ACA has gathered all the common best practices of performance teams complying to the GIPS standards and will discuss the most common question we receive from clients, "What do other firms do?"
Penetration testing and vulnerability assessments play an important role in identifying network vulnerabilities that could be exploited by a hacker and lead to a breach. We can help your company reduce the chance of a breach.
We provide penetration testing and vulnerability assessment services that can help your company reduce the risk of the significant financial, operational, and reputational losses that can result from a breach. Upon completion of our assessment, we will provide a detailed report with key findings, vulnerabilities, and remediation techniques to enhance your company’s security and regulatory posture.
We perform an automated scan of your environment that detects vulnerabilities that could potentially be used by an attacker to exploit your network.
We will use controlled real-world attack vectors to exploit the vulnerabilities found on your network and identify key weaknesses that could lead to a cyber-attack.
Our credentialed ethical hackers will identify vulnerabilities in your network and attempt to exploit them to see how far a potential attacker could go and what sensitive information could be compromised.
Additional testing services
This test assesses the strength of the physical security controls in your data center, offices, etc.
This test assesses whether your wireless local area network meets security and performance requirements
We use social manipulation techniques to identify the types of information that can be extracted by an attacker prior to an attack.
We validate conditional access policies and multi-factor protections in your Office 365 environment.
Michael Borts has joined the firm as Chief Technology Officer (CTO) to lead ACA’s technology development, vision, and strategy. In his role, he will oversee all product development for ACA’s award-winning ComplianceAlpha® regulatory technology platform and technology enablement at the firm.
The acquisition of Catelas further enhances the holistic surveillance capabilities of ACA’s RegTech platform. Catelas’ patented technology automates the mapping of how people connect and form groups within a firm, isolates collusion risk, and detects high-risk behaviors.
ACA Group (ACA), a leading provider of governance, risk, and compliance (GRC) advisory services and technology solutions, today announced that it has entered into a strategic partnership with the Investment Adviser Association (IAA), a leading organization dedicated to advancing the interests of investment advisers.
The role of the Compliance Officer is a mandatory position in all firms in the Financial Services Industry. They play a major role in assisting Senior Management to ensure that appropriate and effective systems and controls are in place to achieve and maintain compliance with the applicable Rules. While the nature of the Compliance Function is likely to differ from one firm to another, this course provides an easy to follow breakdown of what the Regulator expects of a Compliance Officer and explains, in practical terms how the regulatory expectations and those of Senior Management can be achieved.
Join ACA Aponix for a review of the top 5 concerns identified by our clients and the actions they plan to take to increase their first line of defense against bad actors.