GRC webcasts
#00669a

Governance, Risk, and Compliance (GRC) Webcasts

Contact Us

ACA hosts a variety of free and paid webcasts each year. These webcasts cover a range of topics including regulatory compliance, performance, cyber security, financial crime, and financial technology. Most webcasts hosted by ACA are available on demand for three years after the presentation date.

For more information, contact us at webcastinfo@acacompliancegroup.com.

ACA WEBCAST DIRECTORY

 

Webcast
September 12, 2018

Addressing Common Cybersecurity Gaps for Investment Management Firms

Cybersecurity threats continue to evolve as do the vulnerabilities hackers look to exploit for financial gain. Join Eze Castle Integration and ACA Aponix on Wednesday, September 12th as our expert speakers highlight common security shortfalls and shed light on how managers can take steps to mitigate and remediate these critical concerns moving forward.Some common cybersecurity gaps we’ll discuss include:
On Demand
Webcast
September 6, 2018

The Value of GIPS Compliance: 2018 Manager and Consultant Survey Results

Join us for our exclusive webcast The Value of GIPS® Compliance: 2018 Manager and Consultant Survey Results. ACA Performance Services' Justin Guthrie and eVestment's John Molesphini will discuss current trends and the effects of the GIPS standards on the investment management industry. This webcast will include:
On Demand
Webcast
August 29, 2018

Looking Forward: Emerging Compliance and Operational Issues in the Private Equity and Real Estate Industry

Tune in on Wednesday, August 29th at 11 a.m. ET for our webcast, Looking Forward: Emerging Compliance and Operational Issues in the Private Equity and Real Estate Industry.
On Demand
Webcast
August 28, 2018

A Banks Compass on the Road to GIPS Compliance

Join us for our webcast A Bank's Compass on the Road to GIPS® Compliance. You'll hear from ACA Performance Services’ Travis Morgan, Matthew Cardin and First Rate’s Craig Apfel as they discuss the specific challenges that banks and trusts face when coming into compliance with the GIPS standards.
On Demand
Webcast
August 14, 2018

Implementing Controls Around Insider Trading

Tune in on Tuesday, August 14th at 11 a.m. ET for our webcast Implementing Controls around Insider Trading Webcast. You'll hear from ACA Compliance Group's Joel Stocksdale and Erika Chua as they discuss various controls investment advisers can implement to address the unique risks of insider trading faced by their firms.During this webcast, panelists will discuss:
On Demand
Webcast
August 9, 2018

Data Governance and Reporting for Real Estate Advisers

Real estate managers acquire performance data from a multitude of sources before reporting to their ownership or clients. This process is often completed manually using spreadsheets where potential for human error is high. What is the best way to marry both qualitative and quantitative information to ensure reporting is done right? 
On Demand
Webcast
August 2, 2018

Valuation of Illiquid Assets: A Closer Look

Tune in for our Valuation of Illiquid Assets: A Closer Look. You'll hear from ACA Compliance Group's Alyssa Briggs, Murray Devine's Stephen Davis, and NGP Energy Capital's Chase Paxton as they provide compliance officers with a background of the various methodologies used to value illiquid assets (DCF, comps, etc.) and the mechanisms for arriving at valuations, with a particular focus on inputs and assumptions.
On Demand
Webcast
July 31, 2018

Closed-End Funds 101

Closed-end funds may look similar to open-end funds but they're actually very different.  We invite you to join ACA Compliance Group’s Thomas Riley and James Pappas on Tuesday, July 31st, 2018 at 2 p.m. EDT as they discuss the closed-end fund investment vehicle with particular attention to how it differs from open end funds. 
On Demand
Webcast
July 26, 2018

Introduction to IT, Cybersecurity, and Privacy Risks for New Private Equity Associates

Cybersecurity threats are increasingly targeting employees at private equity firms in an effort to compromise sensitive data, disrupt operations, and/or trick staff into performing fraudulent transactions that can result in significant financial loss. As a result, it’s critical that employees understand their role in protecting sensitive data and how threat actors perpetrate attacks.
On Demand