Last spring, working through a readiness assessment with a community bank in the Hudson Valley—approximately $1.5 billion in assets, 180 employees, a well-regarded compliance team—I asked a straightforward question: who is your CISO? There was a pause. Then the CFO said, "well, the IT director handles security." That answer, reasonable as it felt in the room, is now a compliance deficiency under the 2025 amendments to 23 NYCRR 500. The New York Department of Financial Services did not grandfather institutional habit. They updated the rulebook, and the clock is running.

The misconception I encounter most often at community banks, credit unions, and smaller insurance companies across New York State is that 23 NYCRR 500 is a large-institution problem—that it was written for JPMorgan and MetLife and that the DFS has bigger targets than a mutual savings bank in the Hudson Valley. That misconception is expensive. The DFS cybersecurity regulation applies to every entity holding a license, registration, charter, certificate, permit, or accreditation under New York Banking Law, Insurance Law, or Financial Services Law, with very limited exceptions for the smallest organizations. The 2025 amendments expanded several requirements and sharpened the enforcement posture. They did not narrow the scope.

This piece walks through the material changes from the 2025 amendment cycle, what they require in concrete operational terms, what a realistic compliance timeline and budget look like for a mid-market institution, and the questions your leadership team needs to be able to answer before the next examination cycle begins.

The DFS does not grade on a curve for asset size. A $1.5 billion bank that cannot produce a qualified CISO, a documented incident response plan, and MFA coverage across privileged accounts is out of compliance in the same way a $150 billion bank would be.

01

What Changed in 2025: The Amendments That Matter

The DFS finalized the second phase of 23 NYCRR 500 amendments in November 2023, with phased compliance deadlines running through 2025. By the time you are reading this in January 2026, all material requirements are in effect. The substantive changes from the original 2017 regulation center on five areas: the CISO role and qualifications, incident notification timelines, access controls and MFA requirements, third-party service provider oversight, and governance and board-level accountability. Each one deserves direct treatment.

Effective Date

November 1, 2023 (finalized). Phased compliance deadlines concluded November 1, 2025. All provisions now in full effect as of January 2026.

Who It Covers

All DFS-licensed entities: banks, credit unions, insurance companies, mortgage servicers, money transmitters, and licensed lenders—with limited exemptions for very small organizations.

Enforcement Signal

DFS issued its first major cybersecurity enforcement action under Part 500 in 2021 ($5M against First American Title). Actions have accelerated each year since.

02

The CISO Requirement: More Than a Title Change

The original regulation required covered entities to designate a qualified Chief Information Security Officer. The 2025 amendments make clear that "qualified" carries substantive meaning, and they add a reporting requirement that changes the organizational dynamic considerably: the CISO must now report to the board of directors—or a committee of the board—at least annually, presenting the organization's cybersecurity program, material cybersecurity risks, and significant developments in the threat landscape (23 NYCRR 500.4).

For a community bank with 180 employees, the instinct is to solve this problem by adding "CISO" to an existing title. That can work, but only if the underlying qualification is genuine. An IT director who lacks cybersecurity risk management experience, who cannot credibly assess and present the organization's risk posture to a board, and who does not have the organizational authority to drive security decisions is not a CISO in the regulatory sense. The DFS has examined this. "We gave him the title" is not a defense.

The practical paths for a $1.5 billion institution look like this: promote from within if you have the talent and give that person the authority and time to build the function; hire a full-time CISO, which at current market rates will cost $180,000 to $240,000 in total compensation for someone with genuine credentials; or engage a qualified fractional CISO who can satisfy the regulatory requirement, deliver board reporting, and build the program at a fraction of full-time cost. For most community banks in this asset range, the fractional model is the most defensible and most budget-realistic option, running typically $5,000 to $12,000 per month depending on scope and frequency.

Hudson Valley Bank — Anonymized Case

Starting condition: IT director serving dual role as de facto security lead; no formal CISO designation; IT reported to COO; no board-level cybersecurity reporting.
Regulatory gap: Missing qualified CISO designation, missing annual board reporting, missing documented CISO authority in organizational policy.
Resolution: Engaged fractional CISO with CISSP/CISM credentials; formalized CISO reporting line to Audit Committee; established quarterly risk briefing cadence; full compliance achieved in 60 days at $8,500/month engagement cost.
Result: First DFS examination post-remediation: no findings in CISO function. Examiner specifically noted the board reporting cadence as a positive.
03

Incident Notification: 72 Hours Is Not Generous

The 2025 amendments reduced the DFS cybersecurity incident notification window from 72 hours to—in some circumstances—essentially immediate, while clarifying and expanding what constitutes a reportable event. Under amended Section 500.17, a covered entity must notify the DFS Superintendent within 72 hours of determining that a cybersecurity event has occurred that either has a reasonable likelihood of materially harming any material part of the normal operation of the entity, or that has been reported to any other regulatory or governmental body.

The "determined that a cybersecurity event has occurred" language is load-bearing. The clock does not start at detection—it starts at the point where the organization has sufficient information to make that determination. This creates a meaningful governance obligation: you need documented procedures for how your organization moves from detection to determination, who makes the determination call, and what triggers the 72-hour window. For many community banks, this process does not exist in written form. The incident response plan, if one exists, may not address the DFS notification trigger specifically.

The expanded definition of reportable events under the amendments now explicitly includes ransomware payments, extortion demands related to cybersecurity, and unauthorized access to privileged accounts—even if the access was contained before data was exfiltrated. That last category catches organizations that previously felt they had dodged a reportable event because "nothing was taken." Under current 23 NYCRR 500.17, the unauthorized access itself may be sufficient to trigger notification depending on the account involved.

What Triggers Notification

Unauthorized access to privileged accounts. Ransomware deployment or payment. Any event reported to another regulator. Material operational disruption with a cybersecurity cause.

What the Notification Must Include

Date of discovery. Nature of the event. How systems and data were affected. Remediation steps taken or planned. Updated information as the investigation develops.

For the Hudson Valley bank in our case scenario, the gap assessment found a six-page incident response plan that predated the 2023 amendments by four years. It referenced a "72-hour reporting requirement" but did not distinguish between the DFS notification obligation and the bank's internal escalation process. The plan did not identify who holds DFS notification authority, did not contain the DFS portal URL or contact information, and had not been tested through a tabletop exercise in three years. That is not an unusual finding. It is the median finding at community banks in this size range.

04

Access Controls and MFA: The Gap Is Bigger Than You Think

The MFA requirements under amended 23 NYCRR 500.12 are now among the clearest bright-line compliance tests in the regulation. As of November 2025, covered entities must implement MFA for: all remote access to the information system; all access to nonpublic information from a remote device; all privileged accounts, including those used for administrative functions; all access to the entity's internal systems or applications from an external network; and any other access to the information system where technically feasible.

That last clause—"where technically feasible"—is the loophole organizations have been misapplying. The DFS guidance on this is clear: technical infeasibility requires documented justification and a compensating control plan. "We haven't gotten around to it" and "the vendor doesn't support it" without a compensating control strategy do not constitute documented infeasibility. If a legacy core banking system cannot accept MFA at the application layer, you need documented justification and a compensating control (network segmentation, privileged access workstation requirements, enhanced monitoring on those accounts) on file. Not in someone's head—on file.

We found three privileged service accounts at the Hudson Valley bank that had not been touched in terms of access review in over two years. One was associated with a vendor whose contract had lapsed. All three had full administrative rights to the core system. None required MFA.

Beyond MFA, Section 500.7 requires covered entities to implement a privileged access management program. The 2025 amendments strengthened this requirement considerably: organizations must now limit privileged access to only what is necessary for the user's job function (least privilege), review and validate all privileged access rights at least annually, immediately disable access for departed employees, and maintain an inventory of all privileged accounts with documented business justification for each. For community banks that have grown through acquisition or have operated with informal IT governance, the privileged account inventory requirement alone can represent months of remediation work.

MFA Coverage Required

All remote access. All privileged accounts. All external network access to internal systems. Document exceptions with compensating controls.

Privileged Access Review

Annual review and validation of all privileged access rights. Immediate termination of access for departed personnel. Documented business justification for each privileged account.

Account Inventory

Maintain a current inventory of all privileged accounts. Include service accounts, vendor accounts, and shared administrative credentials.

05

Third-Party Risk: Vendor Due Diligence Gets Real

Amended Section 500.11 overhauled the third-party service provider requirements in ways that will stress-test most community bank vendor management programs. The original regulation required covered entities to implement policies and procedures for third-party service provider security. The amended regulation requires specific contractual provisions, ongoing monitoring, and—most significantly—a documented due diligence process that must be applied before engaging a new third party and on a periodic basis thereafter.

The required contractual provisions now include: representations that the third party will maintain appropriate cybersecurity practices; notification requirements when the third party experiences a cybersecurity event that may affect the covered entity; the right to audit the third party's cybersecurity program; and controls governing the return or destruction of nonpublic information upon termination of the relationship. If your current vendor contracts don't contain these provisions, you have a compliance gap in every contract that touches nonpublic information—which, for a community bank, means virtually every significant technology vendor.

The ongoing monitoring requirement is the part that most mid-market institutions have not operationalized. Annual vendor questionnaires are the industry norm, and they are insufficient under the amended standard. The DFS expects covered entities to have a risk-tiered approach to vendor monitoring: critical vendors (core processing, lending platforms, deposit systems) warrant more frequent and more rigorous assessment than lower-risk vendors. Critical vendors should be assessed at least annually with direct engagement, not just a questionnaire. There should be a documented escalation process when a vendor's security posture changes materially—including when they experience their own breach.

Third-Party Risk Gap Assessment — Hudson Valley Bank

Vendors in scope: 47 active vendor relationships with access to nonpublic information or systems.
Contracts reviewed: 31 of 47 lacked at least one required contractual provision. 14 had no cybersecurity addendum or data processing agreement at all.
Monitoring posture: Annual SOC 2 collection for 8 critical vendors. No documented monitoring process for remaining 39. No risk-tiering methodology in place.
Remediation scope: 18-month contract remediation program. New vendor risk tiering framework. Quarterly review cadence for top-tier vendors. Full compliance projected at month 14.

The contract remediation challenge is real and time-consuming. Most vendors will negotiate cybersecurity addendums without significant resistance—the larger ones (FIS, Jack Henry, Fiserv) already have standard addendums that satisfy most requirements. The long tail of smaller vendors, consultants, and professional service firms who have incidental access to systems or data require more hands-on engagement. Budget 60 to 90 days for contract remediation if you are starting from scratch, and assign dedicated bandwidth to it. This does not run itself.

06

Governance and Board Accountability: The Examiner's New First Stop

The 2025 amendments added explicit board-level requirements that represent the most significant governance change in the regulation's history. Under amended Section 500.4(d), the board of directors (or an appropriate committee) must review and approve the covered entity's cybersecurity policy at least annually. Under Section 500.4(f), senior officers must certify annually—in writing, subject to DFS examination—that the entity is in compliance with the cybersecurity regulation. That certification is signed by the highest-ranking executive and the CISO or equivalent. It is not a checkbox. It is a sworn statement to a regulator.

For community banks and credit unions where boards are composed of local business leaders without deep technology backgrounds, the board accountability requirements demand a shift in how cybersecurity is presented at the board level. The CISO's annual report to the board must be substantive enough that board members can make an informed approval decision on the cybersecurity policy. A twenty-minute presentation about phishing statistics and firewall uptime does not satisfy that standard. What satisfies it is a structured risk report: the institution's threat environment, material risks identified, residual risk posture, program gaps and remediation status, and the controls the institution relies on to protect customer data.

The annual certification requirement has a practical implication that I want to be direct about: a CEO or President who signs the certification without actually understanding the organization's cybersecurity posture is assuming personal legal exposure. The "I relied on my IT staff" defense is weakened considerably when you have signed a document certifying compliance to a regulator. This is the mechanism the DFS used to make cybersecurity a C-suite priority rather than an IT priority, and it has worked. The executives who have engaged most actively with their cybersecurity programs since 2023 are the ones who understand they are signing that certification with their name attached.

07

The Exemption Question: Are You Actually Exempt?

The limited exemptions in Section 500.19 are narrower than most organizations believe. A covered entity qualifies for the limited exemption—which exempts them from specific sections but not from the regulation as a whole—if they have fewer than 10 employees (including independent contractors), less than $5 million in gross annual revenue averaged over the past three fiscal years, or less than $10 million in year-end total assets. All three thresholds must be met simultaneously for the exemption to apply. And critically: the limited exemption must be filed with the DFS using the online portal within 30 days of qualifying or becoming covered under the regulation. It is not automatic.

A $1.5 billion community bank does not qualify for any exemption. A credit union with $800 million in assets does not qualify for any exemption. An insurance company with 45 employees and $50 million in written premium does not qualify. Most organizations I speak with who believe they are exempt are not—they have a vague memory of hearing that "small companies are exempt" without having verified their own position against the actual threshold. If you have not formally reviewed your exemption status against the current thresholds and filed accordingly, that review needs to happen this quarter.

08

Timeline and Budget: What Compliance Actually Costs

The question I get from CFOs is always the same: what does this cost? The answer depends entirely on your current state, but for a community bank or credit union in the $500 million to $2 billion asset range that has not previously built a structured cybersecurity program, the realistic compliance investment runs as follows.

Area Typical Scope Estimated Cost Range
CISO Function Fractional CISO engagement with board reporting, policy ownership, and program oversight. Full-time alternative runs $180K–$240K total comp. $60K–$130K annually (fractional)
MFA Implementation Deployment of MFA platform (Microsoft Entra, Duo, Okta) across privileged accounts and remote access. Includes integration work for core systems. $15K–$45K one-time; $8K–$20K annually
Privileged Access Management PAM platform deployment (CyberArk, BeyondTrust, or Delinea) covering privileged account inventory, vaulting, and access review workflows. $25K–$75K annually depending on scope
Third-Party Risk Program Vendor risk tiering, contract remediation, assessment tooling, and ongoing monitoring cadence. Can leverage existing GRC platforms where licensed. $20K–$50K to build; $15K–$30K annually to operate
Incident Response IR plan development or revision, tabletop exercise, DFS notification procedure documentation. Annual retainer with IR firm recommended. $15K–$35K to develop; $20K–$40K IR retainer
Policy and Documentation Cybersecurity policy suite, board reporting templates, annual certification preparation, exam readiness documentation. $10K–$25K one-time; $8K–$15K annually

For a $1.5 billion community bank starting from a baseline of informal IT security governance, total first-year investment to achieve compliance across all material requirements typically runs $180,000 to $350,000. That is a wide range because the gap assessment findings vary substantially. The institutions with the lowest investment requirements are those that have been investing incrementally for several years—they may only need to close specific gaps. The institutions with the highest investment requirements are those that deferred action and are now building the program from the foundation in a compressed timeline under regulatory pressure. Do not be the latter institution. The cost differential is not trivial, and the examination risk during the gap-closing period is real.

The ongoing annual run rate, once the program is built, typically falls in the $120,000 to $200,000 range for an institution of this size. Relative to the risk profile—customer data exposure, potential enforcement action, reputational damage from a breach—this is a rational expenditure. Framed differently: the DFS's first major enforcement action resulted in a $5 million fine. Even a modest enforcement action of $500,000 exceeds three years of compliance program operating costs.

09

What Large Banks Do vs. What You Need to Do

There is a version of 23 NYCRR 500 compliance that large institutions implement: dedicated CISO with a staff of 20, enterprise PAM platforms with real-time monitoring of every privileged session, a third-party risk function with its own team and budget, a 24-hour security operations center, and an annual certification process that involves months of internal audit and legal review. That apparatus exists at institutions with $50 billion in assets and compliance budgets measured in tens of millions of dollars.

You do not need that apparatus. You need the same regulatory outcomes through proportional means. A qualified fractional CISO satisfies the same regulatory requirement as a full-time CISO with equivalent credentials. A mid-market PAM platform that vaults privileged credentials and enforces approval workflows satisfies the same Section 500.7 requirement as CyberArk's enterprise deployment. A structured annual board presentation with a written risk report satisfies the board reporting requirement without a GRC platform that costs $200,000 per year to license.

The DFS does not mandate specific technologies or vendor solutions. It mandates outcomes. A community bank that can demonstrate: a qualified CISO with documented authority and regular board access; documented cybersecurity policies reviewed and approved by the board annually; MFA deployed across all privileged accounts and remote access with documented exceptions; an active privileged account inventory reviewed at least annually; a vendor risk program with risk-tiered assessment cadence and contractual protections in place; and a tested incident response plan with a documented DFS notification procedure—that institution is compliant. The sophistication of the technical implementation is secondary to the discipline of the governance framework.

Compliance Readiness Diagnostic

If you are a CFO, COO, or compliance officer at a DFS-regulated institution, these are the questions your organization needs to answer before the next examination cycle. Each "no" or "unsure" is a finding in waiting.

The Hudson Valley bank we walked through this assessment completed their gap remediation over 14 months. The CISO function was stood up in 60 days. MFA coverage across privileged accounts was achieved in 90 days. Incident response plan revision and tabletop exercise completed in 120 days. Vendor contract remediation is a longer program—14 months to work through 47 contracts, with the highest-risk relationships addressed in the first 90 days. The board reporting cadence was established within 45 days and has been running cleanly since.

None of the work was technically exotic. All of it required sustained organizational attention and someone with the authority and accountability to drive it forward. That is, ultimately, what the regulation is asking for: not a perfect technical environment, but a disciplined governance program with real accountability at the top. Institutions that understand that framing find the compliance path significantly more navigable than those who approach it as a checklist exercise. The examiners know the difference.

References

  1. New York Department of Financial Services. (2023, November 1). Cybersecurity requirements for financial services companies, 23 NYCRR Part 500 (amended). New York State Register. https://www.dfs.ny.gov/docs/legal/regulations/adoptions/dfsrf500txt.pdf
  2. New York Department of Financial Services. (2023). DFS cybersecurity regulation: Second amendment [Regulatory guidance]. https://www.dfs.ny.gov/industry_guidance/cybersecurity
  3. New York Department of Financial Services. (2021, October 26). In the matter of First American Title Insurance Company: Consent order [Enforcement action]. https://www.dfs.ny.gov/enforcement_actions
  4. New York Department of Financial Services. (2023). Guidance on the cybersecurity regulation amendments. https://www.dfs.ny.gov/industry_guidance/cybersecurity
  5. New York Department of Financial Services. (2024). Annual report on cybersecurity in the financial services sector. https://www.dfs.ny.gov/reports_and_publications
  6. National Institute of Standards and Technology. (2018). Framework for improving critical infrastructure cybersecurity (Version 1.1). U.S. Department of Commerce. https://doi.org/10.6028/NIST.CSWP.04162018