Vendor Diligence and Management

Third-party risk management (TPRM) and vendor due diligence

Third-party risk management (TPRM) is the process of monitoring, validating, and remediating risks presented by third-party vendors. TPRM helps ensure your vendors protect your data, comply with regulations, and provide sustainable services that meet your requirements. However, vendor risk management can be a costly and time-consuming task. Our vendor management outsourcing service (VMOS) allows your company to offload the vendor due diligence and risk assessment process. Unlike other vendor risk management solutions and vendor management software providers, ACA's VMOS will help your company save valuable time and resources in order to focus on more strategic tasks.

CONNECT WITH US


CONNECT WITH US


Our solutions

Vendor Due Diligence

Our team administers due diligence questionnaires (DDQs), ensures vendors reply in a timely manner, and provides vendor support.

 

Analysis

Our team analyzes DDQ responses, evidence, and audits to identify vendor risks.

 

Reporting

You can track vendor diligence progress and view findings in our vendor risk management software platform.

Additional Advisory Services
  • On-site validation
  • On-site vendor due diligence
  • TPRM program development
  • Vendor risk ranking

 

GDPR Vendor Diligence

We can help determine if your vendors are compliant with GDPR requirements, working towards compliance, or have not considered the implications of GDPR. Our vendor management outsourcing service platform includes a GDPR-specific due diligence questionnaire that can be administered as a standalone questionnaire at a reduced rate, or as part of the standard ACA Aponix vendor DDQ.

1 of
Solution Spotlight

Our Vendor Management Software

Our vendor management software allows you to track DDQ progress and vendor risk assessment results. Key features include:

  • Vendor Risk Dashboard — View key metrics (e.g., vendors diligenced, progress of diligence reviews, and vendor comments)
  • Vendor Registry — View vendor data in centralized location (e.g., product lines, type of diligence performed, and contracts)
  • Vendor Risk Matrix — View all risks identified (e.g., ratings, issues), vendor communication, and mitigation/remediation activities
  • Questionnaire Status — Track the completion status of vendor DDQs and on-site reports

Why work with us?

Dedicated Team Of InfoSec Risk Analysts

Our vendor risk assessments are developed and managed by a team of information security risk analysts in ACA’s centralized, cost-effective analysis and review center (the ARC) in Pittsburgh, PA. The ARC’s dedicated vendor management outsourcing service team is overseen by an experienced vendor risk specialist and includes former senior managers in risk management, insider threat specialists, and data security officers from various industries, including financial services, banking, and healthcare. Over 750 clients and 2,000 vendors have chosen ACA to manage their vendor management process and mitigate third party risks.  
 

Our Vendor Risk Assessments

Our tailored, proprietary vendor due diligence questionnaires (DDQ) include over 300 questions and are customized for each vendor type to provide an accurate assessment of possible risks. Topics include:

  • General Data Protection Regulation (GDPR) compliance
  • Cyber awareness training
  • Governance
  • Physical and environmental security
  • Network security, infrastructure, and operations
  • Organizational overview and structure
  • Financials
  • Legal and compliance
  • Vendor management and oversight
  • Change management
  • Cloud services
  • Access controls
  • Mobile device management
  • Resiliency
  • Asset management
  • Data loss prevention

Why ACA?

Clients

750+

Vendors diligenced

2,500+

Latest Insights

Nasdaq Trade talks

Navigating the Future of Data Governance: Insights from ACA on Nasdaq TradeTalks

Carlo di Florio, Global Advisory Leader at ACA Group, recently joined a panel for Nasdaq TradeTalks to share his expertise on the critical role of data governance in the financial services industry.

Article
  • Artificial Intelligence (AI)
  • Compliance
  • Cybersecurity
abstract image with a lock and shield

OpenSSH Vulnerability Requires Immediate Action

A critical vulnerability has been discovered in OpenSSH, a widely used suite of secure networking utilities that provide encrypted communications over an unsecured network.

Cyber Alert
  • Cybersecurity
spark

Common AML Schemes: Cybersecurity Tactics

Cybercriminals often use a variety of online platforms and technologies to facilitate the laundering of illicit funds.

Article
  • AML and Financial Crime
aerial night view traffic 720x570.jpeg

The History of ETFs in the U.S.

From the launch of the first ETF in 1993, the market has continued to evolve in size and scope.

Article
  • Distribution
curved glass building looking up at a blue sky

FINRA Alert Regarding Form BR for Residential Supervisory Locations

FINRA issued an alert to member firms advising them not to close or withdraw Form BRs for Residential Supervisory Locations

Compliance Alert
  • Compliance
  • FINRA
london westminster big ben parliament aerial view

A Labour Government’s Regulation of the UK Asset Management Sector: Evolution, Not Revolution

The Labour Party vows to support innovation and growth for the asset management sector, but will they be able to deliver?

Article
  • FCA

News

Advisers’ Concerns of Off-Channel Communications Surpasses the Marketing Rule as Top Compliance Concern, Survey Reveals

Advisers’ concerns of off-channel communications eclipsed the Marketing Rule as the top compliance concern, according to the 2024 Investment Management Compliance Testing Survey.

ACA Group Named Most Preferred Workplace by Marksmen/India Today 2024-2025

ACA Honored with Marksmen/India Today Award for Most Preferred Workplace for 2024-2025

Apex Group and ACA Form Strategic Partnership to Enhance Client Experience

Apex Group and ACA form strategic partnership to enhance client experience. The alliance enables clients to seamlessly identify a reputable service provider that will help support and protect their business.

Upcoming events