SEC Examinations: What to Expect and How to Prepare
Hear from our experienced ACA Wealth experts who will discuss SEC examinations, including what to expect, what we’re seeing in the current landscape, and how to prepare.
Third-party risk management (TPRM) is the process of monitoring, validating, and remediating risks presented by third-party vendors. TPRM helps ensure your vendors protect your data, comply with regulations, and provide sustainable services that meet your requirements. However, vendor risk management can be a costly and time-consuming task. Our vendor management outsourcing service (VMOS) allows your company to offload the vendor due diligence and risk assessment process. Unlike other vendor risk management solutions and vendor management software providers, ACA's VMOS will help your company save valuable time and resources in order to focus on more strategic tasks.
Our vendor management software allows you to track DDQ progress and vendor risk assessment results. Key features include:
Our vendor risk assessments are developed and managed by a team of information security risk analysts in ACA’s centralized, cost-effective analysis and review center (the ARC) in Pittsburgh, PA. The ARC’s dedicated vendor management outsourcing service team is overseen by an experienced vendor risk specialist and includes former senior managers in risk management, insider threat specialists, and data security officers from various industries, including financial services, banking, and healthcare. Over 750 clients and 2,000 vendors have chosen ACA to manage their vendor management process and mitigate third party risks.
Our tailored, proprietary vendor due diligence questionnaires (DDQ) include over 300 questions and are customized for each vendor type to provide an accurate assessment of possible risks. Topics include:
The Three Lines of Defense Model has gained popularity as the de facto model for organizing governance, risk management and internal control roles and responsibilities since the Institute of Internal Auditors (IIA) published “The Three Lines of Defense in Effective Risk Management and Control,” position paper in 2013. The IIA recently announced that they would embark on a key project to refresh and update this document.
Benchmarking your firm’s cybersecurity program against those of your peers is a smart way to identify the compliance gaps your firm should address. Here are the results of the 2018 NSCP / ACA Aponix Cybersecurity Compliance Programs Survey.
ACA’s Spring 2019 Compliance and Performance Conference is headed to sunny Miami!
Firms that claim compliance with the GIPS standards are required to notify CFA Institute of their claim of compliance. Each GIPS-compliant firm must submit the GIPS Compliance Notification Form by June 30 of each year.
Julia Hoggett, FCA's Director of Market Oversight, speech on the implementation of the Market Abuse Regulation in the UK.
In 2018, ACA Compliance Group expanded their team to 270+ compliance professionals (and growing) with new employees who bring a wealth of industry experience, enthusiasm, and talent.
ACA Group is excited to announce that Michele Foldenauer has joined ACA Group as a Managing Director and a leader of our tech-enabled Mock Examination Team.
ACA Group acknowledged as one of the most innovative tech companies offering data management solutions in financial services
We are committed to meeting the needs of our clients. This year, we have made several notable additions to the team to help us to continue to operate at the forefront of the compliance industry. Learn more about our team.
Hear from our experienced ACA Wealth experts who will discuss SEC examinations, including what to expect, what we’re seeing in the current landscape, and how to prepare.