Did you miss our vendor risk management webcast? ACA Aponix's Marc Lotti shares tips from the session for a team approach to vendor risk management.
This case study explains how a private equity firm utilized ACA's M&A diligence and advisory services to determine the security of their target's integrated platform and necessary investment in technology, processes, and personnel to support their investment thesis.
The adoption of RegTech is rapidly becoming business as usual for an increasing number of compliance teams, with personal trading/code of ethics compliance being one of the most significant areas of RegTech adoption. ACA's Jordan Schwartz details the major benefits of adopting a code of ethics/personal trading technology solution.
ACA Compliance Group's 2018 Fall Compliance Conference was held from October 3rd through 5th at the Hyatt Regency Resort Resort at Gainey Ranch in Scottsdale, Arizona.
As year-end nears, compliance teams are beginning to plan for 2019. To assist with the annual budgeting process, ACA has compiled the following information to help firms stretch limited resources and keep pace with the regulatory developments shaping next year’s compliance efforts.
The recent increase in high-profile cyber incidents, such as the September 2018 Facebook breach, have put millions of people around the world at risk for identity theft and other cyber-crimes. This blog post contains tips and information you can share with your family and friends about staying safe online.
The UK’s Chancellor of the Exchequer has delivered his 2018 Budget. This was supposed to be his final Budget before the United Kingdom leaves the European Union on 29 March 2019. That said, depending on whether a “No Deal” Brexit prevails, he has signalled that he might well squeeze another one in.
The US Office of the Comptroller of the Currency (OCC) has indicated that it will be focusing on the effectiveness of anti-money laundering (AML) systems and controls after including the topic on its list of FY 2019 annual priorities. For OCC-regulated banks, this means exams will concentrate on how up-to-date AML and Bank Secrecy Act (BSA) programs are with evolving threats and new rules.
The popularity and worldwide adoption of the the Global Investment Performance Standards (GIPS®) by investment management firms is largely due to demand by asset owners.
In early 2017, the SEC approved rule-change proposals establishing continued listing standards for passively and actively managed exchange-traded products. More specifically, the rules require ETP issuers and managers to adopt new monitoring and oversight protocols to ensure continued compliance with the applicable listing standards. In the event an ETP falls out of compliance with the standards, the Manager must promptly notify the appropriate Exchange.
Our homes are becoming increasingly connected to the outside world through "smart" devices, which work together over your Wi-Fi network to make your home more comfortable, safe, and convenient. With all of this convenience comes a great deal of risk. Here are tips for securing your smart devices.
The more information you allow your smartphone apps to share, the easier it will be for hackers to steal this information and use it for malicious purposes. This post discusses best practices for securing your mobile device and the apps you install.
The release of the Exposure Draft of the 2020 Global Investment Performance Standards (GIPS®) in August has forced many firms to assess how the new requirements will impact their business.
Chief compliance officers (CCOs) and risk and compliance teams know they need regulatory technology to meet ever-increasing regulatory obligations as well as establish best practices for their firm’s governance, risk, and compliance (GRC) program that reduce operational risk and increase operational efficiencies. While the value added by a RegTech solution is clear, understanding the full scope of a GRC technology implementation can be a significant challenge. This blog post explains the four steps you can take to enhance the effectiveness of your firm’s GRC capabilities using technology.