2025 ACA Conference
Join us in sunny Orlando, Florida for ACA's 2025 Conference, "Preparing Today, Protecting Tomorrow," where industry leaders and experts will converge to explore the evolving landscape of financial services.
Third-party risk management (TPRM) is the process of monitoring, validating, and remediating risks presented by third-party vendors. TPRM helps ensure your vendors protect your data, comply with regulations, and provide sustainable services that meet your requirements. However, vendor risk management can be a costly and time-consuming task. Our vendor management outsourcing service (VMOS) allows your company to offload the vendor due diligence and risk assessment process. Unlike other vendor risk management solutions and vendor management software providers, ACA's VMOS will help your company save valuable time and resources in order to focus on more strategic tasks.
Our vendor management software allows you to track DDQ progress and vendor risk assessment results. Key features include:
Our vendor risk assessments are developed and managed by a team of information security risk analysts in ACA’s centralized, cost-effective analysis and review center (the ARC) in Pittsburgh, PA. The ARC’s dedicated vendor management outsourcing service team is overseen by an experienced vendor risk specialist and includes former senior managers in risk management, insider threat specialists, and data security officers from various industries, including financial services, banking, and healthcare. Over 750 clients and 2,000 vendors have chosen ACA to manage their vendor management process and mitigate third party risks.
Our tailored, proprietary vendor due diligence questionnaires (DDQ) include over 300 questions and are customized for each vendor type to provide an accurate assessment of possible risks. Topics include:
Financial firms must meet various regulatory filing requirements throughout the year. These are the regulatory filing submission deadlines occurring from April through June 2025.
Why a mock exam is a game-changer
A threat actor is selling authentication records exfiltrated from Oracle Cloud, suggesting a breach of Oracle Cloud’s Single Sign On and Lightweight Directory Access Protocol systems.
The risk of data loss, privilege escalation, and ransomware attacks makes immediate remediation essential.
The FAQ clarifies how to show gross and net performance of extracted performance and performance characteristics.
Apache Tomcat powers countless web applications across industries, and is actively being exploited to take control of servers or steal sensitive data.
ACA Group Acquires Global Trading Analytics to Offer Clients Leading Transaction Cost Analysis Capabilities
Five ACA Group Leaders Recognized Among the 2&20 Top 100 Most Influential People in the Service Provision for Alternative Investment Firms
ACA Group Recognized as RegTech100 Company for Fifth Consecutive Year
Join us in sunny Orlando, Florida for ACA's 2025 Conference, "Preparing Today, Protecting Tomorrow," where industry leaders and experts will converge to explore the evolving landscape of financial services.