Insight Search

Sort by:
  • Podcast Transcript

    March 28, 2023
    Over the past year, as one crypto organisation after another has been beset by fraud or declared bankruptcy, countless headlines have surfaced warning of the death of the crypto industry. Yet the damage has been largely contained. The developments have raised many questions about digital assets, cryptocurrency and blockchain technology as well as regulation and other factors that may help the…
  • Blogs

    April 13, 2021
    Cybersecurity, Privacy, Data and Resilience Dominate the Top Technology Challenges for Energy and Utilities Organisations.
  • Survey

    January 7, 2022
    The quality and, in some cases, the existence of the CISO/CFO relationship varies by company. In organisations where the CISO role is positioned and promoted as a source of value, CISOs and CFOs tend to collaborate more often and more meaningfully than in companies that treat information security as a cost center (and typically struggle with cybersecurity as a result). Protiviti’s 2021 Global…
  • Infographic

    September 14, 2021
    Privacy, cyber breach, user access and data governance dominate the top technology challenges for consumer packaged goods (CPG) and retail organisations, according to the annual ISACA/Protiviti Global Survey of IT audit leaders and professionals. The respondents’ ranking of the top technology risks reflect the concerns of an industry that has experienced a massive shift to e-commerce and…
  • Infographic

    September 1, 2021
    Cybersecurity, privacy, data and resilience dominate the top technology challenges for technology, media and telecommunications (TMT) organisations, according to the annual ISACA/Protiviti Global Survey of IT audit leaders and professionals. These issues, which already were top-of-mind risks for most organisations, have been fueled further by pandemic-driven times of remote work and new business…
  • Whitepaper

    September 3, 2021
    Assessing the results of Protiviti’s 2021 SOX Compliance Survey within the energy and utilities industries It’s been more than a year since a historic global pandemic changed the way companies operate in the near-term and very likely for the long-term future. We can see the impact on numerous fronts — including the costs for Sarbanes-Oxley compliance activities. And for certain companies, the…
  • Whitepaper

    September 29, 2021
    Key Findings From the Latest Survey Conducted by Protiviti and AHIA on Healthcare Provider Organisation Internal Audit Plan Priorities Even before the COVID-19 public health emergency, healthcare organisations were challenged in their mission to deliver high-quality patient care due to provider and staff shortages. Many healthcare organisations have been forced to make severe and often morale-…
  • Whitepaper

    February 22, 2021
    As CEOs and boards become more informed about the extreme threats that cybersecurity lapses pose, their expectations are growing. CFOs’ expanding contributions to fortifying organisational data security, the highest priority identified in Protiviti’s latest Global Finance Trends Survey, play a pivotal role in satisfying those high expectations. Board members demand coherent, relevant and timely…
  • Flash Report

    November 9, 2021
    On November 4, 2021, the U.S. Department of Defense (DoD or Department) published a proposed update to its Cybersecurity Maturity Model Certification (CMMC) and defined a path forward that has Defense Industrial Base (DIB) contractors eager to understand impacts to their business and anticipated next steps in the evolution of the CMMC programme. In addition to simplifying and consolidating the…
  • Podcast

    July 18, 2022
    In coding, libraries make developers’ lives easier, sparing them thousands of lines of code, while also increasing performance and security. And everyone’s concerned with security as fault-tolerant quantum computing approaches. Geometry Labs has released the “lattice-algebra” library to bring a high-performance cryptographic library to developers interested in using post-quantum cryptography in…
Loading...