ACA Aponix

Cybersecurity, technology risk assessment, and privacy services

ACA Aponix® provides cybersecurity and technology risk programs, data privacy compliance services, vendor and M&A diligence services, portfolio company oversight, network testing, and advisory services for companies of all sizes.

Our expertise

1 of
abstract black and white looking up at bridge rails

Strengthen your cyber program with Aponix Protect™

Aponix Protect helps firms address evolving cyber risks and threats to ensure that their cybersecurity needs are covered year-round. This solution is available in three tiers, each one designed to provide firms with a flexible, robust, responsive, and cost-effective cybersecurity program.​

black and white looking up at side of building

Increase oversight of your portfolio companies' cyber risk with PortCo Defend™

Our PortCo Protect program is designed to provide high-level insight into cybersecurity risks across a portfolio and measure the maturity of the cybersecurity approach at each investment entity. The program establishes minimum security requirements, a measurement framework and governance, and provide guidance/ assistance where needed. It is not intended to cause rework or significantly change the direction of a portfolio companies current security initiatives.​

abstract black and white architectural lines and shadows

Minimize risk and maximize enterprise value with technology, cyber, and privacy M&A diligence

Our team assists private equity firms with IT, cybersecurity, and privacy transaction advisory and risk management services. We provide full M&A integration analysis, design, oversight and execution services to help you minimize risk and maximize enterprise value for your most complex transactions by closely aligning our services with your investment thesis.​

Why work with us?

We provide cybersecurity and technology risk programs, data privacy compliance, vendor and M&A diligence services, network testing, and advisory services for companies of all sizes. Our unique approach combines a deep understanding of your workflows with our methodologies, thought leadership, and proprietary data to surface and prioritize the most important risks. Our award-winning solutions are designed to help firms uncover risks and identify deficiencies in their cybersecurity policies, procedures, and controls.

Why work with us?

Deep information technology experience. Award-winning solutions. Holistic approach to technology risk.

  • Experienced global team
  • Certified team members
  • Thought leaders in cybersecurity and IT risk
  • Over 650 companies work with us
  • Award-winning technology and solutions
  • Holistic approach to cybersecurity and IT risk

ACA Aponix provides cybersecurity and technology risk assessments, data privacy compliance, vendor and M&A diligence services, network testing, and advisory services for companies of all sizes. Our unique approach combines a deep understanding of your workflows with our methodologies, thought leadership, and proprietary data to surface and prioritize the most important risks. Our award-winning solutions are designed to help firms uncover risks and identify deficiencies in their cybersecurity policies, procedures, and controls.

Who we are

  • Our team consists of senior technologists who have started in the technology trenches, many growing into technology leaders at organizations ranging from small to large hedge funds, bulge-bracket banks, and technology services providers for the financial services sector.
  • ACA Aponix staff maintain or have held the following relevant certifications around cybersecurity risk management, incident response, penetration testing, information security, IT governance, privacy, and business. Additionally, select ACA Aponix staff maintain U.S. military security clearance.

Our certifications

Cybersecurity

  • CISSP, CISM, CISA, ISO27001:2013, CGEIT, CRISC, CTPRP, Security+, OSCE, OSCP, CEH, GXPN, GPEN, GWAPT, GCFE, GCCC, GCIH, GCIA, ECSA, SSA, CREST CPSA

Privacy

  • CIPM, CIPP, CIPT

IT & Business Continuity

  • A+, CCA, CNE, CCNA, CCNP, CSPO, ISO22301:2013, MCSA, MCSE, MSCP, Network+

Business

  • CFA, CM&AA, GSLC, JD, MBA, PhD, PMP, Six Sigma Black Belt

Our leadership team

Kavitha Vankita

Kavitha Venkita

Partner, Head of Cybersecurity and Risk

Kavitha is a Partner and the Business Lead for ACA Aponix, the dedicated global cybersecurity and technology risk advisory team.

Chad Neale, ISO27001:2013, GSLC, GCFE, CISA

Chad Neale

Partner

Chad is a Partner at ACA Aponix, the cybersecurity, privacy, and IT risk division of ACA Group and oversees ACA Aponix’s Strategic Technology Advisory and Risk practice.

Mike Pappacena

Mike Pappacena

Partner

Mike is a Partner at ACA Aponix, the cybersecurity, privacy, and IT risk division of ACA Group.

James Tedman

James Tedman

Partner

James is a Partner at ACA Aponix, the cybersecurity, privacy, and IT risk division of ACA Group. James manages ACA Aponix in Europe.

Marc Lotti, CGEIT, PMP

Marc Lotti

Strategic Advisor

Marc is a Strategic Advisor at ACA, and a Co-founder and formerly a Co-head Partner at ACA Aponix.

Kris Lau, CISM

Kris Lau

Managing Director

Kris is a Managing Director at ACA Aponix, specializing in information security program and policy development, risk management, vulnerability assessments, third-party security assessments, and audits.

Henry Lindemann

Henry Lindemann

Managing Director

Henry is a Managing Director at ACA Aponix, the cybersecurity, privacy, and IT risk division of ACA Group and oversees the sales department for the division.

Alex Scheinman, Ph.D.

Alex Scheinman

Managing Director

Alex is a Managing Director at ACA Aponix, overseeing ACA Aponix’s GDPR, CCPA, and other privacy regulation data-processing reviews and related programming.

Sara Laverick

Sara Laverick

Director

Sara oversees ACA Aponix's vendor diligence and management service (VMOS) team.

Jose Ramos

Jose Ramos

Director

Jose is a Director at ACA Aponix leading the penetration team.

Christine Tetherly-Lewis

Christine Tetherly-Lewis

Director

Christine is a Director at ACA Aponix.

1 of

Latest cyber and risk insights

Being smart about your smart phone

Being Smart About Your Smartphone

The more information you allow your smartphone apps to share, the easier it will be for hackers to steal this information and use it for malicious purposes. This post discusses best practices for securing your mobile device and the apps you install.

Article
  • Cybersecurity
  • Cybersecurity Resources
abstract blue shapes connected by dots of light

October is Cybersecurity Awareness Month

During the month of October, businesses across the globe will focus on educating their employees on how to stay diligent and safe online. As we prepare for Cybersecurity Awareness Month, we’d like to share some resources you can use to help promote privacy and online safety at your firm.

Article
  • Cybersecurity
  • Cybersecurity Resources
ACA's Password Best Practices

Password Reset Best Practices

From work-related accounts to online banking or shopping to gym memberships, passwords have long been our golden ticket to accessing the online world and keeping our accounts safe. With so many accounts and passwords, it is no surprise that account users often dread when their passwords expire, forcing them to add to their ever-expanding alphabet soup of passwords. 

Article
  • Cybersecurity Resources
  • Cybersecurity
ACA's Password Best Practices

Password Strength Best Practices

Passwords are the most common method of authentication, but remembering a unique password for each account you have can be a pain. Here are ACA Aponix's best practices for creating and managing passwords to help protect your accounts from a cyber-attack.

Article
  • Cybersecurity
  • Cybersecurity Resources
Protect Your Data at Home

Protecting Your Home's Smart Devices

Our homes are becoming increasingly connected to the outside world through "smart" devices, which work together over your Wi-Fi network to make your home more comfortable, safe, and convenient. Common smart devices include thermostats, televisions, light bulbs, and surveillance systems.

Article
  • Cybersecurity
  • Cybersecurity Resources
Protect Your Online Identity

Protecting Your Online Identity

As cyber security attacks continue to increase in frequency and complexity alongside evolving technologies, the COVID-19 pandemic, and remote work and school, it is essential to prioritize protecting your identity online. Here are some ways you can control the amount of personal information that is available online.

Article
  • Cybersecurity
  • Cybersecurity Resources

News

ACA Group Named Best Regulatory Consultancy - North America by RegTech Insight

ACA is honored to be voted Best Regulatory Consultancy - North America in the RegTech Insight Awards 2021 USA.

ACA Group and Foreside to Join Forces

The merger will bring together two of the industry’s most well-respected GRC solutions providers. ACA and Foreside together will be positioned to transform the future of GRC, creating a world-class platform for the financial services industry.

Michael Borts joins ACA Group as the new Chief Technology Officer

Michael Borts has joined the firm as Chief Technology Officer (CTO) to lead ACA’s technology development, vision, and strategy. In his role, he will oversee all product development for ACA’s award-winning ComplianceAlpha® regulatory technology platform and technology enablement at the firm.

Upcoming events

Compliance Officer: The Roles and Responsibilities - 7 December 2021

The role of the Compliance Officer is a mandatory position in all firms in the Financial Services Industry. They play a major role in assisting Senior Management to ensure that appropriate and effective systems and controls are in place to achieve and maintain compliance with the applicable Rules. While the nature of the Compliance Function is likely to differ from one firm to another, this course provides an easy to follow breakdown of what the Regulator expects of a Compliance Officer and explains, in practical terms how the regulatory expectations and those of Senior Management can be achieved.

Online Training

eComms Surveillance Solution Demo

Join ACA's Eddie Cogan as he conducts a deep dive demo of our machine learning based eComms Surveillance Technology solution (formerly Catelas).

Webcast