program development or SDLC (design, coding, testing, migration to production).

For financial institutions, ITGC intersects significantly with FFIEC and NYDFS requirements — most controls serve both frameworks with minor wording differences. We map the control set against both SOX and the banking regulators to avoid duplicate evidence work, coordinate directly with your external audit firm on scope and walkthrough format, and prepare your IT staff for the control-owner interviews that auditors always conduct. First-year SOX engagements for newly public companies run six to nine months; renewal engagements run two to four. Pre-IPO engagements start 18 months before S-1 filing.

PCI-DSS for acquirers versus merchants — what's different?

Merchants are Level 1 through Level 4 based on annual Visa and Mastercard transaction volume, with Level 1 requiring a full Report on Compliance from a QSA and lower levels typically completing a Self-Assessment Questionnaire. Acquirers — the banks and processors that sponsor merchants — have materially different scope: they are always Level 1, they are responsible for merchant due diligence and oversight (PCI-DSS Requirement 12.8 and related card-brand programs), and they face direct card-brand fines if they sponsor out-of-compliance merchants.

For acquirers we focus on the merchant-oversight program, the card-brand data-security programs (Visa CISP, Mastercard SDP), and the full v4.0.1 ROC preparation. For merchants we focus on scope reduction first — tokenization, P2PE, outsourcing the CDE — because every asset removed from CDE scope is an asset that does not need the full control set. v4.0.1's future-dated requirements, now in effect as of March 31, 2025, added significant work around authenticated vulnerability scanning, phishing-resistant MFA for CDE access, and the customized-approach option that lets you satisfy a requirement through a different control path.

Do you sign BAA / NDA?

Yes to both, always. A Business Associate Agreement (BAA) is the standard HIPAA vehicle and applies when we touch Protected Health Information — which happens in financial services more often than people expect (health-savings accounts, health-insurance-adjacent platforms, wealth-management serving medical practices). NDAs are signed before any engagement data moves.

For financial-services engagements specifically we also execute information-sharing agreements consistent with FFIEC third-party risk guidance, and where clients require it we agree to notification obligations that mirror the client's own regulatory notification timelines — so if you have a 36-hour FDIC incident notification obligation, our engagement contract commits us to notifying you inside a window that lets you meet yours. Custom data-protection addenda, Tennessee Banking Department or Mississippi Department of Banking required clauses, and examiner-transparency provisions get reviewed and signed without friction.

Can you support FFIEC CAT annually?

Yes. The FFIEC Cybersecurity Assessment Tool is not technically mandatory, but it has become the de facto framework examiners use to ask about cybersecurity maturity — so nearly every bank and credit union we work with runs it annually. The CAT has two parts: the Inherent Risk Profile (size, complexity, technologies, delivery channels, mobile-product offerings, third-party connections) and the Cybersecurity Maturity assessment across five domains and five maturity levels.

Annual support looks like: a one-month workbook refresh against the prior year, validation of maturity claims with evidence from the control environment, gap-to-aspirational-level mapping, a board presentation with the current posture versus target, and an evidence binder for the next exam cycle. For credit unions we also align the output with NCUA's Information Security Examination (ISE) requirements where applicable. The subscription cadence keeps the binder exam-ready between visits, which is where most institutions struggle otherwise.

How do you coordinate with our internal audit?

Internal audit is typically the primary coordination point for anything we do against a SOX or regulatory framework, because they own the control-testing calendar and the issue-tracking workflow. We meet with your internal audit lead at engagement start to align scope with their annual plan, share our testing approach so there is no duplicate or gap coverage, and agree on issue-tracking (usually AuditBoard, Workiva, or your internal ITSM platform).

When we identify findings during testing, we log them into the same system internal audit uses, using their severity and status taxonomy, so the remediation tracking lives where your board and examiners expect it — not in a separate consultant-only deliverable that creates parallel universes of truth. Three-lines-of-defense discipline matters here: we are second-line when we are consulting on control design, third-line when we are testing, and we make the hand-off explicit at each stage so internal audit's independence is not compromised by our dual posture.

Crypto, MSBs, and virtual-asset service providers — do you cover those?

Yes. Money Services Businesses registered with FinCEN — including virtual-asset service providers and crypto on-ramps — operate under a distinct compliance stack: the Bank Secrecy Act anti-money-laundering program, FinCEN registration and reporting (SAR, CTR, 314(a) and 314(b) information sharing), state money-transmitter licensing in every state of operation (including the 2024 Money Transmission Modernization Act adoption by many states), NYDFS BitLicense for New York operations, and the evolving state-level virtual-asset regulation.

Our work focuses on the cyber and IT-controls side: BSA/AML platform security, KYC-data protection, private-key custody architecture (HSM, multi-party computation, or hot/cold segregation), transaction-monitoring-system controls, and examiner coordination across FinCEN and state regulators. We do not practice law — BSA compliance is a legal discipline — so we always work alongside the client's FinCEN counsel. For the technical controls and the IT portion of the examination, we carry the full weight.

08 / Next Step

Tell us the charter.
We'll tell you the plan.

Share your charter type, your primary regulator, your next exam date, and any outstanding Matters Requiring Attention. A senior director — the one who would run the engagement — is on a scoping call inside two business days. Every engagement includes regulatory-stack memo, master control matrix, evidence binder, examiner-ready POA&M, and board-ready presentation.