Risk Assessments and Regulatory Compliance Testing Services
We offer a variety of risk assessment services to help companies identify gaps in their cybersecurity and regulatory posture and identify technology-related risks. We can also conduct penetration testing and identify network vulnerabilities.
CONNECT WITH US
Latest insights
![lock](/sites/default/files/styles/width_280/public/2023-04/cyber.png.webp?itok=Numrp8Tt)
Merger and Acquisition Platform Datasite Named as a Victim of MOVEit Breach
Datasite, which provides a data sharing platform and encrypted data rooms for potential merger and acquisition partners, is the latest victim of the MOVEit Breach.
- Cybersecurity
![meta person](/sites/default/files/styles/width_280/public/2023-06/vantage.png.webp?itok=i7HLLpxI)
Myths About Cybersecurity Portfolio Oversight: Myth #2
Cyber threats are on the rise, making robust cybersecurity oversight essential for protecting investments. We debunk a common myth about portfolio oversight.
- Cybersecurity Resources
- Cybersecurity
- Portfolio Company Risk Management
![lock](/sites/default/files/styles/width_280/public/2023-04/cyber.png.webp?itok=Numrp8Tt)
Fortinet releases security advisory for critical heap-based overflow vulnerability
Fortinet's June 12th advisory warns of a critical vulnerability (CVE-2023-27997) rated 9.8/10 by NIST. FortiOS and FortiProxy SSL-VPN users are at risk of system access by hackers.
- Cybersecurity
![meta person](/sites/default/files/styles/width_280/public/2023-03/meta_person.png.webp?itok=lAhy89f2)
Myths About Cybersecurity Portfolio Oversight: Myth #1
Cyber threats are on the rise, making robust cybersecurity oversight essential for protecting investments. We debunk a common myth about portfolio oversight.
- Cybersecurity Resources
- Cybersecurity
- Portfolio Company Risk Management
![abstract image with a lock and shield](/sites/default/files/styles/width_280/public/2022-03/Cyber%20alert%20blog%20default%20image.jpg.webp?itok=qGrHq_my)
Critical MOVEit Transfer Vulnerability Updates
Progress Software discovered a critical SQL injection vulnerability (CVE-2023-34362) on May 31st in the MOVEit Transfer software which allowed unauthorized access to the Transfer environment and escalated privileges.
- Cybersecurity
![streaks](/sites/default/files/styles/width_280/public/2022-10/istock-1188134166_0.jpg.webp?itok=MfnBU_2E)
13 Key Elements for Successful Cybersecurity Portfolio Oversight
Our cyber team has identified the key elements of successful programmatic cyber oversight. By adopting these elements, firms can avoid value destruction, meet investor expectations, and increase valuations of their portfolio.
- Cybersecurity
- Cybersecurity Resources
- Portfolio Company Risk Management
Aponix Protect™ comprehensive cybersecurity and technology risk solution
Aponix Protect helps firms address evolving cyber risks and threats to ensure that their cybersecurity needs are covered year-round. This solution is available in three tiers, each one designed to provide firms with a flexible, robust, responsive, and cost-effective cybersecurity program.
News
Advisers’ Concerns of Off-Channel Communications Surpasses the Marketing Rule as Top Compliance Concern, Survey Reveals
Advisers’ concerns of off-channel communications eclipsed the Marketing Rule as the top compliance concern, according to the 2024 Investment Management Compliance Testing Survey.
ACA Group Named Most Preferred Workplace by Marksmen/India Today 2024-2025
ACA Honored with Marksmen/India Today Award for Most Preferred Workplace for 2024-2025
Apex Group and ACA Form Strategic Partnership to Enhance Client Experience
Apex Group and ACA form strategic partnership to enhance client experience. The alliance enables clients to seamlessly identify a reputable service provider that will help support and protect their business.