What this case study covers
Some compliance stories are simple: one regulation, one audit, one list of controls, done.
Financial services is not like that.
In the U.S., it is very common for one organization to be pulled under overlapping requirements. You might have state level expectations like 23 NYCRR 500 compliance and also federal level requirements like the GLBA Safeguards Rule, enforced through FTC Safeguards Rule requirements for many non bank financial institutions.
This case study shows what happened when one firm had to satisfy both tracks at the same time, while also responding to a real security event that tested whether their "compliance program" was a real program or just paper.
This is a composite case study based on common audit patterns, regulatory expectations, and incident response realities. Names and certain operational details are generalized so the focus stays on practical compliance decisions.
Background: The firm, the business model, and the compliance squeeze
Organization profile
HarborPoint Advisory Services is a mid sized financial services firm operating in multiple states. Their revenue comes from advisory services, retirement planning, and investment related operations. They handle sensitive client data such as:
- Names, addresses, identification details
- Account information
- Financial profiles
They are not a giant bank. They are exactly the type of firm that often feels stuck between "big enterprise expectations" and "mid market resources."
Why both rules applied
HarborPoint had:
- A New York presence through licensing and client relationships, triggering the NYDFS cybersecurity framework scope for covered entities
- Business activities that fit within the scope of the GLBA Safeguards Rule, with compliance expectations aligned to FTC Safeguards Rule requirements for safeguarding customer information
So they were not choosing a framework for fun. They had legal expectations coming from more than one direction.
The internal reality before the case begins
HarborPoint had a security program, but it was uneven:
- Stronger controls in email and endpoint protection
- Weaker identity governance in legacy systems
- Vendor risk management that existed, but was not consistently documented
- Incident response procedures that were written, but rarely exercised
They also had a common problem: different teams treated NYDFS and FTC as two separate projects instead of one unified program.
That became the first thing that had to change.
The trigger: Two audits land in the same quarter
Audit 1: NYDFS style control evidence request
HarborPoint received an NYDFS oriented evidence request that asked for items like:
- Policies
- Risk assessments
- Incident response documentation
- Access control proofs
- Vulnerability management records
- Evidence of governance oversight
Their compliance director described it simply: "They are not asking if we have a policy. They are asking if we run the policy."
That is a key difference. NYDFS oriented scrutiny tends to focus on whether controls are operational and documented, not just written down.
Audit 2: FTC Safeguards driven assessment
At nearly the same time, the firm received an assessment aligned to FTC Safeguards Rule requirements, focused on:
- Risk assessment
- Safeguards implementation
- Service provider oversight
- Testing and monitoring
- Ongoing adjustment of the program
The biggest issue was timing. HarborPoint needed to respond to both without doubling work or creating inconsistent narratives.
Step 1: Stop treating them as two different security programs
The first leadership meeting
HarborPoint's COO wanted to assign one team to NYDFS and one team to FTC. The CISO pushed back.
He explained: if we split it, we will produce two sets of documents, two sets of terminology, and two different stories. That creates risk.
Instead, they created a single "control mapping" workstream with one goal: build one set of financial institution cybersecurity controls that satisfy both obligations, then produce evidence once and reuse it.
The mapping approach they used
They created a simple matrix with:
- Control domain (risk assessment, access control, logging, incident response, vendor management, training)
- NYDFS expectation
- FTC GLBA expectation
- Current state evidence
- Gaps
- Owner and deadline
This mapping exercise became their compliance backbone. It did not magically fix controls, but it stopped the chaos and created a single source of truth.
The hidden benefit
Once they did the mapping, they discovered something important: most control goals were the same. The differences were in documentation style, specificity, and audit evidence.
That meant the right plan was not "build twice." It was "build once, document well."
Step 2: The risk assessment becomes the anchor document
Why the risk assessment mattered
Both NYDFS and FTC oriented reviews tend to start with risk: did you identify risks realistically, and did you implement safeguards based on that assessment?
HarborPoint had a risk assessment, but it was too high level. It was full of statements like "phishing risk is high" without connecting that to specific assets, data flows, and compensating controls.
The firm decided to rebuild the risk assessment as a working document that could survive scrutiny.
What changed in the new risk assessment
They made five practical changes:
- They listed the systems that store or process customer data, not just categories
- They mapped data flows between systems and vendors
- They tied each major risk to a control set and an evidence artifact
- They identified residual risk and the decision owner who accepted it
- They set a review schedule that was realistic and enforceable
This is where many firms fail. They create risk assessments as a one time exercise. Regulators look for a living program.
Step 3: The identity problem that both audits exposed
The ugly discovery
During evidence collection, HarborPoint found:
- Shared accounts still existed in a legacy portfolio management tool
- Some administrative accounts did not have consistent MFA enforcement due to compatibility issues
- User access reviews were performed, but the results were not consistently documented
This was not just a technical issue. It was a governance issue, and it impacted both 23 NYCRR 500 compliance and FTC Safeguards Rule requirements expectations.
The fix: "Minimum access" in plain English
They implemented a strict rule: no shared accounts. Every login must map to a person. Every privileged role must have an owner. Every admin action must be logged.
Then they implemented the practical steps:
- Migrated shared accounts into named accounts with role based permissions
- Enforced MFA for privileged access through a compatible method
- Implemented quarterly access reviews with signed evidence
The important part was not just making the change. It was documenting it in a way auditors could verify quickly.
Step 4: Logging and monitoring becomes the proving ground
Why monitoring became central
When auditors ask "How do you know your safeguards work," the answer is rarely "because we bought a tool."
The answer needs evidence: logs, alerts, ticket records, investigations, and corrective actions.
HarborPoint had logs, but they were fragmented across endpoint tooling, firewall logs, email security logs, and a cloud admin console.
They had no unified story.
What they built
They implemented a simple monitoring model:
- Centralize critical logs for a defined set of systems
- Define alert thresholds for suspicious activity
- Require investigation tickets for high severity events
- Maintain a weekly review cadence with a sign off record
They also wrote a one page monitoring policy in normal language: what is monitored, what is reviewed, who reviews it, and what counts as escalation.
This created evidence that satisfied both audit tracks without building two different systems.
Step 5: Vendor management becomes non negotiable
The vendor reality in financial services
HarborPoint relied on service providers for:
- Client portal hosting
- CRM support
- Email filtering
- Outsourced IT
Auditors focused on one question: if a vendor fails, can you show you assessed them, required safeguards, and reviewed their performance?
Their vendor program existed, but it was inconsistent. Some vendors had full documentation. Others had almost nothing beyond a contract.
What they changed
They created a vendor tiering model:
- Tier 1: Vendors with direct access to customer data or critical operations
- Tier 2: Vendors supporting business functions without data access
- Tier 3: Low risk vendors
For Tier 1, they required:
- Security questionnaires
- Evidence of security controls
- Incident notification clauses
- Annual review documentation
They also created a vendor exception process: if a vendor could not meet a requirement, the business had to accept the risk in writing, with a remediation plan.
This was uncomfortable at first because business teams hate friction. But it created a defensible record.
Step 6: Incident response is tested by a real event
The timing could not have been worse
Halfway through audit evidence collection, HarborPoint experienced a security event: a credential stuffing attempt targeted their client portal login.
It did not become a breach, but it created operational stress:
- Increased login failures
- Lockouts for legitimate users
- Customer support tickets
- Executive concern
This was the moment where auditors and regulators would see whether the firm's controls were real.
What happened in the first hours
HarborPoint followed a clean response flow:
- Identify: Monitoring flagged abnormal login patterns
- Contain: They enabled stricter rate limiting and additional bot protections
- Validate: They checked for successful account takeovers
- Recover: They reset affected accounts and restored normal user access
- Document: They recorded timelines, decisions, and actions
The key was documentation. They created an incident record with:
- Timeline
- Evidence artifacts
- Impact summary
- Corrective actions
That incident ticket later became one of their strongest audit artifacts because it showed the program in motion.
Step 7: The compliance documentation that made audits easier
The "evidence pack" concept
Instead of scrambling each time auditors asked a question, HarborPoint created an "evidence pack" organized by control domain.
Each section contained:
- Policy or standard
- Operational proof
- Recent examples
- Owner and review date
For example, the access control section included: policy, MFA enforcement proof, access review logs, and one sample approval chain.
The vendor management section included: vendor tier list, questionnaires, contract clauses, and recent vendor review notes.
This prevented the most common problem in compliance: the controls exist, but evidence is scattered and hard to produce.
Step 8: Reconciling NYDFS and FTC language differences
Where firms get tripped up
NYDFS style reviews often emphasize governance and formal program structure. FTC GLBA aligned reviews often emphasize risk assessment, safeguards, and service provider oversight.
A firm can accidentally write two narratives: one sounds like a board governance story, the other sounds like an IT checklist.
HarborPoint unified language with a simple rule: describe one program, one set of safeguards, one governance model, and map it to both requirements.
They kept descriptions factual and plain:
- Who owns the program
- How risks are assessed
- What safeguards exist
- How vendors are managed
- How incidents are handled
- How the program is tested and adjusted
This reduced confusion and made it easier to answer questions consistently.
Step 9: The remediation plan that auditors actually respected
No one believes "we will improve"
Auditors see vague promises all day.
HarborPoint created a remediation plan with:
- Specific gap descriptions
- Concrete actions
- Owners
- Target dates
- Evidence that the action was completed
They also tracked "risk accepted" items separately. When something could not be fixed immediately, they documented: why, what mitigation existed, who accepted it, and when it would be revisited.
That documentation matters. It shows governance.
Results: How the firm passed both audits without running two programs
The NYDFS oriented outcome
The NYDFS style review went smoothly because:
- Governance artifacts existed and were current
- Policies were tied to operational evidence
- Monitoring and incident response produced real tickets
- Access control improvements were documented
The FTC GLBA aligned outcome
The FTC Safeguards oriented assessment was satisfied because:
- Risk assessment was specific and living
- Safeguards were implemented and tested
- Vendor oversight was tiered and documented
- Adjustments were tracked through remediation plans
The firm did not become perfect overnight. But they became defensible, and in compliance, defensible matters.
What went wrong and what they learned
Lesson 1: Separate projects create compliance risk
When teams split NYDFS and FTC into two workstreams, they create contradictions. A unified program avoids that.
Lesson 2: Evidence beats intention
Auditors do not grade your intent. They grade what you can prove.
Lesson 3: Vendor risk is business risk
If a vendor touches customer data, your compliance exposure increases unless you can show oversight.
Lesson 4: A real incident is the ultimate test
A small event handled well can become your strongest compliance evidence.
Practical template you can apply
If you need to satisfy both requirements, focus on these core domains
- Risk assessment and risk management tied to real systems
- Access control and MFA, especially for privileged accounts
- Logging and monitoring with investigation records
- Incident response with documentation discipline
- Vendor management with tiering and annual reviews
- Training and awareness with attendance evidence
- Vulnerability management with patch and exception records
Build one program. Produce one evidence pack. Map once.
Closing
The most realistic compliance strategy for overlapping financial cybersecurity requirements is not to build two security programs. It is to build one mature program with strong documentation and operational proof.
This case study shows that NYDFS cybersecurity regulation and FTC Safeguards Rule requirements can be met through a single, well structured program when the focus stays on controls, evidence, and disciplined documentation.