Insight Search

Sort by:
  • Whitepaper

    February 22, 2021
    As CEOs and boards become more informed about the extreme threats that cybersecurity lapses pose, their expectations are growing. CFOs’ expanding contributions to fortifying organisational data security, the highest priority identified in Protiviti’s latest Global Finance Trends Survey, play a pivotal role in satisfying those high expectations. Board members demand coherent, relevant and timely…
  • Flash Report

    March 9, 2023
    The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well as private businesses. The Biden-Harris Administration has been percolating a comprehensive cybersecurity strategy for some time and in early March released the aptly named “National Cybersecurity Strategy.” The 35-page document was created to help…
  • Flash Report

    November 9, 2021
    On November 4, 2021, the U.S. Department of Defense (DoD or Department) published a proposed update to its Cybersecurity Maturity Model Certification (CMMC) and defined a path forward that has Defense Industrial Base (DIB) contractors eager to understand impacts to their business and anticipated next steps in the evolution of the CMMC program. In addition to simplifying and consolidating the…
  • Flash Report

    June 3, 2022
    Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and…
  • Client Story

    June 16, 2023
    A leading biotechnology company that develops life-transforming medicines has worked for decades to improve the lives of those who rely on their work. But recently, they found themselves in need of assistance to enhance the security of their AWS environment.
  • Client Story

    June 16, 2023
    A blockchain/web3 startup engaged Protiviti to review their AWS environment. While getting the product to market as fast as possible was a primary goal for the client, security was an afterthought in many scenarios. To address this need and prevent a potential catastrophic security event, the client wanted a quick and consistent way to understand where their security gaps were and how they could…
  • Whitepaper

    July 22, 2022
    Issue Financial institutions have invested significant time, money and resources into developing and maintaining anti-money laundering (AML) compliance programs. One key enabler of an AML compliance program is the software used to review customers, analyse transactions to identify suspicious activities, and provide analytical and research capabilities to support the filing, or non-filing, of…
  • Survey

    March 29, 2023
    Technology leaders are exploring new ways to drive innovation and maximise the value of IT in a changing world driven by disruption and a need for acceleration Executive Summary Innovation is the name of the game in today’s global market. Recognising this new reality, CIOs, CTOs, CISOs and other technology executives and leaders are exploring new ways to fuel innovation throughout their…
  • Newsletter

    February 12, 2021
    Like any enterprisewide organisational change, implementing an operational resilience program across an organisation requires a careful and collaborative effort to be successful. Whether implementation has been in the works for several years or is just beginning, turning the resilience program from concept to reality is hard work. Except for the most dynamic and change-oriented organisations,…
  • Whitepaper

    June 29, 2020
    U.S. Edition | June 2020 Financial Crime Risks in the Current Climate The current economic and business climate is a new frontier for financial institutions seeking to navigate challenges posed by deteriorating market conditions, customer anxiety and the ever-watchful eyes of industry regulators. Concurrently, bad actors that pose an ongoing threat are also discovering new channels of…
Loading...