Join our team in Washington, D.C. at the IAA Investment Adviser Compliance Conference.
Risk Assessments and Regulatory Compliance Testing Services
We offer a variety of risk assessment services to help companies identify gaps in their cybersecurity and regulatory posture and identify technology-related risks. We can also conduct penetration testing and identify network vulnerabilities.
CONNECT WITH US
We can conduct an assessment across 700+ topics to identify technology-related risks and provide recommendations for improvement.
We can help your firm prepare for an SEC, NFA, or FINRA cyber exam by reviewing your information security program from a regulator’s perspective.
Cyber threats are constantly evolving, so it’s important to stay on top of new threats and address them as quickly as possible. We provide regulatory and cyber alerts, paste site and domain registration monitoring, and staff phishing testing to help protect your company from cyber attacks
We can help identify network vulnerabilities that could be exploited by a hacker and lead to a breach through vulnerability scanning or penetration testing.
Companies are increasingly moving to cloud-based services such as Microsoft® Office 365®. Many companies do not take full advantage of the available security settings, which can dramatically impact the security and regulatory posture of your environment. This is also true of other cloud environments. Our assessment can help determine whether your company’s cloud environment is configured to protect user identities, enable compliance oversight obligations, and identify data loss. Based on our findings, we can assist your company with developing a practical action plan to address key risks.
The latest joint discussion paper FS2/23 issued by the BoE, FCA, and PRA outlined that the existing UK regulatory frameworks encompass ways in which AI is being used.
As part of the SEC’s recent focus on AI, the Division of Examinations has initiated a sweep of investment advisers on how AI-based tools are being used by the firms.
Cybersecurity oversight of portfolio companies is continually evolving to meet new risks. Three eras can be roughly defined based on different approaches that have been adopted.
What is Citrix Bleed? Citrix Bleed (CVE-2023-4966) is a critical vulnerability affecting Citrix NetScaler ADC and NetScaler Gateway appliances. It is now being targeted by the Russian ransomware gang, LockBit.
Based on our industry expertise and experience, we’ve put together 13 steps to form a programmatic approach to cybersecurity portfolio oversight.
- Cybersecurity Resources
The NYDFS recently updated its regulations to add strict provisions on board oversight, ransomware payments, and event reporting.
Aponix Protect™ comprehensive cybersecurity and technology risk solution
Aponix Protect helps firms address evolving cyber risks and threats to ensure that their cybersecurity needs are covered year-round. This solution is available in three tiers, each one designed to provide firms with a flexible, robust, responsive, and cost-effective cybersecurity program.
ACA proudly joins in the celebration of Black History Month. This year, our spotlight shines on the theme "African Americans and the Arts," a rich tapestry of culture, expression, and resilience.
ACA is thrilled to announce that it has been recognized once again as a RegTech100 company for 2024 by RegTech Analyst.
Introducing ACA Vantage for ESG; a straightforward and comprehensive solution to track and analyze ESG data, and support PE, private credit, and leveraged loan portfolios.
Our experts will discuss the shifting market and regulatory landscape, providing invaluable insights for asset managers navigating this new data-driven reality.
Join us when we discuss how the recently released 2024 examination priorities may impact you and your compliance program.