Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper February 10, 2021 MAS Technology Risk Management Update With the increase in cyber-attacks like the recent solar winds one and the very public issues with WireCard which left many firms in Singapore and beyond being unable to process transactions, the strengthening of the Monetary Authority of Singapore (MAS) Technology Risk Management Guidelines (TRM) was inevitable.The revised TRM set out technology risk management principles and best practices for… Blogs March 9, 2022 The Decade Ahead : Working in Internal Audit The internal audit function is the only function within any organisation which has the mandate to look across and examine all aspects of the businesses and its processes. It’s a very empowering position and it’s also very unique and compelling as a profession. An internal auditor can gain insights into an organisation with a holistic view. The internal audit process requires one to assess the… Whitepaper August 16, 2018 Automating the Financial Services Industry: Opportunities Abound, and APAC Firms Are Leading the Way Across major industries, robotic process automation, or RPA, is being used as part of an organisation’s digital transformation strategy to automate burdensome, high-volume and time-consuming business processes. Best suited for rule-based transactional and repetitive tasks involving structured and/or semi-structured data, logic-driven robots, or “bots,” are used to capture and interpret… Whitepaper March 19, 2021 Rethinking the Workplace Planning and Implementation of a New Approach to the Workplace Organisations have learned much about themselves, their workforce and their business during the COVID-19 Pandemic. For many, there was a forced shift to working from home. While those employees who cared for children or other relatives struggled to some extent, most employees shifted to working from home seamlessly. Nevertheless,… Whitepaper June 9, 2021 IIA’s 2021 International Conference Protiviti is proud to be a gold sponsor of the IIA’s International Conference, which will be held virtually this year. The IIA’s International Conference is the premier training and networking event for internal audit professionals worldwide. The theme for The IIA’s 2021 International Conference, Scaling New Heights, sets the stage to share new and forward-looking information and leading… Whitepaper July 14, 2022 Data Analytics: Strategies to Demonstrate Value and Achieve Transformation Recently, chief information officers, chief data officers and other leaders got together to discuss how data analytics programmes can help organisations achieve transformation, and how that contribution of value can be measured. We joined to share our insights at this CIO Online virtual roundtable event, which included leaders from organisations in healthcare, financial services, utilities,… Whitepaper September 7, 2021 China's Evolving Cybersecurity Law China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for… Whitepaper August 26, 2020 China's Cybersecurity Law: Multi-Level Protection Scheme (MLPS) In part one of our Point of View (POV) series Interpretations of the updates to China’s Cybersecurity Law, we highlighted the updated legal requirements that impact organisations looking to do business in mainland China. Whitepaper August 26, 2020 China’s Cybersecurity Law: Personal Information Protection Law (PIPL) Overview As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection. Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Load More