Insight Search

Sort by:
  • Blogs

    March 4, 2022
    In December 2021, in my role as president of the ISSA Delaware Valley Chapter, I had the honor of hosting a panel with five Chief Information Security Officers (CISOs), representing five different industries, each facing unique challenges presented by the global COVID-19 pandemic. The panelists included: Robert Younce – CISO of Mannington Mills, one of the world’s leading manufacturers of fine…
  • Blogs

    November 29, 2022
    In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s…
  • Blogs

    November 29, 2021
    In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s…
  • Blogs

    September 10, 2021
    Why Securing our Critical Infrastructure Matters Operational Technology (OT) remains a key, but vulnerable technology for organisations with critical infrastructure. The Australian Government has defined critical infrastructure as “those physical facilities, supply chains, information technologies and communication networks which, if destroyed, degraded or rendered unavailable for an extended…
  • Blogs

    September 9, 2021
    Over the July 4, 2021 weekend, the Russia-based REvil hacker group perpetrated a ransomware attack on Kaseya software. The software is used by managed service providers (MSPs) to operate their clients’ networks. This attack reportedly shut down 800-1,500 small-to-mid-size clients of around 50 Kaseya MSP customers. The attack illustrates the evolution of ransomware. Historically, hackers…
  • Blogs

    June 4, 2021
    Ensuring IT risks are managed, and compliance requirements are met has only intensified with the recent rapid growth in adoption of cloud services. Deployment of production workloads, migration of regulated systems and increasing storage of large volumes of data in the cloud has driven the need for security and controls to be deployed across customer cloud environments.
  • Blogs

    June 3, 2021
    In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s…
  • Whitepaper

    April 29, 2021
    MAKE PRIVACY A PRIORITY Protiviti Australia is proud to be recognising Privacy Awareness Week from 3 – 9 May, the Office of the Australian Information Commissioner’s annual event that highlights the importance of protecting personal information and helps organisations, agencies, and the public navigate the privacy landscape. You’ll find a selection of our privacy-related resources to help your…
  • Whitepaper

    April 26, 2022
    Privacy: The Foundation of Trust  Protiviti Australia is proud to be supporting Privacy Awareness Week from 2 – 8 May. The Office of the Australian Information Commissioner’s annual event highlights the importance of protecting personal information and helps organisations, agencies, and the public navigate the privacy landscape. Explore our privacy-related resources to help your organisation…
  • Blogs

    September 27, 2023
    By 2025, core banking workload deployment on cloud is expected to be 14% of total IT spend.Banks are grappling with outdated applications; data is siloed and trapped within legacy systems and not accessible for customer insights and tailored experiences and services.Regulatory changes in Australia, the UK and U.S., in GDPR and APRA standards for data privacy and operational resiliency, are also…
Loading...