Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper October 22, 2020 How Firms Can Tackle Technology Risk Blind Spots to Build Resilience Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt… Newsletter July 4, 2022 Private Equity Insights: PE Challenges with ESG, Future of Work, and Cybersecurity As we head into the second half of 2022, it’s a volatile business climate in private equity. Inflation is on the rise, fueled by strong consumer demand. The labor market has stayed hot and unemployment levels low, with the gap between job openings and available candidates in the millions. PE deal activity and exits have slowed but they remain above longer-term trends. That said, public listings… Whitepaper August 1, 2022 Protecting the Enterprise: How a Well-Designed Security Analytics Programme Can Help The purpose of security analytics in an organisation Security metrics and the analysis of security information can be challenging concepts even for leading organisations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organisation’s security capabilities. If policies are the… Whitepaper March 22, 2019 Evaluation de la Sécurité des Données, des Applicatifs et des Infrastructures L’interface applicative n’est que la partie émergée de l’iceberg! Comprendre les défaillances des environnements applicatifs et des infrastructures doit être une priorité pour les intervenants opérationnels ainsi que pour le management. Les applications sont des interfaces d’accès et de traitements des données (métiers, personnelles, …) et ne sont que la partie visible d’un Système d’… Whitepaper March 22, 2019 Data, Application & Infrastructure Security Risk Assessment Let’s explore the Iceberg! Understanding gaps in how your applications and infrastructure protect your data is a priority for both Operations and Executives. Application interface is only the tip of the Iceberg Application are interfaces used to access and process data (business or personal) and are only the visible part of a more complex IT landscape. Client Story June 16, 2023 Leading CRM Provider Improves Configuration Checks on AWS Resources to Comply with HIPAA Framework A globally-recognized CRM provider engaged Protiviti to assist them in determining methods to better protect customer data while complying with each customer's unique regulatory requirements. The client needed an efficient method to perform configuration checks on AWS resources to ensure it would remain compliant with the HIPAA framework so that it could grow its footprint in the healthcare… Client Story June 16, 2023 Global Leader in Design Software Hardens Its Platform Infrastructure to Meet FedRamp Compliance Requirements This global leader in software for designers, builders, engineers and others has worked to provide a solid platform across a multitude of industries. However, recent changes in FedRamp compliance requirements drove them to develop a new instance of its product platform, hardening their infrastructure for customers in the public sector. Insights paper January 8, 2024 How data sovereignty and data localisation impact your privacy programmes The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad strokes of various privacy laws may be consistent across jurisdictions, governments will dictate the collection, storage and interpretation of their citizens’ data through constantly evolving privacy regulations.The legislative bodies that write… Podcast Transcript October 9, 2023 Transcript | Navigating a Technology Risk-Filled Horizon The results from this year's Global Technology Audit Risks Survey, conducted by Protiviti and The Institute of Internal Auditors, reveal a complex and multifaceted landscape of technology risks. Cybersecurity is the top priority and by a wide margin. AI is an emerging risk with gaps in organisational preparedness and audit proficiency. The talent gap in IT is a growing concern and data privacy is… Podcast October 9, 2023 Podcast | Navigating a Technology Risk-Filled Horizon The results from this year's Global Technology Audit Risks Survey, conducted by Protiviti and The Institute of Internal Auditors, reveal a complex and multifaceted landscape of technology risks. Cybersecurity is the top priority and by a wide margin. AI is an emerging risk with gaps in organisational preparedness and audit proficiency. The talent gap in IT is a growing concern and data privacy is… Load More