Unlocking Success: How Managed Investment Performance Services Drive Business Excellence
Join us to discover how our managed performance services have helped firms navigate diverse investment performance challenges and achieve success.
Third-party risk management (TPRM) is the process of monitoring, validating, and remediating risks presented by third-party vendors. TPRM helps ensure your vendors protect your data, comply with regulations, and provide sustainable services that meet your requirements. However, vendor risk management can be a costly and time-consuming task. Our vendor management outsourcing service (VMOS) allows your company to offload the vendor due diligence and risk assessment process. Unlike other vendor risk management solutions and vendor management software providers, ACA's VMOS will help your company save valuable time and resources in order to focus on more strategic tasks.
Our vendor management software allows you to track DDQ progress and vendor risk assessment results. Key features include:
Our vendor risk assessments are developed and managed by a team of information security risk analysts in ACA’s centralized, cost-effective analysis and review center (the ARC) in Pittsburgh, PA. The ARC’s dedicated vendor management outsourcing service team is overseen by an experienced vendor risk specialist and includes former senior managers in risk management, insider threat specialists, and data security officers from various industries, including financial services, banking, and healthcare. Over 750 clients and 2,000 vendors have chosen ACA to manage their vendor management process and mitigate third party risks.
Our tailored, proprietary vendor due diligence questionnaires (DDQ) include over 300 questions and are customized for each vendor type to provide an accurate assessment of possible risks. Topics include:
Roy Kim has joined ACA’s regulatory compliance team as Director of Banking Asset Management.
Most firms find “compliance culture” an important, yet elusive, term that is difficult to define and even more challenging to shape and nurture. However, it’s clear that a compliance culture sets the basis of behavior, integrity and accountability across an organization. But what are the core values that can help firms focus their overall efforts to build a compliance culture more effectively?
The midterm elections are a few short months away, and a number of recent administrative proceedings against both registered investment advisers and exempt reporting advisers by the U.S. Securities and Exchange Commission (“SEC”) should serve as a valuable reminder of the importance of actively monitoring for risks that exposure to government entities or political parties may present. Here are helpful insights and suggested action items to help advisers mitigate these risks.
A key pillar of the MiFID II regime is the record keeping requirements that underpin many of the new or enhanced obligations. Now seven months after MiFID II implementation, what challenges have these requirements created for the buy-side? We discuss this with senior compliance consultants, Charlotte Malin and Matthew Chapman.
The end result of a firm’s efforts when claiming compliance with the GIPS standards is the delivery of a fully compliant presentation to prospective clients. This article addresses best practices for marketing when claiming compliance with the GIPS standards.
For the fifth year in a row, cybersecurity continues to be the biggest compliance concern at registered investment adviser firms.
ACA Group Recognized as RegTech100 Company for Fifth Consecutive Year
ACA Group introduces advanced features to its ACA Vantage for ESG platform, leveraging AI to help clients verify ESG data and streamline data management processes. This innovative solution empowers organizations to efficiently manage ESG requirements with greater accuracy and ease.
ACA Group Recognized at Pittsburgh Technology Council’s Tech 50
Join us to discover how our managed performance services have helped firms navigate diverse investment performance challenges and achieve success.
Join our cybersecurity experts as they reveal findings from these unique datasets and provide the benchmarks and analysis PE sponsors need to strengthen their cybersecurity oversight practices.
Join us to learn how OCIO firms are planning to implement the CFA’s new requirements within their firms and in their marketing materials.