Cybersecurity and Risk Insights and Alerts

Cyber risks and threats continue to evolve, and firms are under pressure to meet SEC and FCA expectations for operational resilience as well as their own internal and client expectations for cybersecurity and privacy. Stay current on the latest cybersecurity, privacy, and risk threat and regulatory alerts, and build your cybersecurity and privacy knowledge with insights from our cybersecurity and technology risk experts.

ACA Aponix Cybersecurity Checklist

Download and review the following cybersecurity safeguards and evaluate your firm’s cybersecurity program.

Cyber alerts and insights

highway at night from overhead

Cybersecurity Considerations for Private Equity Firms: Mitigating the Cyber Risks of Portfolio Companies

As we approach the end of 2017 and reflect on the past year, it’s hard to ignore the recent surge in cybercrime and the financial, operational, and reputational losses that breaches have caused port

Article
  • Cybersecurity
abstract image with a lock and shield

7 Cybersecurity Trends to Plan for in 2018

In the past year, it’s become apparent that cyber breaches are on the rise, and they are crippling businesses in their wake.

Cyber Alert
  • Cybersecurity
abstract image with a lock and shield

5 Best Practices for Building an Effective Vulnerability Management Program

This is the first post in a series of cybersecurity tips and tricks from ACA Aponix's team of experienced consultants.

Cyber Alert
  • Cybersecurity
tprm vmos

Don’t Let Third Parties Be Your Downfall — How to Ensure Your Vendors are Protecting Your Assets

In the wake of the recent Equifax breach that potentially affected the personal data of more than 143 million Americans, Equifax is pointing the finger at one of its third-party vendors as the cause.

Cyber Alert
  • Cybersecurity
abstract image with a lock and shield

What Investment Advisers Need to Know about Regulatory Cybersecurity

I recently joined ACA as Managing Director and Head of ACA Aponix’s Global Regulatory Cybersecurity Practice.

Cyber Alert
  • Cybersecurity
abstract image with a lock and shield

7 Ways You Can Secure Your Network Endpoints

An endpoint is any device connected to your enterprise network — laptops, PCs, and printers, for example.

Cyber Alert
  • Cybersecurity