Vendor Diligence and Management

Third-party risk management (TPRM) and vendor due diligence

Third-party risk management (TPRM) is the process of monitoring, validating, and remediating risks presented by third-party vendors. TPRM helps ensure your vendors protect your data, comply with regulations, and provide sustainable services that meet your requirements. However, vendor risk management can be a costly and time-consuming task. Our vendor management outsourcing service (VMOS) allows your company to offload the vendor due diligence and risk assessment process. Unlike other vendor risk management solutions and vendor management software providers, ACA's VMOS will help your company save valuable time and resources in order to focus on more strategic tasks.

CONNECT WITH US


CONNECT WITH US


Our solutions

Vendor Due Diligence

Our team administers due diligence questionnaires (DDQs), ensures vendors reply in a timely manner, and provides vendor support.

 

Analysis

Our team analyzes DDQ responses, evidence, and audits to identify vendor risks.

 

Reporting

You can track vendor diligence progress and view findings in our vendor risk management software platform.

Additional Advisory Services
  • On-site validation
  • On-site vendor due diligence
  • TPRM program development
  • Vendor risk ranking

 

GDPR Vendor Diligence

We can help determine if your vendors are compliant with GDPR requirements, working towards compliance, or have not considered the implications of GDPR. Our vendor management outsourcing service platform includes a GDPR-specific due diligence questionnaire that can be administered as a standalone questionnaire at a reduced rate, or as part of the standard ACA Aponix vendor DDQ.

1 of
Solution Spotlight

Our Vendor Management Software

Our vendor management software allows you to track DDQ progress and vendor risk assessment results. Key features include:

  • Vendor Risk Dashboard — View key metrics (e.g., vendors diligenced, progress of diligence reviews, and vendor comments)
  • Vendor Registry — View vendor data in centralized location (e.g., product lines, type of diligence performed, and contracts)
  • Vendor Risk Matrix — View all risks identified (e.g., ratings, issues), vendor communication, and mitigation/remediation activities
  • Questionnaire Status — Track the completion status of vendor DDQs and on-site reports

Why work with us?

Dedicated Team Of InfoSec Risk Analysts

Our vendor risk assessments are developed and managed by a team of information security risk analysts in ACA’s centralized, cost-effective analysis and review center (the ARC) in Pittsburgh, PA. The ARC’s dedicated vendor management outsourcing service team is overseen by an experienced vendor risk specialist and includes former senior managers in risk management, insider threat specialists, and data security officers from various industries, including financial services, banking, and healthcare. Over 750 clients and 2,000 vendors have chosen ACA to manage their vendor management process and mitigate third party risks.  
 

Our Vendor Risk Assessments

Our tailored, proprietary vendor due diligence questionnaires (DDQ) include over 300 questions and are customized for each vendor type to provide an accurate assessment of possible risks. Topics include:

  • General Data Protection Regulation (GDPR) compliance
  • Cyber awareness training
  • Governance
  • Physical and environmental security
  • Network security, infrastructure, and operations
  • Organizational overview and structure
  • Financials
  • Legal and compliance
  • Vendor management and oversight
  • Change management
  • Cloud services
  • Access controls
  • Mobile device management
  • Resiliency
  • Asset management
  • Data loss prevention

Why ACA?

Clients

750+

Vendors diligenced

2,500+

Latest Insights

highway at night from overhead

November 2017 Performance Update: Increasing Demand for Performance Reporting Transparency

For roughly 25 years, institutional investors have increasingly required asset managers with whom they invest to claim compliance with the GIPS standards. This requirement is largely required of traditional fixed income and equity strategies and applied to asset managers that work predominantly with institutional investors. Early on, most private wealth managers were exempt from the requirement, and thus their rates of compliance paled in comparison to those of traditional institutional managers.

Article
  • Performance
highway at night from overhead

Electronic Communications Monitoring – A No-Brainer for CCOs

In the five months since the SEC’s Office of Compliance Inspections and Examination (“OCIE”) issued request letters to registrants focused on advisers’ use of electronic communications, co

Article
  • Compliance
highway at night from overhead

Technology Enhancements for Beneficial Ownership Implementation

In May 2016, the Financial Crimes Enforcement Network (“FinCEN”) issued its final rule on beneficial ownership with respect to customer due diligence ("CDD") requirements.

Article
  • AML and Financial Crime
abstract image with a lock and shield

7 Cybersecurity Trends to Plan for in 2018

In the past year, it’s become apparent that cyber breaches are on the rise, and they are crippling businesses in their wake.

Cyber Alert
  • Cybersecurity
abstract image with a lock and shield

5 Best Practices for Building an Effective Vulnerability Management Program

This is the first post in a series of cybersecurity tips and tricks from ACA Aponix's team of experienced consultants.

Cyber Alert
  • Cybersecurity
tprm vmos

Don’t Let Third Parties Be Your Downfall — How to Ensure Your Vendors are Protecting Your Assets

In the wake of the recent Equifax breach that potentially affected the personal data of more than 143 million Americans, Equifax is pointing the finger at one of its third-party vendors as the cause.

Cyber Alert
  • Cybersecurity

News

ACA Group Broadens Global Footprint Through Acquisition of the Effecta Compliance Group

Acquisition strengthens ACA’s ability to support clients expanding into the UAE and broadens offering to UK firms .

No Conversation Left Behind: ACA's Advanced Communication Channel Capture for Total Oversight

ACA Expands Communication Channel Capture to Strengthen Compliance Oversight

ACA Aponix Celebrates 10-Year Anniversary and National Cybersecurity Month

ACA Aponix Celebrates 10-Year Anniversary and National Cybersecurity Month. Reflecting on a decade of cybersecurity leadership, technological advancement, and industry recognition for financial services

Upcoming events

Lessons Learned from 2024's Scariest Cyber Breaches

Join ACA Aponix’s cybersecurity experts Greg Slayton and Aaron Pinnick for our annual discussion of some of the most interesting and impactful cybersecurity breaches and incidents that occurred in 2024.

Webcast

Beyond the CCO: Firmwide Benefits of Outsourcing GRC

We'll explain how the decision to outsource GRC services is no longer just a win for the Chief Compliance Officer – it offers a solution that can deliver substantial value across the entire C-suite and enterprise.

Webcast