Key Findings from the ACA and NSCP 2024 Cybersecurity Program Benchmarking Survey
We will share valuable insights from our biannual Cybersecurity Benchmarking Survey in partnership with NSCP.
Third-party risk management (TPRM) is the process of monitoring, validating, and remediating risks presented by third-party vendors. TPRM helps ensure your vendors protect your data, comply with regulations, and provide sustainable services that meet your requirements. However, vendor risk management can be a costly and time-consuming task. Our vendor management outsourcing service (VMOS) allows your company to offload the vendor due diligence and risk assessment process. Unlike other risk management solutions and vendor management software providers, ACA's VMOS will help your company save valuable time and resources in order to focus on more strategic tasks.
Our vendor management software allows you to track DDQ progress and vendor risk assessment results. Key features include:
Our vendor risk assessments are developed and managed by a team of information security risk analysts in ACA’s centralized, cost-effective analysis and review center (the ARC) in Pittsburgh, PA. The ARC’s dedicated VMOS team is overseen by an experienced vendor risk specialist and includes former senior managers in risk management, insider threat specialists, and data security officers from various industries, including financial services, banking, and healthcare. Over 750 clients and 2,000 vendors have chosen ACA to manage their vendor management process and mitigate third party risks.
Our tailored, proprietary vendor due diligence questionnaires (DDQ) include over 300 questions and are customized for each vendor type to provide an accurate assessment of possible risks. Topics include:
Did you miss our California Consumer Privacy Act webcast? Download our FAQs guide to learn more about the CCPA and how you can prepare for the compliance deadline.
ACA Aponix consultant Chris Stover shares 4 ways to prevent breaches and test your company’s security controls.
As the 2018 finish line approaches, it is necessary to start looking ahead to how you want to shape your compliance program for the coming year. Last week, we discussed how to build the foundation of your budgeting process. This week, we asked the many former regulators and CCOs on ACA’s staff for their perspective on the most crucial components of building a compliance budget.
Did you miss our vendor risk management webcast? ACA Aponix's Marc Lotti shares tips from the session for a team approach to vendor risk management.
This case study explains how a private equity firm utilized ACA's M&A diligence and advisory services to determine the security of their target's integrated platform and necessary investment in technology, processes, and personnel to support their investment thesis.
The adoption of RegTech is rapidly becoming business as usual for an increasing number of compliance teams, with personal trading/code of ethics compliance being one of the most significant areas of RegTech adoption. ACA's Jordan Schwartz details the major benefits of adopting a code of ethics/personal trading technology solution.
Our annual survey in partnership with NSCP reveals that investment firms overlook AI as a cybersecurity risk and remain wary about SEC cybersecurity enforcement and compliance with new rules
ACA Wealth sets a new standard in GRC support for wealth managers, providing unmatched expertise and comprehensive solutions to address evolving regulatory requirements.
ACA proudly joins the global celebration of International Women's History Month, commemorating the remarkable achievements and enduring legacies of women worldwide.
We will share valuable insights from our biannual Cybersecurity Benchmarking Survey in partnership with NSCP.
Please join ACA Group, Sidley, and the IAA in Chicago for an engaging conversation about hot topics for investment advisers.
Join our team in NYC at the MFA Legal & Compliance Conference.