ACA Aponix

Cybersecurity, technology risk assessment, and privacy services

ACA Aponix® provides cybersecurity and technology risk programs, data privacy compliance services, vendor and M&A diligence services, portfolio company oversight, network testing, and advisory services for companies of all sizes.

Our expertise

1 of
abstract black and white looking up at bridge rails

Strengthen your cyber program with Aponix Protect™

Aponix Protect helps firms address evolving cyber risks and threats to ensure that their cybersecurity needs are covered year-round. This solution is available in three tiers, each one designed to provide firms with a flexible, robust, responsive, and cost-effective cybersecurity program.​

black and white looking up at side of building

Increase oversight of your portfolio companies' cyber risk with PortCo Defend™

Our PortCo Protect program is designed to provide high-level insight into cybersecurity risks across a portfolio and measure the maturity of the cybersecurity approach at each investment entity. The program establishes minimum security requirements, a measurement framework and governance, and provide guidance/ assistance where needed. It is not intended to cause rework or significantly change the direction of a portfolio companies current security initiatives.​

abstract black and white architectural lines and shadows

Minimize risk and maximize enterprise value with technology, cyber, and privacy M&A diligence

Our team assists private equity firms with IT, cybersecurity, and privacy transaction advisory and risk management services. We provide full M&A integration analysis, design, oversight and execution services to help you minimize risk and maximize enterprise value for your most complex transactions by closely aligning our services with your investment thesis.​

Why work with us?

We provide cybersecurity and technology risk programs, data privacy compliance, vendor and M&A diligence services, network testing, and advisory services for companies of all sizes. Our unique approach combines a deep understanding of your workflows with our methodologies, thought leadership, and proprietary data to surface and prioritize the most important risks. Our award-winning solutions are designed to help firms uncover risks and identify deficiencies in their cybersecurity policies, procedures, and controls.

Why work with us?

Deep information technology experience. Award-winning solutions. Holistic approach to technology risk.

  • Experienced global team
  • Certified team members
  • Thought leaders in cybersecurity and IT risk
  • Over 650 companies work with us
  • Award-winning technology and solutions
  • Holistic approach to cybersecurity and IT risk

ACA Aponix provides cybersecurity and technology risk assessments, data privacy compliance, vendor and M&A diligence services, network testing, and advisory services for companies of all sizes. Our unique approach combines a deep understanding of your workflows with our methodologies, thought leadership, and proprietary data to surface and prioritize the most important risks. Our award-winning solutions are designed to help firms uncover risks and identify deficiencies in their cybersecurity policies, procedures, and controls.

Who we are

  • Our team consists of senior technologists who have started in the technology trenches, many growing into technology leaders at organizations ranging from small to large hedge funds, bulge-bracket banks, and technology services providers for the financial services sector.
  • ACA Aponix staff maintain or have held the following relevant certifications around cybersecurity risk management, incident response, penetration testing, information security, IT governance, privacy, and business. Additionally, select ACA Aponix staff maintain U.S. military security clearance.

Our certifications

Cybersecurity

  • CISSP, CISM, CISA, ISO27001:2013, CGEIT, CRISC, CTPRP, Security+, OSCE, OSCP, CEH, GXPN, GPEN, GWAPT, GCFE, GCCC, GCIH, GCIA, ECSA, SSA, CREST CPSA

Privacy

  • CIPM, CIPP, CIPT

IT & Business Continuity

  • A+, CCA, CNE, CCNA, CCNP, CSPO, ISO22301:2013, MCSA, MCSE, MSCP, Network+

Business

  • CFA, CM&AA, GSLC, JD, MBA, PhD, PMP, Six Sigma Black Belt

Our leadership team

Kavitha Vankita

Kavitha Venkita

Partner, Head of Cybersecurity and Risk

Kavitha is a Partner and the Business Lead for ACA Aponix, the dedicated global cybersecurity and technology risk advisory team.

Chad Neale, ISO27001:2013, GSLC, GCFE, CISA

Chad Neale

Partner

Chad is a Partner at ACA Aponix, the cybersecurity, privacy, and IT risk division of ACA Group and oversees ACA Aponix’s Strategic Technology Advisory and Risk practice.

Mike Pappacena

Mike Pappacena

Partner

Mike is a Partner at ACA Aponix, the cybersecurity, privacy, and IT risk division of ACA Group.

James Tedman

James Tedman

Partner

James is a Partner at ACA Aponix, the cybersecurity, privacy, and IT risk division of ACA Group. James manages ACA Aponix in Europe.

Marc Lotti, CGEIT, PMP

Marc Lotti

Strategic Advisor

Marc is a Strategic Advisor at ACA, and a Co-founder and formerly a Co-head Partner at ACA Aponix.

Kris Lau, CISM

Kris Lau

Managing Director

Kris is a Managing Director at ACA Aponix, specializing in information security program and policy development, risk management, vulnerability assessments, third-party security assessments, and audits.

Henry Lindemann

Henry Lindemann

Managing Director

Henry is a Managing Director at ACA Aponix, the cybersecurity, privacy, and IT risk division of ACA Group and oversees the sales department for the division.

Alex Scheinman, Ph.D.

Alex Scheinman

Managing Director

Alex is a Managing Director at ACA Aponix, overseeing ACA Aponix’s GDPR, CCPA, and other privacy regulation data-processing reviews and related programming.

Sara Laverick

Sara Laverick

Director

Sara oversees ACA Aponix's vendor diligence and management service (VMOS) team.

Jose Ramos

Jose Ramos

Director

Jose is a Director at ACA Aponix leading the penetration team.

Christine Tetherly-Lewis

Christine Tetherly-Lewis

Director

Christine is a Director at ACA Aponix.

1 of

Latest cyber and risk insights

abstract blue shapes connected by dots of light

Personal Information Protection Law (PIPL) FAQs

The People’s Republic of China (PRC) has passed robust data privacy regulation that governs data security and personal information processing. This FAQ addresses questions firms may have about the nature of this legislation and its requirements.

Article
  • Cybersecurity
  • Privacy
Being smart about your smart phone

Being Smart About Your Smartphone

The more information you allow your smartphone apps to share, the easier it will be for hackers to steal this information and use it for malicious purposes. This post discusses best practices for securing your mobile device and the apps you install.

Article
  • Cybersecurity
  • Cybersecurity Resources
abstract blue shapes connected by dots of light

October is Cybersecurity Awareness Month

During the month of October, businesses across the globe will focus on educating their employees on how to stay diligent and safe online. As we prepare for Cybersecurity Awareness Month, we’d like to share some resources you can use to help promote privacy and online safety at your firm.

Article
  • Cybersecurity
  • Cybersecurity Resources
ACA's Password Best Practices

Password Reset Best Practices

From work-related accounts to online banking or shopping to gym memberships, passwords have long been our golden ticket to accessing the online world and keeping our accounts safe. With so many accounts and passwords, it is no surprise that account users often dread when their passwords expire, forcing them to add to their ever-expanding alphabet soup of passwords. 

Article
  • Cybersecurity Resources
  • Cybersecurity
ACA's Password Best Practices

Password Strength Best Practices

Passwords are the most common method of authentication, but remembering a unique password for each account you have can be a pain. Here are ACA Aponix's best practices for creating and managing passwords to help protect your accounts from a cyber-attack.

Article
  • Cybersecurity
  • Cybersecurity Resources
Protect Your Data at Home

Protecting Your Home's Smart Devices

Our homes are becoming increasingly connected to the outside world through "smart" devices, which work together over your Wi-Fi network to make your home more comfortable, safe, and convenient. Common smart devices include thermostats, televisions, light bulbs, and surveillance systems.

Article
  • Cybersecurity
  • Cybersecurity Resources

News

ACA Group Named Accounting/Due Diligence Firm of the Year by M&A Advisor

ACA Group announced today that ACA Aponix® is the recipient of the Accounting/Due Diligence Firm of the Year in the 20th Annual M&A Advisor Awards. The M&A Advisor Awards are the benchmark for dealmaking excellence, recognizing the leading M&A Transactions, Restructurings, Deal Financings, Product/ Services, Firms, and Professionals.

ACA Group Selected as a RegTech100 Company for 2022

ACA is delighted to be counted among the 100 most innovative RegTech companies in the financial industry.

ACA Group Named Best Regulatory Consultancy - North America by RegTech Insight

ACA is honored to be voted Best Regulatory Consultancy - North America in the RegTech Insight Awards 2021 USA.

Upcoming events

Money Laundering Reporting Officer: The Role and Responsibilities - 2 February 2022

The role of the Money Laundering Reporting Officer (MLRO) is a mandatory position in all firms in the Financial Services Industry. This reflects the statutory objective that the Regulator(s) have for ensuring that firms behave with “Integrity”, particularly relating to financial crime prevention. The MLRO therefore plays a significant role in assisting Senior management to ensure that systems and controls relating to anti-money laundering (AML) and countering the risk of terrorist financing (CTF) are appropriate and effective. This course provides practical advice and guidance on the responsibilities of the MLRO, what is expected by the Regulators, both of the Senior Management and the MLRO, and how those responsibilities can be achieved. It should be noted that attendance at this course does assume a good knowledge of the UK’s AML/CTF regulations.

Online Training

Annual Update - Senior Managers Obligations - 9 February 2022

The ever-increasing focus by the Regulators on the accountability of senior management, particularly when things go wrong, emphasises how important it is for individuals in senior positions to have a clear understanding of what is expected of them. This succinct course is designed to assist Senior Managers to have a full understanding of what they need to do to achieve compliance with the rules under the obligations created by the Senior Managers and Certification Regime (SMCR).

Online Training

Compliance Officer: The Roles and Responsibilities - 10 February 2022

The role of the Compliance Officer is a mandatory position in all firms in the Financial Services Industry. They play a major role in assisting Senior Management to ensure that appropriate and effective systems and controls are in place to achieve and maintain compliance with the applicable Rules. While the nature of the Compliance Function is likely to differ from one firm to another, this course provides an easy to follow breakdown of what the Regulator expects of a Compliance Officer and explains, in practical terms how the regulatory expectations and those of Senior Management can be achieved.

Online Training