Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs May 5, 2022 Protiviti Parental Leave — Jacob Bosden Protiviti appreciates the need for work-life balance among working parents. As such, we offer a competitive Parental Leave programme and the Protiviti Parents Network to support parents and soon-to-be parents working for our organisation. The Protiviti Parents Network focuses on the blend of work and family for new and experienced parents. The network meets regularly in local groups to empower… Blogs March 31, 2022 ISO 27002 Is Changing: What You Need To Do ISO 27002 contains details of controls required to be certified under the ISO 27001 standard. With the ever changing security threat landscape and the need to protect information assets, the International Organisation for Standardisation (ISO) has introduced several changes to the 27002 set of controls. These changes have been published in the latest version of the ISO 27002:2022 standard… Blogs March 7, 2022 Female Leaders I Look Up To by Isabelle Remedios In celebrating female leadership, we wanted to take a moment to introduce you to an early-career female leader at Protiviti Australia, Isabelle (Izy) Remedios. Izy started her career with Protiviti in early 2020 as a graduate from the Australian National University with a double bachelor’s degree in international relations and commerce. She began in the Internal Audit & Financial Advisory… Blogs March 7, 2022 Striving for Gender Equality with iGROWW Protiviti Is Bringing Diversity and Gender Equity to the Forefront Many organisations talk about gender equity and the need to promote a more diverse workforce. Protiviti is doing more than just talking about it. Jane Tumurbaatar has been leading the charge when it comes to equality and inclusion at Protiviti in Australia through the organisation’s Initiative for Growth and Retention… Flash Report February 23, 2022 Managing Financial Crime Risk in a Rapidly Changing Environment Jump to different sections in the article from here: >> Financial crime risk and vulnerability in the current economic climate >> Identifying, managing and mitigating financial crime during a time of crisis >> Regulatory outreach and response as the pandemic paradigm shifts >> Where to next as the uncertain economic landscape evolves? >>… Blogs February 18, 2022 CFOs and Finance Leaders Face Growing Responsibilities, Including ESG Reporting, According to New Protiviti Survey Organisations look to CFOs and VPs of finance for additional actions and data that, until recently, were considered outside their purview. Results from a just released Protiviti Finance Trends Survey reveal that these leaders are increasingly relied on as a go-to source for insights required by companies to address fast-moving drivers of change: CFOs and VPs of finance are informing and… Whitepaper September 7, 2021 China's Evolving Cybersecurity Law China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for… Whitepaper August 26, 2020 China's Cybersecurity Law: Multi-Level Protection Scheme (MLPS) In part one of our Point of View (POV) series Interpretations of the updates to China’s Cybersecurity Law, we highlighted the updated legal requirements that impact organisations looking to do business in mainland China. Whitepaper August 26, 2020 China’s Cybersecurity Law: Personal Information Protection Law (PIPL) Overview As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection. Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Load More