Risk Assessments and Regulatory Compliance Testing Services

Technology and cloud assessments, penetration testing and vulnerability assessments, and cyber exams

We offer a variety of risk assessment services to help companies identify gaps in their cybersecurity and regulatory posture and identify technology-related risks. We can also conduct penetration testing and identify network vulnerabilities.

CONNECT WITH US


CONNECT WITH US


Our solutions

Risk Assessments and Testing

We can conduct an assessment across 700+ topics to identify technology-related risks and provide recommendations for improvement.

Mock Regulatory Cyber Exams

We can help your firm prepare for an SEC, NFA, or FINRA cyber exam by reviewing your information security program from a regulator’s perspective.

Cyber threats are constantly evolving, so it’s important to stay on top of new threats and address them as quickly as possible. We provide regulatory and cyber alerts, paste site and domain registration monitoring, and staff phishing testing to help protect your company from cyber attacks

We can help identify network vulnerabilities that could be exploited by a hacker and lead to a breach through vulnerability scanning or penetration testing. 

 

We can help your firm better understand payment flow and fraud risk mitigation opportunities with payment flow review, risk analysis, and reporting.

Microsoft Office 365 Security and Cloud Assessments

Companies are increasingly moving to cloud-based services such as Microsoft® Office 365®. Many companies do not take full advantage of the available security settings, which can dramatically impact the security and regulatory posture of your environment. This is also true of other cloud environments. Our assessment can help determine whether your company’s cloud environment is configured to protect user identities, enable compliance oversight obligations, and identify data loss. Based on our findings, we can assist your company with developing a practical action plan to address key risks.

1 of

Latest insights

ccpa privacy

Updates to the CCPA: Deadline is July 1

As we approach the California Consumer Privacy Act (CCPA) enforcement deadline you may be wondering what happens next. We have updated our CCPA FAQs with the most up-to-date information.

Article
  • Cybersecurity
  • Privacy
ACA Threat Intelligence Alert Blog Image

Widespread Telecom Outages Reported: Contingency Preparedness Recommended

On June 15, 2020 widespread voice and data outages were reported across the U.S with disruptions in service among major cell service carriers, internet service providers, social media platforms, gaming sites, streaming services, banking services, delivery services, and teleconferencing platforms.

Cyber Alert
  • Cybersecurity
cyber code

Countering COVID-19-related Fraud and Scams

Fraudsters are quick to exploit an opportunity and the coronavirus pandemic has led to attempts to take advantage of new working behaviors and hastily implemented government schemes. Learn about the heightened risk, as well as measures businesses can take to protect themselves and their employees.

Article
  • Cybersecurity
  • COVID-19
tprm vmos

Taking Control of Vendor Risk: A 6-Step Approach

Learn how ACA's 6-step approach can help you stay on top of the vendors your company uses and ensure that their cyber and technology risks are accounted for and managed.

Article
  • Cybersecurity
ACA Threat Intelligence Alert Blog Image

New Malware Attack Detected with Fake Pandemic Info from Johns Hopkins

Microsoft Security Intelligence has issued a security warning for a massive malware attack from emails about COVID-19 purportedly from Johns Hopkins Center. Learn more about this attack and how to defend your systems.

Cyber Alert
  • Cybersecurity
cyber code

Privacy Considerations on Returning to the Office

Read our guidelines for best privacy practices in implementing contact tracing and symptom tracking of employees as stay-at-home restrictions begin to ease and employees who have been working from home return to the office.

Article
  • Cybersecurity
  • Privacy
Solution Spotlight

Aponix Protect™ comprehensive cybersecurity and technology risk solution

Aponix Protect helps firms address evolving cyber risks and threats to ensure that their cybersecurity needs are covered year-round. This solution is available in three tiers, each one designed to provide firms with a flexible, robust, responsive, and cost-effective cybersecurity program.

News

Cybersecurity Benchmarking Survey Lists Top Concerns and Preparedness Among Respondents

Our annual survey in partnership with NSCP reveals that investment firms overlook AI as a cybersecurity risk and remain wary about SEC cybersecurity enforcement and compliance with new rules

ACA Group Launches Dedicated Practice Group Providing GRC Solutions for Wealth Managers

ACA Wealth sets a new standard in GRC support for wealth managers, providing unmatched expertise and comprehensive solutions to address evolving regulatory requirements.

ACA's Celebration of Women's Impact from History to Herstory

ACA proudly joins the global celebration of International Women's History Month, commemorating the remarkable achievements and enduring legacies of women worldwide.

Upcoming events