GRC hot topics
The acquisition of Catelas further enhances the holistic surveillance capabilities of ACA’s RegTech platform. Catelas’ patented technology automates the mapping of how people connect and form groups within a firm, isolates collusion risk, and detects high-risk behaviors.
- ACA News
A vulnerability has been discovered in Apple products that enables the installation of unauthorized software without the user's permission. The vulnerability is actively used to install Pegasus spyware on devices, allowing user activities to be surveilled by an external party.
As more assets have been allocated to alternative investments, and as regulatory scrutiny has dramatically increased, hedge fund managers are increasingly embracing the GIPS standards.
New York State Insurance Fund released an RFP last week seeking managers for up to $1 billion to be distributed across high yield corporate bonds, bank loans, CLOs, or some combination of all three asset classes.
In the current real estate investment environment, many firms want to understand the core components of the GIPS standards before committing the resources needed to attain compliance. Firms that already claim compliance seek to mitigate the risk of becoming noncompliant. This paper provides useful information for both objectives.
ACA Group (ACA), a leading provider of governance, risk, and compliance (GRC) advisory services and technology solutions, today announced that it has entered into a strategic partnership with the Investment Adviser Association (IAA), a leading organization dedicated to advancing the interests of investment advisers.
Microsoft reports a previously unseen “zero-day” attack that uses Office files tainted with specially crafted Active X controls. Once opened, these controls create a vulnerability that enables perpetrators to perform remote code execution.
This survey, sponsored by ACA’s Compliance Leaders Network (C-LEAD), will assess how compliance executives are using traditional and emerging compliance technology to better identify risk and create efficiencies within the compliance program. The results of this survey will provide participants with a deeper understanding of how their peers are maximizing the value of their technology spend.