Insight Search

Sort by:
  • Podcast

    December 7, 2021
    Cybersecurity continues to be a critical area of concern for organisations and virtually any leader you ask – board members, CIOs, CFOs, and many more. But as elevated as those risks are today, the real threat may be just around the corner, particularly concerning cryptocurrency. Crypto has been viewed as highly secure, but the rapid emergence of quantum computing, which is set to deliver…
  • Podcast

    March 24, 2021
    Protiviti has produced a series of podcasts on GRC programmes and technologies in which we obtained perspectives from Protiviti leaders and subject-matter experts around the world on GRC drivers, innovations and challenges in their markets. In this episode, we talked with Ivan Torres, a Director with Protiviti’s Technology Consulting group. Ivan, who is based in Mexico City, offers his views on…
  • Podcast

    March 24, 2021
    Protiviti has produced a series of podcasts on GRC programmes and technologies in which we obtained perspectives from Protiviti leaders and subject-matter experts around the world on GRC drivers, innovations and challenges in their markets. In this episode, we talked with Ivan Torres, a Director with Protiviti’s Technology Consulting group. Ivan, who is based in Mexico City, offers his views on…
  • Podcast

    March 2, 2021
    Welcome to episode one of our Risky Women Transformation series where Lucy Pearman talks change, innovation and what’s next in the world of governance, risk, and compliance. Listen to the episode on the Risky Women website here. Want To Learn More? Risky Women website Risk Transformation services
  • Whitepaper

    September 22, 2021
    Covid-19, the economy, racial equity and climate. These are what the Biden-Harris transition team initially identified as the priorities of its administration. Since President Biden took office, other pressing issues such as immigration, cyber defense, and the U.S.’s exit from Afghanistan have been added to the list. The financial services industry wasn’t expected to, and does not, make the list…
  • Survey

    January 7, 2022
    The quality and, in some cases, the existence of the CISO/CFO relationship varies by company. In organisations where the CISO role is positioned and promoted as a source of value, CISOs and CFOs tend to collaborate more often and more meaningfully than in companies that treat information security as a cost center (and typically struggle with cybersecurity as a result). Protiviti’s 2021 Global…
  • Whitepaper

    January 28, 2022
    As we consider the compliance challenges that will be top of mind for financial institution compliance officers in 2022, one thing is very clear: More and more often, they are being expected to play a significant role in managing risks that extend beyond what we have traditionally considered the purview of compliance. Coupling this reality with ongoing innovation, both in the industry and in…
  • Whitepaper

    June 10, 2022
    Big Tech’s “big” problem How big is Big Tech? There is little doubt that the big five technology companies (i.e., Apple, Microsoft, Google, Amazon and Facebook) are operating in a completely different stratosphere. As one recent New York Times blog described it, “America’s tech titans have formed a separate universe in which they are the sun, and everyone else — billions of humans, other…
  • Whitepaper

    April 25, 2022
    In the novel Tell the Machine Goodnight, Katie Williams tells the story of Pearl, a technician for Apricity Corporation, which has developed a machine that “uses a sophisticated metric, taking into account factors of which we are not consciously aware,” and with 99.7% accuracy, offers recommendations for what will make people happy. Does this narrative provide a glimpse into our future? Will…
  • Flash Report

    June 3, 2022
    Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and…
Loading...