Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Newsletter December 19, 2024 Compliance Insights As we enter the new year, the financial services industry once again faces compliance risks that are increasingly diverse and complex. For 2025 we asked a larger-than-usual group of Protiviti colleagues across the globe to help identify the most pressing compliance issues in their market. Artificial intelligence, financial crime, privacy and security, operational resilience, third party risk… Whitepaper March 16, 2023 Modern data architecture as a strategic lever in the competitive landscape Data has become the life blood of businesses and properly managing that data to gain the most value is becoming ever more important as businesses seek to remain competitive. This Insights paper will address the importance of investing in the processes, practices, and technologies to maximise the value of data in an enterprise. Blogs December 15, 2023 Protiviti-Oxford study on the future of money and digital disruption in the future An overwhelming majority of global business leaders—85%—expect their home country to be “cashless” within a decade, and nearly a third expect it will happen within the next five years, according to findings of the Protiviti-Oxford survey, “Executive Outlook on the Future of Money, 2033 and Beyond.” Whitepaper September 19, 2023 The 5G Effect As the world advances into a more digitised and connected future, what can be learned from organisations that are successfully deploying 5G technology to enable business processes and efficiency. Where is 5G making the biggest difference in the real world? Blogs November 3, 2023 Tackling gender bias: Women in cybersecurity Cybersecurity is distinguished not only by a talent shortage but also by having a predominantly male workforce. Women are in the minority on most cybersecurity teams that have women at all, so when they experience gender bias, they’re likely to be isolated. Blogs March 10, 2023 China’s all-in approach to the metaverse could spell trouble for U.S. tech supremacy China is poised, and perhaps more determined than ever, to make the metaverse central to its economy in the future. China wants to expand the VR industry output to 350 billion yuan (U.S. $48 billion) by 2026 — six times the level of 2021 — showing it aims to become a world leader in the emerging metaverse economy. Blogs May 5, 2023 Creating a resilient cybersecurity strategy: The governance lifecycle approach Cybersecurity governance should do more than manage cyber risk. Good cybersecurity governance creates efficiencies by clarifying the outcomes expected from its processes and establishing boundaries of responsibility among cybersecurity practitioners, frontline operational areas, senior leaders and board members. Recently, numerous crises have drawn senior leaders and board members down… Blogs June 30, 2023 Metrics’ role in cyber transformation We’ve all heard the saying, “what gets measured gets done,” meaning that regular measurement and reporting helps to keep organisations focused on the information that matters. But with so many data points available to measure security, it is difficult to know where to begin. Security practitioners must constantly question what data they collect and why. Only by providing relevant measures can we… Blogs June 30, 2023 A house divided: Key differences in cybersecurity implementation for IT and OT Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll Tide vs. War Eagle, The Egg Bowl, Bedlam, The Backyard Brawl, “The Game”). But we’re fundamentally not all that… Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Load More