Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Podcast September 12, 2023 Podcast | The Evolution of SOX: Tech Adoption and Cost Focus Amid Business Changes, Cyber and ESG Mandates In this episode, we dive into SOX compliance – specifically, the findings of and key takeaways from Protiviti’s latest Sarbanes-Oxley Compliance Survey. The results of our research are featured in our just-released report, The Evolution of SOX: Tech Adoption and Cost Focus Amid Business Changes, Cyber and ESG Mandates.The 2024 - Empowering the progress of SOX innovation is out now. Read now.… Blogs July 14, 2023 Smart contracts part 1: What is a smart contract? In recent years, there’s been considerable talk of blockchain and its use cases in the business world. While some of these topics have specific use cases – metaverse, decentralised finance, etc – there is one topic that underpins everything in the blockchain and decentralised space: smart contracts. Smart contracts are behind-the-scenes applications that route data, track changes and settle… Video December 21, 2024 Video | Protiviti Legal Perspectives With Managing Director Peter Tierney In this episode of Protiviti Legal Perspectives, host Chad Volkert, Global Solutions leader at Protiviti, welcomes Peter Tierney, managing director in Protiviti’s Legal Consulting practice, to discuss the evolving landscape of legal document management. With nearly 30 years of experience in legal consulting, Peter shares insights into the challenges organisations face in managing legacy paper… Blogs April 21, 2023 Enhancing cyber capabilities using a threat-driven strategy Senior leaders focused on cybersecurity recognise there is considerable guidance, best practices, frameworks, regulations and varied opinions on how programmes should design defensive capabilities. In addition, depending on the day, the various pressures in the organisation’s macro-environment may be greater or lesser and invite different priorities for time, team and budget. Despite these… Blogs April 6, 2023 Why Data Governance Programmes Are Easy to Envision, Difficult to Sustain I am often asked, with all the investments in data management and infrastructure over the last 50 years, why are we still not great with governing data? To put it simply and directly – it’s hard! Data governance programmes are easy to envision conceptually, difficult to implement, and without proper care, impossible to sustain. Often data governance investments have a long ‘time to… Blogs October 30, 2024 The Future of Microsoft Copilot for Finance As the wheel of digital transformation continues to turn, it brings with it profound changes across a myriad of industries. Perhaps none so much as in the finance function, which finds itself on the cusp of a new era defined by artificial intelligence (AI)-driven efficiency tools. Survey March 27, 2023 Industry Experience With Remote Branch Inspections Beginning in 2020, the Financial Industry Regulatory Authority (FINRA), the Securities and Exchange Commission (SEC) and several states provided temporary relief from the operational challenges of conducting on-site branch inspections during the pandemic, allowing firms to utilise technology to fulfill their inspection obligations remotely. Now, FINRA has proposed a voluntary, three-year remote… Blogs September 4, 2024 Microsoft D365 Security Design Implementation Considerations When approaching an ERP implementation, the topic of security is going to be broached and the question then becomes, “now or later?” Before discussing the considerations for implementing security before or after an ERP implementation, it is important to review the purpose of creating a custom security model. For most companies, creating compliant custom security is a requirement. Blogs May 17, 2024 Developing a security function during a CISO’s first 100 days These turbulent times of evolving threats and rising personal responsibility considerations for cybersecurity leaders make the CISO role a challenging but rewarding position. The CISO must contend with an increasing sophistication of attacks, potential geopolitical adversaries and the material impact cybersecurity can have on organisational value. Whether it’s a new CISO or a seasoned… In Focus October 17, 2024 The DoD unveils the Cybersecurity Maturity Model Certification Programme: A primer for defense contractors As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security of its national defense supply chain: The Cybersecurity Maturity Model Certification (CMMC) Programme. The new rule, published Oct. 15, marks a significant step towards enhancing cybersecurity across the Defense Industrial Base (DIB). Load More