Industry: Financial Services · Updated May 2026

Financial Services Incident Cost: Banking, Brokerage, and Insurance in 2026

$6.08M
Avg breach cost
4 days
SEC 8-K window
$137K
Avg BEC loss
$1.4B+
Equifax cumulative

Financial services sits as the second-most-expensive industry for security incidents in the IBM Cost of a Data Breach Report 2025, with an average cost of $6.08M per breach. The sector's cost premium over the cross-industry mean reflects three structural realities: account-level fraud potential makes financial data among the most monetisable on underground markets, the regulatory stack (federal banking regulators, the SEC, NYDFS, state insurance commissioners, GLBA, plus international equivalents) generates compounding compliance and disclosure costs, and the customer-trust elasticity of demand means even small incidents can trigger meaningful deposit flight or AUM withdrawal.

The Sub-Sector Picture

Financial services is not monolithic. The IBM CODB sector mean of $6.08M aggregates banking, insurance, brokerage, asset management, fintech, and consumer credit. Within that aggregate, sub-sectors diverge meaningfully on incident frequency, regulator scrutiny, and median per-event cost.

Sub-sectorTypical per-event costPrimary regulator(s)Cost driver
Money-center banking$10M-$300M+OCC, FRB, FDIC, NYDFS, SEC, OFACCross-border exposure, reputational, multiple AG actions
Regional and community banks$2M-$15MFRB or FDIC plus state regulators, FFIECLower account count, but lower per-account security spend
Brokerage / wealth management$5M-$60MSEC, FINRA, state regulatorsFINRA Reg S-P enforcement, account-takeover liability
Insurance carriers$3M-$40MState insurance commissioners, NAIC Model LawMulti-state notification, MIB exposure, claims data sensitivity
Fintech and challenger$1M-$25MCFPB, FinCEN, state lender licensesBank partner indemnification, BSA/AML overlap
Consumer credit / credit bureaus$50M-$1.4B+FTC, CFPB, state AGs, FCRAClass-action exposure (Equifax precedent), record sensitivity

The SEC 8-K Cyber Disclosure Rule

The SEC adopted Item 1.05 of Form 8-K in July 2023, effective for most public registrants in December 2023. Under Item 1.05, a registrant must disclose any cybersecurity incident determined to be material within four business days of the materiality determination. Item 106 of Regulation S-K added annual disclosure requirements (10-K) about cybersecurity risk management, strategy, and governance.

The rule has materially changed the cost shape of the first 30 days of an incident at a public financial-services firm. Forensics teams now run a parallel materiality assessment from day one, often involving the audit committee within hours rather than days. SEC counsel engagement is immediate and continuous through the disclosure decision, typically running $50K-$500K in fees in the first 30 days alone for mid-cap registrants and meaningfully more for large-caps. Late or insufficient disclosures have already drawn enforcement: the SEC has filed multiple actions citing 8-K timing issues in 2024 and 2025.

The materiality threshold is the central judgment. The SEC adopting release explicitly declined to define a quantitative threshold. In practice, financial-services issuers have used a triangulation across: aggregate financial impact (direct loss plus expected indemnification), nature and scope of compromised data, customer-base impact, and reputational exposure. The materiality determination memo is becoming a standard work product of every IR engagement at a public-company target.

Practical implication for IR planning. The four-day clock starts at materiality determination, not at incident discovery. A robust IR plan now includes a documented materiality-determination workflow: who participates, what data is required, and how the determination is documented. Firms that have not built this workflow have repeatedly missed the four-day window.

NYDFS Part 500 Enforcement Math

23 NYCRR 500, the NYDFS cybersecurity regulation, has become the de facto US state-level baseline for financial-services cybersecurity. The 2024 amendments (effective in tranches through 2025) tightened MFA, vulnerability management, asset inventory, and audit-trail requirements. Penalties are not statutorily capped: NYDFS may impose civil monetary penalties under Banking Law 44 (up to $5,000 per violation, per day for some violations), Insurance Law 408, and Financial Services Law 408.

SettlementYearPenaltyTrigger
First American Title2022$1MDocument-link exposure of 800M files; first 23 NYCRR 500 charging action
Carnival Corporation2022$5MPhishing-driven email compromise, Part 500 violations
EyeMed Vision Care2022$4.5MEmail compromise affecting 2.1M individuals
Robinhood Crypto2022$30MBSA/AML and cybersecurity Part 500 violations bundled
PayPal2025$2MCredential-stuffing incident, Part 500 controls deficiencies

Source: NYDFS press releases and consent orders, dfs.ny.gov.

Wire-Fraud and BEC Incident Cost

Business email compromise (BEC) and wire-fraud incidents are among the most expensive incident types per dollar spent on the attack. The FBI IC3 Internet Crime Report 2024 documents BEC complaint losses exceeding $2.9B in 2024, with average loss per incident of approximately $137,000. The bank-side cost stack is different from a general-data breach because it has a meaningful direct-loss component on top of the standard response costs.

Cost CategoryRangeNotes
Direct fraud loss$10K-$10M+Recoupment success drops sharply after 72 hours; Financial Fraud Kill Chain effective in early window
Forensic investigation$50K-$500KEmail tenant forensics, lateral-movement check, persistence sweep
SAR filing and BSA workflow$25K-$200KHigher if multi-jurisdiction or OFAC-related
Regulator engagement$25K-$300KFFIEC examiners, state DFI, NYDFS Part 500 reporting
Customer make-whole and PR$50K-$2M+Reg E/UCC liability allocation, customer notification, retention
Litigation defense$100K-$5M+Customer suits, vendor indemnification disputes

FFIEC Expectations and the Cost of Compliance

The FFIEC IT Examination Handbook is the federal banking regulator playbook for examiner expectations on cybersecurity. The Information Security Booklet and the 2021 Architecture, Infrastructure, and Operations Booklet between them describe the documented control set examiners expect to see. Banks that examine below the documented baseline receive Matters Requiring Attention (MRAs) or, more seriously, Matters Requiring Immediate Attention (MRIAs).

Remediation cost for an MRA in the cybersecurity domain typically runs $200K-$2M for mid-size institutions, scaling to $5M-$20M for institutions under OCC Heightened Standards. The cost compounds because remediation must be evidenced and re-examined, which adds at least one and often two cycles of consultancy and internal-audit work. The CISO-office overhead to maintain FFIEC-aligned documentation alone runs $300K-$1M annually for a bank in the $5B-$50B asset range.

The Cybersecurity Assessment Tool (CAT), originally introduced by FFIEC in 2015, was retired by FFIEC at the end of August 2025. CISA's Cybersecurity Performance Goals and the NIST Cybersecurity Framework 2.0 are now the primary alignment targets, both of which examiners reference. Migration cost from CAT-based reporting to NIST CSF 2.0 mapping has been an additional one-time spend of $50K-$500K at most institutions through 2025.

Frequently Asked Questions

What is the average cost of a financial services data breach?
The IBM Cost of a Data Breach Report 2025 puts the financial sector average at $6.08M per breach, the second-highest of any industry behind healthcare. Banking, brokerage, and insurance all sit close to this number, with US-headquartered firms running materially higher.
Does the SEC cyber disclosure rule add cost?
Yes. SEC Item 1.05 of Form 8-K (effective December 2023) requires disclosure of material cybersecurity incidents within four business days of the materiality determination. The rule has accelerated forensics timelines (firms now run materiality assessments in parallel with containment) which adds cost. SEC counsel engagement runs $50K-$500K in the first 30 days alone for mid-cap registrants.
What is NYDFS Part 500 and what are the penalties?
23 NYCRR 500 is the NYDFS cybersecurity regulation covering banks, insurers, and other financial-services licensees in New York. DFS may impose civil monetary penalties under Banking Law 44, Insurance Law 408, and Financial Services Law 408. Notable settlements: First American ($1M, 2022), EyeMed ($4.5M, 2022), Robinhood Crypto ($30M, 2022 bundled), PayPal ($2M, 2025). The 2024 amendments tightened MFA, asset-management, and audit requirements.
What does a wire-fraud incident cost a bank?
Direct fraud loss varies from low-thousands to hundreds of millions per incident. Average BEC loss reported to FBI IC3 in 2024 was approximately $137,000. The bank cost stack includes the loss itself (often partially recovered through insurance and clawback), forensics ($50K-$500K), regulatory engagement and SAR filing ($25K-$200K), and lawsuit defense. Recoupment success is highly time-sensitive: under 72 hours typically, with rapidly diminishing odds afterward.
How does FFIEC guidance affect incident response cost?
The FFIEC IT Examination Handbook sets the regulator-expected baseline for IR. Examiners expect documented IR plans, tested at least annually, with executive-level reporting and board oversight. Banks below the baseline face MRAs or MRIAs that translate to remediation cost typically $200K-$2M depending on bank size, scaling to $5M-$20M for institutions under OCC Heightened Standards.
What were the most expensive named financial-services incidents?
Equifax 2017 ($1.4B+ to date including $700M FTC settlement). Capital One 2019 ($300M+, $80M OCC penalty plus $190M class settlement). Morgan Stanley 2020 ($60M OCC penalty for unwiped storage devices). LoanDepot 2024 (~$30M+ disclosed in financials). These are the top-of-stack benchmarks for industry triangulation.
Are credit unions and community banks cheaper to breach?
Per-breach absolute cost is lower because account counts and asset bases are lower. But cost-per-account is often higher because security spend per account is also lower. Per IBM CODB segmentation, organisations with under 500 employees average around $3.31M per breach, but the proportional impact (often 5-15% of annual revenue) is materially more damaging than the same dollar amount at a money-center bank.
IncidentCost.com is an independent educational resource. All cost figures are drawn from published industry research including IBM's Cost of a Data Breach Report, Ponemon Institute Cost of Insider Risks Report, Verizon Data Breach Investigations Report, Atlassian incident management research, and PagerDuty incident surveys. This site is not affiliated with IBM, Ponemon Institute, Verizon, Atlassian, PagerDuty, or any security vendor. Figures are for educational and planning purposes only.