Vendor Diligence and Management

Third-party risk management (TPRM) and vendor due diligence

Third-party risk management (TPRM) is the process of monitoring, validating, and remediating risks presented by third-party vendors. TPRM helps ensure your vendors protect your data, comply with regulations, and provide sustainable services that meet your requirements. However, vendor risk management can be a costly and time-consuming task. Our vendor management outsourcing service (VMOS) allows your company to offload the vendor due diligence and risk assessment process. Unlike other risk management solutions and vendor management software providers, ACA's VMOS will help your company save valuable time and resources in order to focus on more strategic tasks.

CONNECT WITH US


CONNECT WITH US


Our solutions

Vendor Due Diligence

Our team administers due diligence questionnaires (DDQs), ensures vendors reply in a timely manner, and provides vendor support.

 

Analysis

Our team analyzes DDQ responses, evidence, and audits to identify vendor risks.

 

Reporting

You can track vendor diligence progress and view findings in our vendor management software platform.

Additional Advisory Services
  • On-site validation
  • On-site vendor due diligence
  • TPRM program development
  • Vendor risk ranking

 

GDPR Vendor Diligence

We can help determine if your vendors are compliant with GDPR requirements, working towards compliance, or have not considered the implications of GDPR. Our vendor management platform includes a GDPR-specific due diligence questionnaire that can be administered as a standalone questionnaire at a reduced rate, or as part of the standard ACA Aponix vendor DDQ.

1 of
Solution Spotlight

Our Vendor Management Software

Our vendor management software allows you to track DDQ progress and vendor risk assessment results. Key features include:

  • Vendor Risk Dashboard — View key metrics (e.g., vendors diligenced, progress of diligence reviews, and vendor comments)
  • Vendor Registry — View vendor data in centralized location (e.g., product lines, type of diligence performed, and contracts)
  • Vendor Risk Matrix — View all risks identified (e.g., ratings, issues), vendor communication, and mitigation/remediation activities
  • Questionnaire Status — Track the completion status of vendor DDQs and on-site reports

Why work with us?

Dedicated Team Of InfoSec Risk Analysts

Our vendor risk assessments are developed and managed by a team of information security risk analysts in ACA’s centralized, cost-effective analysis and review center (the ARC) in Pittsburgh, PA. The ARC’s dedicated VMOS team is overseen by an experienced vendor risk specialist and includes former senior managers in risk management, insider threat specialists, and data security officers from various industries, including financial services, banking, and healthcare. Over 750 clients and 2,000 vendors have chosen ACA to manage their vendor management process and mitigate third party risks.  
 

Our Vendor Risk Assessments

Our tailored, proprietary vendor due diligence questionnaires (DDQ) include over 300 questions and are customized for each vendor type to provide an accurate assessment of possible risks. Topics include:

  • General Data Protection Regulation (GDPR) compliance
  • Cyber awareness training
  • Governance
  • Physical and environmental security
  • Network security, infrastructure, and operations
  • Organizational overview and structure
  • Financials
  • Legal and compliance
  • Vendor management and oversight
  • Change management
  • Cloud services
  • Access controls
  • Mobile device management
  • Resiliency
  • Asset management
  • Data loss prevention

Why ACA?

Clients

750+

Vendors diligenced

2,500+

Latest Insights

highway at night from overhead

Analysis and Review Center Celebrates 5 Years of Centralized Managed Services

In 2014, the ARC was created to provide a simple way for CCOs to outsource the exhaustive and time-consuming task of email communications reviews. Today, the ARC is a dedicated knowledge center that provides efficient, scalable, and cost-effective compliance support to thousands of firms with over 10 established services as well as client tailored, bespoke solutions. Learn more about how the ARC has evolved and why managed services are the wave of the future for compliance.

Article
  • ACA News
cyber lock

October is Cybersecurity Awareness Month!

Breaches and cyber incidents occur when employees are not fully trained on how to identify cyber issues, policies are not being followed, and third-party systems are not fully vetted or secured.

Article
  • Cybersecurity
curved glass building looking up at a blue sky

SEC Guidance on Investment Adviser Proxy Voting Responsibilities

On August 21, 2019, the U.S.

Compliance Alert
  • Compliance
abstract black and white looking up at building

ACA Compliance Group Launches Holistic Surveillance Solution for Financial Services Firms

ACA’s holistic surveillance solution brings together ACA’s established surveillance services and technology solutions in a comprehensive package designed to help firms meet the surveillance expectations of regulators as well as to replicate their technological capabilities.

Press Release
  • Trade Surveillance
  • Compliance
  • RegTech
  • ComplianceAlpha
highway at night from overhead

Five Key Takeaways from ACA’s Boston Hedge Fund Briefing

ACA’s Hedge Fund Practice hosted a breakfast event in Boston with local CCOs, with a fireside chat with senior staff from the Securities Exchange Commission’s (“SEC”) Office of Compliance Inspections and Examinations (“OCIE”) and Division of Enforcement. The SEC staff discussed priorities pursued by OCIE and Enforcement, the SEC’s use of data analytics, challenges related to deficiencies (or a lack there of) stemming from exams, and expectations around firm’s trade surveillance policies, procedures, and practices. Read our key takeaways.

Article
  • Compliance
highway at night from overhead

Data Retention Challenges During an AML System Migration

Today, many financial institutions are changing the anti-money laundering (AML) technology platform they use to perform required compliance processes, such as transaction monitoring and sanctions screening. Once the process has started, there are important considerations around data migration that must be managed correctly.

Article
  • AML and Financial Crime

News

Cybersecurity Benchmarking Survey Lists Top Concerns and Preparedness Among Respondents

Our annual survey in partnership with NSCP reveals that investment firms overlook AI as a cybersecurity risk and remain wary about SEC cybersecurity enforcement and compliance with new rules

ACA Group Launches Dedicated Practice Group Providing GRC Solutions for Wealth Managers

ACA Wealth sets a new standard in GRC support for wealth managers, providing unmatched expertise and comprehensive solutions to address evolving regulatory requirements.

ACA's Celebration of Women's Impact from History to Herstory

ACA proudly joins the global celebration of International Women's History Month, commemorating the remarkable achievements and enduring legacies of women worldwide.

Upcoming events