Risk Assessments and Regulatory Compliance Testing Services

Technology and cloud assessments, penetration testing and vulnerability assessments, and cyber exams

We offer a variety of risk assessment services to help companies identify gaps in their cybersecurity and regulatory posture and identify technology-related risks. We can also conduct penetration testing and identify network vulnerabilities.

CONNECT WITH US


CONNECT WITH US


Our solutions

Risk Assessment Services and Regulatory Compliance Testing

We can conduct an assessment across 700+ topics to identify technology-related risks and provide recommendations for improvement.

Mock Regulatory Cyber Exams

We can help your firm prepare for an SEC, NFA, or FINRA cyber exam by reviewing your information security program from a regulator’s perspective.

Cyber threats are constantly evolving, so it’s important to stay on top of new threats and address them as quickly as possible. We provide regulatory and cyber alerts, paste site and domain registration monitoring, and staff phishing testing to help protect your company from cyber attacks

We can help identify network vulnerabilities that could be exploited by a hacker and lead to a breach through vulnerability scanning or penetration testing. 

 

We can help your firm better understand payment flow and fraud risk mitigation opportunities with payment flow review, risk analysis, and reporting.

Microsoft Office 365 Security and Cloud Assessments

Companies are increasingly moving to cloud-based services such as Microsoft® Office 365®. Many companies do not take full advantage of the available security settings, which can dramatically impact the security and regulatory posture of your environment. This is also true of other cloud environments. Our assessment can help determine whether your company’s cloud environment is configured to protect user identities, enable compliance oversight obligations, and identify data loss. Based on our findings, we can assist your company with developing a practical action plan to address key risks.

1 of

Latest insights

ACA Threat Intelligence Alert Blog Image

GoDaddy Breach Discovered

Web hosting giant GoDaddy® has suffered a breach affecting thousands of users, per reports of security researchers. The data breach occurred in October 2019, but was first discovered on April 23rd of this year.

Cyber Alert
  • Cybersecurity
ACA Threat Intelligence Alert Blog Image

Vulnerability Discovered in Email App on iPhone and iPad

Learn how to protect yourself from the "zero-click” vulnerability discovered on Apple® iPhones® and iPads® that enables bad actors to hack into devices by sending specially crafted email.

Cyber Alert
  • Cybersecurity
PE Firms

Lower IT Costs and Increase Efficiency During the COVID-19 Pandemic: A Guide for Private Equity Firms

How can PE firms reduce costs, enhance efficiency, and shore up their portfolio companies during these troubled times?

Article
  • Cybersecurity
  • Portfolio Company Risk Management
  • BCP
  • COVID-19
ACA Threat Intelligence Alert Blog Image

New “Zero-Day” Zoom Exploits Uncovered

Two new and dangerous exploits of the popular Zoom teleconferencing software that allow attackers to hack Zoom users, spy on their calls, and potentially exfiltrate user data have been made available for sale to hackers.

Cyber Alert
  • Compliance
  • Cybersecurity
cyber lock

Staying on Top of Data Privacy During the COVID-19 Pandemic

Technology and information security may not be as strong in work-from-home environments as in office settings, and the risk of exposure of sensitive information may be greater. Firms need to remain vigilant about data privacy to meet regulatory expectations and protect against breaches.

Article
  • Cybersecurity
  • Privacy
  • BCP
  • COVID-19
ACA Threat Intelligence Alert Blog Image

New "Coronavirus" Malware Targets Windows Users

Researchers have discovered multiple computer viruses and destructive software (malware) that use coronavirus and COVID-19 themes. These malware programs can be significantly damaging to systems and the data they maintain.

Cyber Alert
  • Cybersecurity
Solution Spotlight

Aponix Protect™ comprehensive cybersecurity and technology risk solution

Aponix Protect helps firms address evolving cyber risks and threats to ensure that their cybersecurity needs are covered year-round. This solution is available in three tiers, each one designed to provide firms with a flexible, robust, responsive, and cost-effective cybersecurity program.

News

ACA Group Acquires Global Trading Analytics to Offer Clients Leading Transaction Cost Analysis Capabilities

ACA Group Acquires Global Trading Analytics to Offer Clients Leading Transaction Cost Analysis Capabilities

Five ACA Group Leaders Recognized Among the 2&20 Top 100 Most Influential People in the Service Provision for Alternative Investment Firms

Five ACA Group Leaders Recognized Among the 2&20 Top 100 Most Influential People in the Service Provision for Alternative Investment Firms

ACA Group Recognized as RegTech100 Company for Fifth Consecutive Year

ACA Group Recognized as RegTech100 Company for Fifth Consecutive Year

Upcoming events

2025 ACA Conference

Join us in sunny Orlando, Florida for ACA's 2025 Conference, "Preparing Today, Protecting Tomorrow," where industry leaders and experts will converge to explore the evolving landscape of financial services.

Conference