Vendor Diligence and Management

Third-party risk management (TPRM) and vendor due diligence

Third-party risk management (TPRM) is the process of monitoring, validating, and remediating risks presented by third-party vendors. TPRM helps ensure your vendors protect your data, comply with regulations, and provide sustainable services that meet your requirements. However, vendor risk management can be a costly and time-consuming task. Our vendor management outsourcing service (VMOS) allows your company to offload the vendor due diligence and risk assessment process. Unlike other vendor risk management solutions and vendor management software providers, ACA's VMOS will help your company save valuable time and resources in order to focus on more strategic tasks.

CONNECT WITH US


CONNECT WITH US


Our solutions

Vendor Due Diligence

Our team administers due diligence questionnaires (DDQs), ensures vendors reply in a timely manner, and provides vendor support.

 

Analysis

Our team analyzes DDQ responses, evidence, and audits to identify vendor risks.

 

Reporting

You can track vendor diligence progress and view findings in our vendor risk management software platform.

Additional Advisory Services
  • On-site validation
  • On-site vendor due diligence
  • TPRM program development
  • Vendor risk ranking

 

GDPR Vendor Diligence

We can help determine if your vendors are compliant with GDPR requirements, working towards compliance, or have not considered the implications of GDPR. Our vendor management outsourcing service platform includes a GDPR-specific due diligence questionnaire that can be administered as a standalone questionnaire at a reduced rate, or as part of the standard ACA Aponix vendor DDQ.

1 of
Solution Spotlight

Our Vendor Management Software

Our vendor management software allows you to track DDQ progress and vendor risk assessment results. Key features include:

  • Vendor Risk Dashboard — View key metrics (e.g., vendors diligenced, progress of diligence reviews, and vendor comments)
  • Vendor Registry — View vendor data in centralized location (e.g., product lines, type of diligence performed, and contracts)
  • Vendor Risk Matrix — View all risks identified (e.g., ratings, issues), vendor communication, and mitigation/remediation activities
  • Questionnaire Status — Track the completion status of vendor DDQs and on-site reports

Why work with us?

Dedicated Team Of InfoSec Risk Analysts

Our vendor risk assessments are developed and managed by a team of information security risk analysts in ACA’s centralized, cost-effective analysis and review center (the ARC) in Pittsburgh, PA. The ARC’s dedicated vendor management outsourcing service team is overseen by an experienced vendor risk specialist and includes former senior managers in risk management, insider threat specialists, and data security officers from various industries, including financial services, banking, and healthcare. Over 750 clients and 2,000 vendors have chosen ACA to manage their vendor management process and mitigate third party risks.  
 

Our Vendor Risk Assessments

Our tailored, proprietary vendor due diligence questionnaires (DDQ) include over 300 questions and are customized for each vendor type to provide an accurate assessment of possible risks. Topics include:

  • General Data Protection Regulation (GDPR) compliance
  • Cyber awareness training
  • Governance
  • Physical and environmental security
  • Network security, infrastructure, and operations
  • Organizational overview and structure
  • Financials
  • Legal and compliance
  • Vendor management and oversight
  • Change management
  • Cloud services
  • Access controls
  • Mobile device management
  • Resiliency
  • Asset management
  • Data loss prevention

Why ACA?

Clients

750+

Vendors diligenced

2,500+

Latest Insights

curved glass building looking up at a blue sky

The UK National Security and Investment Act 2021 – sneaking into force early 2022

The UK National Security and Investment Act of 2021 (NSI) comes into force on 4 January 2022. It allows the UK Government to scrutinise and block any acquisition they feel may harm national security. Learn how this impacts your firms future acquisition plans:

Compliance Alert
  • Compliance
cyber week image

Log4Shell Vulnerability: What We Know and Action Steps to Take

Following our Cyber Alert last week, “Java Log4Shell Zero-Day Vulnerability Discovered; Immediate Patching Advised for Millions of Users", on December 10th a critical vulnerability was publicly disclosed in the Apache Log4j Java-based logging package, which is commonly used by organizations across the world.

Cyber Alert
  • Cybersecurity
  • Cybersecurity Resources
abstract blue shapes connected by dots of light

Flaws Discovered in Original Update to Fix Log4j Vulnerability; Users Must Update to Newest Version of Apache Log4j 2.16.0

On December 10th a critical vulnerability was publicly disclosed in the Apache Log4j Java-based logging package, which is commonly used by organizations across the world. When first disclosed late last week, Apache had already released an updated version of Log4j version 2.15.0 to remedy the security flaw.

Cyber Alert
  • Cybersecurity
  • Cybersecurity Resources
highway at night from overhead

Key Regulatory Timelines for 2022

To help firms prepare for the new year, we’ve created a simple visual timeline of key financial services regulatory milestones for you to download, keep, and reference throughout 2022.

Article
  • Compliance
  • ESG
  • Brexit
  • SEC
  • Managed Services
  • Trade & Transaction
Globe image

Best Practices for Managing the Latest Trends and Challenges Related to Market Abuse Surveillance

ACA Group’s Eddie Cogan, recently joined A-Team Insight’s Sarah Underwood for a fireside chat where they discussed the latest trends and challenges related to market surveillance, the best practices for addressing these challenges, where firms should start, and how technology can help.

Article
  • RegTech
  • eComms Surveillance
  • Trade Surveillance
abstract blue shapes connected by dots of light

Java Log4Shell Zero-Day Vulnerability Discovered; Immediate Patching Advised for Millions of Users

On December 10th a critical vulnerability was disclosed in the open-source Apache software used to run websites and other web services across industries. The vulnerability affects a Java logging package known as log4j, which is commonly used by organizations across the world.

Cyber Alert
  • Cybersecurity
  • Cybersecurity Resources

News

ACA Group Acquires Financial Compliance Firm, FINOP Consulting

Acquisition strengthens ACA’s outsourced financial operations offering for broker-dealers.

ACA Group Recognized on ESGFinTech100 Among Top Industry Innovators

We are thrilled to announce that ACA Group has earned a spot on the prestigious 2024 ESGFinTech100 list, joining the ranks of the world's most innovative ESG technology providers.

Financial Services Firms Lag in AI Governance and Compliance Readiness, Survey Reveals

The 2024 AI Benchmarking Survey by ACA Aponix and NSCP reveals that, despite enthusiasm for AI, financial firms lack formal AI governance frameworks, testing protocols, and third-party oversight.

Upcoming events