Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper July 19, 2021 Resilience Practices Can Help Firms Mitigate Supply Chain and Third-Party Provider Risks - Top of Mind Compliance Issues for 2021 Customers are major drivers of change in the marketplace. In times of stress, how well companies manage customer experience and expectation can determine whether they succeed. At the height of the COVID-19 pandemic, amid demand spikes and panic buying of household items like groceries and cleaning products, companies that successfully addressed customers’ demands (e.g., restocked alternative… Podcast February 8, 2023 Podcast | The Real Date of the Quantum Computing Apocalypse and What the White House Says We’ll Do About It Will quantum computers be able to crack RSA this decade? Maybe. But figuring out that exact date is not what you and your organisation should be worried about. A memorandum issued by the White House reveals when the quantum computing apocalypse will begin as far as information security boots on the ground are concerned. Join Host Konstantinos Karagiannis for a deep dive into the NSM-10 memo and… Whitepaper April 4, 2021 Is It Time to Regulate the Buy-Now-Pay-Later Industry? Or Will We Delay and Simply “Pay for It Later”? By Mark Burgess, Managing Director, Risk and Compliance, and Layla Shakkour, Manager, Risk and Compliance With increasing attention on the potential negative impacts of buy-now-pay-later (BNPL) services, Australia may soon need to decide at what point BNPL providers will be regarded as credit providers under the law, and effectively regulated as such. Client Story April 22, 2020 Protiviti helps healthcare non-profit implement Microsoft Power BI solution to give its global members access to quick, current and valuable information Globalisation and the internet in recent history have generated any number of benefits for corporations, professionals and job seekers by allowing them to seek collaboration and expansion opportunities in new markets. But this virtual free flow of commerce and cooperation can abruptly hit a dead end at the door of regulators with purview over certain countries or jurisdictions, halting businesses… Blogs May 17, 2024 Developing a security function during a CISO’s first 100 days These turbulent times of evolving threats and rising personal responsibility considerations for cybersecurity leaders make the CISO role a challenging but rewarding position. The CISO must contend with an increasing sophistication of attacks, potential geopolitical adversaries and the material impact cybersecurity can have on organisational value. Whether it’s a new CISO or a seasoned… Client Story January 2, 2020 Inclusion, diversity and shared values: How Protiviti helped Goodwill build an award-winning Microsoft intranet to advance its mission to those with diverse needs According to the 2018 Census Bureau, 12.8% of the U.S. population has some type of disability. Included in that statistic are those who have impairments that impact accessibility of online websites, applications and documents.These impairments include:Difficulty lifting or grasping, which can impact use of a mouse or keyboardCognitive, mental or emotional impairmentVision impairment (… Blogs May 17, 2024 Inclusive culture starts with contract language Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in responses. Over the past several years, more and more potential customers are seeking cybersecurity partners whose values in the areas of diversity, equity and inclusion (DEI) correspond with their own. Sometimes, enterprises will… Blogs April 21, 2023 Enhancing cyber capabilities using a threat-driven strategy Senior leaders focused on cybersecurity recognise there is considerable guidance, best practices, frameworks, regulations and varied opinions on how programmes should design defensive capabilities. In addition, depending on the day, the various pressures in the organisation’s macro-environment may be greater or lesser and invite different priorities for time, team and budget. Despite these… Blogs July 14, 2023 Smart contracts part 1: What is a smart contract? In recent years, there’s been considerable talk of blockchain and its use cases in the business world. While some of these topics have specific use cases – metaverse, decentralised finance, etc – there is one topic that underpins everything in the blockchain and decentralised space: smart contracts. Smart contracts are behind-the-scenes applications that route data, track changes and settle… Blogs January 13, 2023 The Evolution of Attacker Behavior: 3 Case Studies This blog post was authored by Mike Ortlieb, Director, Security and Privacy and Chris Porter, Associate Director, Security and Privacy on The Technology Insights Blog. Threat actors are an ever-evolving species. Portrayed in popular advertising as guys dressed in black, probably sporting a ski mask, the harsh reality is that these bad actors are everywhere and are getting more creative… Load More