city blocks birds eye view night

Insights

Our unique perspective is informed by our real-world experience, deep subject matter expertise, and extensive client network.

GRC hot topics

Brexit insights and alerts

Regulatory compliance insights and alerts

Cybersecurity alerts and insights

ESG

ESG alerts and insights

GIPS® standards and performance alerts and insights

Regulatory technology insights and alerts

Our thoughts on the RiskMutation™ phenomenon affecting the future of risk and compliance

Insights and alerts related to the SEC's new Marketing Rule

Insights and recommendations for maintaining compliance and operational resilience during the pandemic

1 of

Michael Borts joins ACA Group as the new Chief Technology Officer

Michael Borts has joined the firm as Chief Technology Officer (CTO) to lead ACA’s technology development, vision, and strategy. In his role, he will oversee all product development for ACA’s award-winning ComplianceAlpha® regulatory technology platform and technology enablement at the firm.

Press Release
  • Regulatory Technology
  • ACA News
abstract black and white looking up at bridge rails

Q4 2021 Regulatory Reporting Deadlines

Regulatory filing submission deadlines for the SEC, CFTC/NFA, and FCA/ESMA occurring from October through December 2021.

Article
  • Compliance
  • Regulatory Deadlines
  • Regulatory Technology
wind turbines and solar panels at sunset

UNPRI’s Next Reporting Period Delayed Until Early 2023

The United Nations-supported Principles for Responsible Investment (PRI) recently announced a delay in the next PRI reporting period, along with the release of 2021 scores and public transparency reports. We outline what this means for firms.

Compliance Alert
  • ESG
  • Compliance
Architectural image - office windows

European Regulator Fines Major Trade Repository for EMIR Breaches

The EU’s securities markets regulator, European Securities and Markets Authority (ESMA), recently fined a major trade repository for eight breaches of the European Market Infrastructure Regulation (EMIR). We examine why it’s vital that firms review the quality of their reporting, including where it is being delegated, to be sure it meets regulatory expectations.

Compliance Alert
  • Compliance
  • Trade & Transaction
  • Regulatory Technology
Being smart about your smart phone

Being Smart About Your Smartphone

The more information you allow your smartphone apps to share, the easier it will be for hackers to steal this information and use it for malicious purposes. This post discusses best practices for securing your mobile device and the apps you install.

Article
  • Cybersecurity
  • Cybersecurity Resources
abstract blue shapes connected by dots of light

October is Cybersecurity Awareness Month

During the month of October, businesses across the globe will focus on educating their employees on how to stay diligent and safe online. As we prepare for Cybersecurity Awareness Month, we’d like to share some resources you can use to help promote privacy and online safety at your firm.

Article
  • Cybersecurity
  • Cybersecurity Resources
ACA's Password Best Practices

Password Reset Best Practices

From work-related accounts to online banking or shopping to gym memberships, passwords have long been our golden ticket to accessing the online world and keeping our accounts safe. With so many accounts and passwords, it is no surprise that account users often dread when their passwords expire, forcing them to add to their ever-expanding alphabet soup of passwords. 

Article
  • Cybersecurity Resources
  • Cybersecurity
ACA's Password Best Practices

Password Strength Best Practices

Passwords are the most common method of authentication, but remembering a unique password for each account you have can be a pain. Here are ACA Aponix's best practices for creating and managing passwords to help protect your accounts from a cyber-attack.

Article
  • Cybersecurity
  • Cybersecurity Resources
Protect Your Data at Home

Protecting Your Home's Smart Devices

Our homes are becoming increasingly connected to the outside world through "smart" devices, which work together over your Wi-Fi network to make your home more comfortable, safe, and convenient. Common smart devices include thermostats, televisions, light bulbs, and surveillance systems.

Article
  • Cybersecurity
  • Cybersecurity Resources
Protect Your Online Identity

Protecting Your Online Identity

As cyber security attacks continue to increase in frequency and complexity alongside evolving technologies, the COVID-19 pandemic, and remote work and school, it is essential to prioritize protecting your identity online. Here are some ways you can control the amount of personal information that is available online.

Article
  • Cybersecurity
  • Cybersecurity Resources