Insight Search

Sort by:
  • Flash Report

    December 13, 2023
    On December 8th, after two and a half years of negotiation, the Council of the EU and the EU Parliament finally reached a provisional agreement on the EU AI Act, which was first proposed by the European Commission in 2021. The agreement creates legislation that introduces harmonised rules and definitions for those using AI systems and putting those systems into service and bans certain types of…
  • Survey

    March 11, 2025
    Disruptive change is happening, and more is coming. Is your organisation ready to seize the moment? Our results, based on a global survey of more than 1,800 board members and C-suite executives, reveal that organisations globally and in Australia that consider themselves to be disruptive leaders see opportunities in a changing business landscape and operate differently compared to organisations…
  • Blogs

    May 17, 2024
    An SAP S/4HANA transformation project has many risks that need to be managed and often, it is difficult for the project team operating day to day on detailed tasks to “see the forest for the trees.” The PMO has intimate knowledge of the key processes and risks associated with the project and, as such, is in an ideal position to develop mitigation strategies in collaboration with the system…
  • Survey

    April 17, 2025
    According to findings from Protiviti’s latest Top Risks survey, executives and board members from PE firms and their portfolio companies are facing several complex and interconnected risks — operational, macroeconomic and strategic — that could derail their value-creation efforts. In addition to economic-related worries, cyber threats rank as a top risk issue for this industry group, and with…
  • Blogs

    July 31, 2023
    For security teams looking to implement and design smart contracts, there are many intricacies and nuances that can be overwhelming. Using established standards for the secure development of smart contracts/decentralised applications (dApps) is instrumental to effectively launch smart contracts. In an earlier blog, I introduced the basics of smart contracts; today, I’m diving into existing…
  • Flash Report

    June 3, 2022
    Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and…
  • Video

    December 21, 2024
    In this episode, host Chad Volkert, Global Solutions leader at Protiviti, is joined by Frank Serge, managing vice president of legal consulting at Protiviti. With over 20 years of industry experience and more than a decade at Protiviti and Robert Half, Frank brings extensive knowledge in legal technology, e-discovery and contract-lifecycle management (CLM). This discussion highlights the growing…
  • Blogs

    May 17, 2024
    Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in responses. Over the past several years, more and more potential customers are seeking cybersecurity partners whose values in the areas of diversity, equity and inclusion (DEI) correspond with their own. Sometimes, enterprises will…
  • Whitepaper

    May 10, 2024
    Any predictions made before 2020 about the future of work have changed with COVID-19, inflation and social movements of the past two years. The workforce of 2030 looks very different than once expected. Prior to 2020, the U.S. labor force included five generations working side by side for the first time in history. Attracting, engaging and retaining a multigenerational workforce was a top…
  • Blogs

    February 23, 2024
    In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of the most challenging and often overlooked threats is the dark web, an intentionally hidden part of the internet where threat actors can operate with a greater sense of anonymity. To adequately protect assets, companies need to do more than merely…
Loading...