ACA Aponix

Cybersecurity, technology risk assessment, and privacy services

ACA Aponix® provides cybersecurity and technology risk programs, data privacy compliance services, vendor and M&A diligence services, portfolio company oversight, network testing, and advisory services for companies of all sizes.

Our expertise

1 of
abstract black and white looking up at bridge rails

Strengthen your cyber program with Aponix Protect™

Aponix Protect helps firms address evolving cyber risks and threats to ensure that their cybersecurity needs are covered year-round. This solution is available in three tiers, each one designed to provide firms with a flexible, robust, responsive, and cost-effective cybersecurity program.​

black and white looking up at side of building

Increase oversight of your portfolio companies' cyber risk with PortCo Defend™

Our PortCo Protect program is designed to provide high-level insight into cybersecurity risks across a portfolio and measure the maturity of the cybersecurity approach at each investment entity. The program establishes minimum security requirements, a measurement framework and governance, and provide guidance/ assistance where needed. It is not intended to cause rework or significantly change the direction of a portfolio companies current security initiatives.​

abstract black and white architectural lines and shadows

Minimize risk and maximize enterprise value with technology, cyber, and privacy M&A diligence

Our team assists private equity firms with IT, cybersecurity, and privacy transaction advisory and risk management services. We provide full M&A integration analysis, design, oversight and execution services to help you minimize risk and maximize enterprise value for your most complex transactions by closely aligning our services with your investment thesis.​

Why work with us?

We provide cybersecurity and technology risk programs, data privacy compliance, vendor and M&A diligence services, network testing, and advisory services for companies of all sizes. Our unique approach combines a deep understanding of your workflows with our methodologies, thought leadership, and proprietary data to surface and prioritize the most important risks. Our award-winning solutions are designed to help firms uncover risks and identify deficiencies in their cybersecurity policies, procedures, and controls.

Why work with us?

Deep information technology experience. Award-winning solutions. Holistic approach to technology risk.

  • Experienced global team
  • Certified team members
  • Thought leaders in cybersecurity and IT risk
  • Over 650 companies work with us
  • Award-winning technology and solutions
  • Holistic approach to cybersecurity and IT risk

ACA Aponix provides cybersecurity and technology risk assessments, data privacy compliance, vendor and M&A diligence services, network testing, and advisory services for companies of all sizes. Our unique approach combines a deep understanding of your workflows with our methodologies, thought leadership, and proprietary data to surface and prioritize the most important risks. Our award-winning solutions are designed to help firms uncover risks and identify deficiencies in their cybersecurity policies, procedures, and controls.

Who we are

  • Our team consists of senior technologists who have started in the technology trenches, many growing into technology leaders at organizations ranging from small to large hedge funds, bulge-bracket banks, and technology services providers for the financial services sector.
  • ACA Aponix staff maintain or have held the following relevant certifications around cybersecurity risk management, incident response, penetration testing, information security, IT governance, privacy, and business. Additionally, select ACA Aponix staff maintain U.S. military security clearance.

Our certifications

Cybersecurity

  • CISSP, CISM, CISA, ISO27001:2013, CGEIT, CRISC, CTPRP, Security+, OSCE, OSCP, CEH, GXPN, GPEN, GWAPT, GCFE, GCCC, GCIH, GCIA, ECSA, SSA, CREST CPSA

Privacy

  • CIPM, CIPP, CIPT

IT & Business Continuity

  • A+, CCA, CNE, CCNA, CCNP, CSPO, ISO22301:2013, MCSA, MCSE, MSCP, Network+

Business

  • CFA, CM&AA, GSLC, JD, MBA, PhD, PMP, Six Sigma Black Belt

Our leadership team

Kavitha Vankita

Kavitha Venkita

Partner, Head of Cybersecurity and Risk

Kavitha is a Partner and the Business Lead for ACA Aponix, the dedicated global cybersecurity and technology risk advisory team.

Chad Neale, ISO27001:2013, GSLC, GCFE, CISA

Chad Neale

Partner

Chad is a Partner at ACA Aponix, the cybersecurity, privacy, and IT risk division of ACA Group and oversees ACA Aponix’s Strategic Technology Advisory and Risk practice.

Mike Pappacena

Mike Pappacena

Partner

Mike is a Partner at ACA Aponix, the cybersecurity, privacy, and IT risk division of ACA Group.

James Tedman

James Tedman

Partner

James is a Partner at ACA Aponix, the cybersecurity, privacy, and IT risk division of ACA Group. James manages ACA Aponix in Europe.

Marc Lotti, CGEIT, PMP

Marc Lotti

Strategic Advisor

Marc is a Strategic Advisor at ACA, and a Co-founder and formerly a Co-head Partner at ACA Aponix.

Kris Lau, CISM

Kris Lau

Managing Director

Kris is a Managing Director at ACA Aponix, specializing in information security program and policy development, risk management, vulnerability assessments, third-party security assessments, and audits.

Henry Lindemann

Henry Lindemann

Managing Director

Henry is a Managing Director at ACA Aponix, the cybersecurity, privacy, and IT risk division of ACA Group and oversees the sales department for the division.

Alex Scheinman, Ph.D.

Alex Scheinman

Managing Director

Alex is a Managing Director at ACA Aponix, overseeing ACA Aponix’s GDPR, CCPA, and other privacy regulation data-processing reviews and related programming.

Sara Laverick

Sara Laverick

Director

Sara oversees ACA Aponix's vendor diligence and management service (VMOS) team.

Jose Ramos

Jose Ramos

Director

Jose is a Director at ACA Aponix leading the penetration team.

Christine Tetherly-Lewis

Christine Tetherly-Lewis

Director

Christine is a Director at ACA Aponix.

1 of

Latest cyber and risk insights

abstract blue shapes connected by dots of light

FTC Amends Gramm-Leach-Bliley Act ‘Safeguards Rule’ to Strengthen the Data Security of Financial Institutions

FTC Amends Gramm-Leach-Bliley Act ‘Safeguards Rule’ to Strengthen the Data Security of Financial Institutions

Article
  • Cybersecurity
  • Cybersecurity Resources
abstract blue shapes connected by dots of light

FinCEN Issues Amended Advisory on Ransomware and Use of Financial System to Facilitate Ransom Payments

New FinCEN update on ransomware

Article
  • Cybersecurity
  • Cybersecurity Resources
abstract blue shapes connected by dots of light

Ransomware 101 Part 3: How to Respond to a Ransomware Attack

Our Ransomware 101 blog series addresses multiple aspects of the ransomware issue, including what you should know and what you should do to protect your firm, your clients, and your finances. In part one, we discussed the evolving and growing threat of ransomware. In this article (part three), we’ll provide steps for responding to a ransomware attack.

Article
  • Cybersecurity
  • Cybersecurity Resources
ACA Threat Intelligence Alert Blog Image

Private Equity Firms Report Receiving Phishing Emails and Scam Capital Calls

Private Equity Firms, their investors and their portfolio companies have recently been targeted in phishing attacks.

Cyber Alert
  • Cybersecurity
  • Cybersecurity Resources
  • Phishing
abstract blue shapes connected by dots of light

Personal Information Protection Law (PIPL) FAQs

The People’s Republic of China (PRC) has passed robust data privacy regulation that governs data security and personal information processing. This FAQ addresses questions firms may have about the nature of this legislation and its requirements.

Article
  • Cybersecurity
  • Privacy
Being smart about your smart phone

Being Smart About Your Smartphone

The more information you allow your smartphone apps to share, the easier it will be for hackers to steal this information and use it for malicious purposes. This post discusses best practices for securing your mobile device and the apps you install.

Article
  • Cybersecurity
  • Cybersecurity Resources

News

ACA Group and Foreside to Join Forces

The merger will bring together two of the industry’s most well-respected GRC solutions providers. ACA and Foreside together will be positioned to transform the future of GRC, creating a world-class platform for the financial services industry.

Michael Borts joins ACA Group as the new Chief Technology Officer

Michael Borts has joined the firm as Chief Technology Officer (CTO) to lead ACA’s technology development, vision, and strategy. In his role, he will oversee all product development for ACA’s award-winning ComplianceAlpha® regulatory technology platform and technology enablement at the firm.

ACA Group Acquires Catelas to Create Industry-first 360 Surveillance Offering

The acquisition of Catelas further enhances the holistic surveillance capabilities of ACA’s RegTech platform. Catelas’ patented technology automates the mapping of how people connect and form groups within a firm, isolates collusion risk, and detects high-risk behaviors.

Upcoming events

Money Laundering Reporting Officer: The Role and Responsibilities - 30 November 2021

The role of the Money Laundering Reporting Officer (MLRO) is a mandatory position in all firms in the Financial Services Industry. This reflects the statutory objective that the Regulator(s) have for ensuring that firms behave with “Integrity”, particularly relating to financial crime prevention. The MLRO therefore plays a significant role in assisting Senior management to ensure that systems and controls relating to anti-money laundering (AML) and countering the risk of terrorist financing (CTF) are appropriate and effective. This course provides practical advice and guidance on the responsibilities of the MLRO, what is expected by the Regulators, both of the Senior Management and the MLRO, and how those responsibilities can be achieved. It should be noted that attendance at this course does assume a good knowledge of the UK’s AML/CTF regulations.

Online Training

Get Your Cyber House in Order

Our speakers will discuss how to tailor your spending and prioritize your budget to meet the needs of your firm and regulatory requirements.

Webcast

Senior Management Obligations under the SM&CR - 1 December 2021

The ever-increasing focus by the Regulators on the accountability of senior management, particularly when things go wrong, emphasises how important it is for individuals in senior positions to have a clear understanding of what is expected of them. This succinct course is designed to assist Senior Managers to have a full understanding of what they need to do to achieve compliance with the rules under the obligations created by the Senior Managers and Certification Regime (SMCR).

Online Training