Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Client Story March 19, 2024 Hospitality Company Builds Foundation for Pursuing Responsible AI, Mitigating Risk with Comprehensive Standards and Enhanced Controls Experience the transformative potential of responsible AI. Our tailored governance framework ensures ethical use and compliance, guiding your AI journey. Client Story June 13, 2023 Having it all: Technology transformation in the luxury marina market This company is the world’s largest owner and operator of marinas, with more than 100 locations in its portfolio. The company’s business model is laser focused on growth through acquisition while enhancing the member experience in this high-end market. To support the business model, the company embarked on a technology transformation journey to develop its own marina management system that allows… Whitepaper December 2, 2021 Buy Now, Pay Later...and Gear Up for More Regulation First there were layaways. Conjured during the Great Depression when people were struggling to make ends meet, layaways allowed people to buy big-ticket items and pay in installments before walking away with their product. Layaways were especially popular around the holidays when many people reserved all their gifts in advance and started saving for them through a layaway programme. Then came the… Podcast July 17, 2024 Risky Women Podcast | Risk Management With Purpose In this episode of Protiviti's Risky Women podcast series, Ghislaine Entwisle, Managing Director of the Australia Technology Consulting and Business Performance Improvement practice, speaks with Gloria Yuen, Head of Regulatory Enablement and Delivery at National Australia Bank. Flash Report July 17, 2020 European Court of Justice Invalidates the EU-US Privacy Shield Framework July 17, 2020 On Thursday, July 16, the Court of Justice of the European Union (CJEU) implemented a landmark ruling in case C-311/18 - Data Protection Commissioner v Facebook Ireland and Maximillian Schrems (more commonly referred to as “Schrems II”). While it concluded that Standard Contractual Clauses (SCCs) issued by the European Commission… Whitepaper September 22, 2022 Artificial Intelligence: Can Humans Drive Ethical AI? Artificial intelligence (AI) is a powerful technology that’s driving innovation, boosting performance, and improving decision-making and risk management across enterprises. It’s also turning data into the key driver of competitive advantage. Over the next two years, organisations across all industries plan to deploy or increase their use of artificial intelligence, according to a recent global… Infographic May 8, 2023 Infographic | COSO ESG Guidance Webinar: Internal Control Over ESG Operations, Compliance & Reporting The Committee of Sponsoring Organisations of the Treadway Commission (COSO) recently released interpretive guidance for organisations about designing, evaluating and achieving effective internal control over sustainability reporting (ICSR) using COSO’s globally recognised Internal Control — Integrated Framework (ICIF), developed in 2013. The intended outcome is to build trust and confidence in… Podcast July 23, 2024 Risky Women Radio | Women in Risk Management: Challenges and Opportunities Dive into the world of women in risk management. In this Risky Women podcast, Jenny Wong & Gayle Lacey discuss risk management challenges & opportunities. Survey December 22, 2023 2024 Top Risks in the Financial Services Industry Protiviti and NC State University’s ERM Initiative have been conducting our Top Risks Survey for the past 12 years. This journey began just as financial markets around the world were starting their long, slow recovery from the global financial crisis, and has since covered the worst global pandemic in 100 years as well as near record-low interest rates followed shortly by the fastest rate hiking… Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Load More