Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Flash Report May 14, 2021 President Biden executive order to strengthen U.S. Cybersecurity will impact federal agencies and public and private sector organisations On May 12, President Joe Biden issued the Executive Order on Improving the Nation’s Cybersecurity. This executive order (EO) is the most recent action by the administration to strengthen U.S. national cyber defenses and address cybersecurity threats and attacks that continue to grow in magnitude, impact and frequency. It is intended to protect networks in the federal, public and private sectors,… Blogs April 12, 2023 Australia’s Privacy Act is fundamentally changing: What this means for your organisation Background On 16 February 2023, the Attorney-General’s Department released its Privacy Act Review Report (the Report) following a two-year review of the Privacy Act 1988 (Cth) (the Act). The Report contains 116 recommended amendments to the existing Act to strengthen the protection of personal information and the control individuals have over their information. If accepted and adopted, the… Podcast March 23, 2022 Podcast | Quantum Machine Learning Using PennyLane with Xanadu Quantum machine learning, or QML, is one of the three major application categories for quantum computing, along with optimisation and simulation. As we’re working with customers at Protiviti to find advantageous use cases in QML, we rely daily on a tool called PennyLane from Xanadu. Join host Konstantinos Karagiannis, and special cohost Emily Stamm, for a chat with Nathan Killoran from Xanadu to… Whitepaper February 22, 2021 Four Ways Finance Leaders Strengthen Cybersecurity As CEOs and boards become more informed about the extreme threats that cybersecurity lapses pose, their expectations are growing. CFOs’ expanding contributions to fortifying organisational data security, the highest priority identified in Protiviti’s latest Global Finance Trends Survey, play a pivotal role in satisfying those high expectations. Board members demand coherent, relevant and timely… Flash Report November 9, 2021 U.S. Department of Defense Updates Cybersecurity Maturity Model Certification Requirements: CMMC 2.0 On November 4, 2021, the U.S. Department of Defense (DoD or Department) published a proposed update to its Cybersecurity Maturity Model Certification (CMMC) and defined a path forward that has Defense Industrial Base (DIB) contractors eager to understand impacts to their business and anticipated next steps in the evolution of the CMMC program. In addition to simplifying and consolidating the… Podcast June 15, 2022 Podcast | Coding High-Performance, Post-Quantum Secure Blockchain Systems with Geometry Labs and The QRL In coding, libraries make developers’ lives easier, sparing them thousands of lines of code, while also increasing performance and security. And everyone’s concerned with security as fault-tolerant quantum computing approaches. Geometry Labs has released the “lattice-algebra” library to bring a high-performance cryptographic library to developers interested in using post-quantum cryptography in… Whitepaper August 12, 2021 Building a Comprehensive Data Privacy Program: Four Actionable Steps for Technology Companies Introduction Most technology companies today understand that ensuring data privacy and protection is an imperative for their business; however, few manage this process well or even invest enough resources in that effort. As governments and consumers around the world continue to raise their expectations of how technology businesses should handle and process private and sensitive data, the need to… Podcast June 2, 2021 Podcast | Quantum Computing Use Cases with Super.tech The holy grail of quantum computing in the near term is a use case that provides advantage. We believe it’s only a matter of time, but major companies have to plan and prepare now so that they are not left behind when these applications arrive. Join host Konstantinos Karagiannis for a chat about quantum computing use cases with Pranav Gokhale from Super.tech. We cover mostly financial customer… Survey January 7, 2022 Three Conversation Starters That Advance CISO/CFO Collaboration The quality and, in some cases, the existence of the CISO/CFO relationship varies by company. In organisations where the CISO role is positioned and promoted as a source of value, CISOs and CFOs tend to collaborate more often and more meaningfully than in companies that treat information security as a cost center (and typically struggle with cybersecurity as a result). Protiviti’s 2021 Global… Whitepaper February 4, 2019 Oracle Security in the Cloud A Step-By-Step Approach to Building Strong Security Architecture During Oracle ERP Cloud Implementation and Redesign Projects Organisations are becoming more accepting of moving their key business applications to the cloud, including their enterprise resource planning (ERP) systems. For companies looking to move to Oracle ERP Cloud, the advantages are many — high scalability, consistent… Load More