Cybersecurity Best Practices

Cybersecurity resources, best practices, and tips to help our clients protect their firms from increasing and evolving cyber threats, including ransomware attacks.

Best practices and tips

ACA Vantage

Building a Value-Generating Cybersecurity Portfolio Oversight Program

It has become imperative that private equity firms institute a programmatic approach to portfolio oversight, meaning oversight that is formally governed, applied consistently, and grows valuations.

Article
  • Cybersecurity
  • Cybersecurity Resources
  • Portfolio Company Risk Management
circuit board abstract

White Paper: Building a Value-Generating Cybersecurity Portfolio Oversight Program

A guide to protecting your investments and growing your valuations.

Report
  • Cybersecurity
  • Cybersecurity Resources
  • Portfolio Company Risk Management
lock

Cybersecurity Benchmarking Survey Lists Top Concerns and Preparedness Among Respondents

Our annual survey in partnership with NSCP reveals that investment firms overlook AI as a cybersecurity risk and remain wary about SEC cybersecurity enforcement and compliance with new rules

Press Release
  • Cybersecurity
  • Cybersecurity Resources
  • ACA News
blue abstract

NIST Cybersecurity Framework 2.0

The National Institute of Standards and Technology (NIST) released version 2.0 of its landmark cybersecurity framework.

Article
  • Cybersecurity
  • Cybersecurity Resources
circuit board abstract

13 Actions to Position Your Portfolio for Cyber Success

Based on our industry expertise and experience, we’ve put together 13 steps to form a programmatic approach to cybersecurity portfolio oversight.

Article
  • Cybersecurity
  • Cybersecurity Resources
ACA Vantage

Six Reasons Why Cybersecurity Portfolio Oversight Is Essential

Cybersecurity risks are ever present and pressure to secure investments is mounting. Firms need to build and operate a formal program of cybersecurity portfolio oversight and conduct ongoing assessments of their portfolio companies’ cyber posture over the entire investment lifecycle.

Article
  • Cybersecurity
  • Cybersecurity Resources