Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Podcast Transcript February 6, 2023 Transcript | Preventing Hacking with Quantum Computing and other InfoSec Topics – with Mark Carney from Quantum Village We’ve talked about how quantum computers are enabling extraordinary use cases now, long before the machines will threaten cryptography. Some of these applications can even help companies protect against immediate security threats and vulnerabilities. We explore one such exciting experiment: Using quantum to stop kill chains that allow network exploitation and the Chinese paper causing all the… Whitepaper February 21, 2023 ISO 27001: 2022 - Key Changes and Approaches to Transition This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organisations can take to implement the changes introduced. There have been significant advancements in technology, as well as an increase in the complexity of security threats since the last iteration of ISO 27001 was published on September 25, 2013. The changes introduced in… Podcast June 30, 2023 Cost Optimisation in Manufacturing – with Shawn Seasongood and Andrea Vardaro Thomas Well, it looks like a recession is coming. Or maybe it's not. Or maybe it is. It seems like it's been a long wait for the other economic shoe to drop. And in the meantime, many questions are arising around managing costs in organisations. CFOs and finance leaders continue to have a lot of questions, and get even more from their internal stakeholders and customers, about projections, cost… Podcast Transcript June 29, 2023 Transcript | Cost Optimisation in Manufacturing – with Shawn Seasongood and Andrea Vardaro Thomas Well, it looks like a recession is coming. Or maybe it's not. Or maybe it is. It seems like it's been a long wait for the other economic shoe to drop. And in the meantime, many questions are arising around managing costs in organisations. CFOs and finance leaders continue to have a lot of questions, and get even more from their internal stakeholders and customers, about projections, cost… Whitepaper August 13, 2024 Regulations and Demand for Accountability Set the Tone for the Future of ESG Disclosures In recent years, increasing pressures from a variety of stakeholders have combined to drive companies toward more sustainable practices in their business operations and greater transparency. The real game-changer, however, has been the proliferation of recent global environmental, social and governance (ESG) reporting regulations, which require a level of reporting far above the voluntary… Client Story March 19, 2024 Hospitality Company Builds Foundation for Pursuing Responsible AI, Mitigating Risk with Comprehensive Standards and Enhanced Controls Experience the transformative potential of responsible AI. Our tailored governance framework ensures ethical use and compliance, guiding your AI journey. Newsletter September 28, 2022 Identifying and managing the critical risks of third-party providers “Outsourcing and other third-party relationships can bring multiple benefits to FIs, including: enhanced operational resilience; faster and more tailored financial products and services; cost reduction; greater innovation; and improved internal processes. However, outsourcing and third-party relationships can give rise to new or different risks to FIs and potentially to financial stability that… Survey May 9, 2023 Technical Debt and Innovation – the CFO’s Perspective Organisations today spend an average of 30% of their IT budgets and invest a fifth of their IT human resources on technical debt management. This research, based on a global survey of more than 1,000 CIOs, CTOs and other technology leaders, underscores the burden created by technical debt and likely is an eye-opener for the CFO.[1] As organisations strive to increase their focus, and time and… Client Story July 24, 2022 Managing through change: A small professional association gains flexibility and freedom Smaller firms can’t afford to be heavily dependent on technical consultants or bound to a portfolio of siloed applications that don’t provide the ability to track data. Recently, the visionary leader of a healthcare professional association freed her business from these dilemmas. But the flexibility and strength her small team stood to gain from their digital transformation initiative were… Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organization’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Load More