Insight Search

Sort by:
  • Podcast

    September 12, 2023
    In this episode, we dive into SOX compliance – specifically, the findings of and key takeaways from Protiviti’s latest Sarbanes-Oxley Compliance Survey. The results of our research are featured in our just-released report, The Evolution of SOX: Tech Adoption and Cost Focus Amid Business Changes, Cyber and ESG Mandates.The 2024 - Empowering the progress of SOX innovation is out now. Read now.…
  • Blogs

    July 14, 2023
    In recent years, there’s been considerable talk of blockchain and its use cases in the business world. While some of these topics have specific use cases – metaverse, decentralised finance, etc – there is one topic that underpins everything in the blockchain and decentralised space: smart contracts. Smart contracts are behind-the-scenes applications that route data, track changes and settle…
  • Video

    December 21, 2024
    In this episode of Protiviti Legal Perspectives, host Chad Volkert, Global Solutions leader at Protiviti, welcomes Peter Tierney, managing director in Protiviti’s Legal Consulting practice, to discuss the evolving landscape of legal document management. With nearly 30 years of experience in legal consulting, Peter shares insights into the challenges organisations face in managing legacy paper…
  • Blogs

    April 21, 2023
    Senior leaders focused on cybersecurity recognise there is considerable guidance, best practices, frameworks, regulations and varied opinions on how programmes should design defensive capabilities. In addition, depending on the day, the various pressures in the organisation’s macro-environment may be greater or lesser and invite different priorities for time, team and budget. Despite these…
  • Blogs

    April 6, 2023
    I am often asked, with all the investments in data management and infrastructure over the last 50 years, why are we still not great with governing data? To put it simply and directly – it’s hard! Data governance programmes are easy to envision conceptually, difficult to implement, and without proper care, impossible to sustain. Often data governance investments have a long ‘time to…
  • Blogs

    October 30, 2024
    As the wheel of digital transformation continues to turn, it brings with it profound changes across a myriad of industries. Perhaps none so much as in the finance function, which finds itself on the cusp of a new era defined by artificial intelligence (AI)-driven efficiency tools.
  • Survey

    March 27, 2023
    Beginning in 2020, the Financial Industry Regulatory Authority (FINRA), the Securities and Exchange Commission (SEC) and several states provided temporary relief from the operational challenges of conducting on-site branch inspections during the pandemic, allowing firms to utilise technology to fulfill their inspection obligations remotely. Now, FINRA has proposed a voluntary, three-year remote…
  • Blogs

    September 4, 2024
    When approaching an ERP implementation, the topic of security is going to be broached and the question then becomes, “now or later?” Before discussing the considerations for implementing security before or after an ERP implementation, it is important to review the purpose of creating a custom security model. For most companies, creating compliant custom security is a requirement. 
  • Blogs

    May 17, 2024
    These turbulent times of evolving threats and rising personal responsibility considerations for cybersecurity leaders make the CISO role a challenging but rewarding position. The CISO must contend with an increasing sophistication of attacks, potential geopolitical adversaries and the material impact cybersecurity can have on organisational value. Whether it’s a new CISO or a seasoned…
  • In Focus

    October 17, 2024
    As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security of its national defense supply chain: The Cybersecurity Maturity Model Certification (CMMC) Programme. The new rule, published Oct. 15, marks a significant step towards enhancing cybersecurity across the Defense Industrial Base (DIB).
Loading...