Insight Search

Sort by:
  • Client Story

    May 2, 2024
    Protiviti collaborated with WBC members and non-members to collect feedback, design, and develop a user-friendly, intuitive site. We assisted in the modernisation of the site’s utility and architecture to enhance engagement. Leveraging existing technologies and an agile approach, we seamlessly integrated AI into site.
  • Blogs

    June 27, 2025
    Data is the lifeblood of the telecom industry. With the advent and proliferation of 5G, AI, IoT, and other transformative technologies, telecom companies manage vast amounts of structured and unstructured data. While this data is essential for delivering seamless customer experiences and driving innovation, it also brings significant risks.
  • Whitepaper

    February 6, 2025
    Protiviti’s risk and compliance experts weigh in on the top compliance priorities for healthcare organisations in 2025 and what these changes mean under a new administration. Providers, payers, and life sciences organisations must refine their strategies to comply with evolving regulatory requirements and enforcement, while also capitalising on the opportunities presented by emerging…
  • Flash Report

    February 28, 2024
    On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity Framework (CSF). This latest edition of the CSF is designed for all audiences, industry sectors and organization types, regardless of their degree of cybersecurity sophistication.
  • Blogs

    August 14, 2024
    CFOs should school CISOs on materiality evaluations and reporting to the board, while CISOs can help finance chiefs better understand recovery costs, remediation efforts, single versus aggregate breaches and the nature of compromised data. Partnering closely with their CISO is one of several actions CFOs should consider to strengthen their cybersecurity disclosures, preparedness and incident…
  • Whitepaper

    February 8, 2023
    The digital revolution has led to an explosive growth in the amount of data created and collected, driving businesses to seek new ways to manage and discover value in the data they hold. In turn, the growth of stored data has been a longstanding management problem, which if not addressed can lead to potential vulnerabilities, data misuse, and possible data loss.
  • Whitepaper

    March 11, 2024
    Internal audit (IA) functions continue to undergo significant changes ranging from the expanded use of emerging technologies, including robust data analytics and artificial intelligence (AI), and options on where their people work (i.e., remote, hybrid or onsite). IA functions within healthcare organizations have continued to evolve and adapt— some faster than others. Keep the pace by comparing…
  • Survey

    April 17, 2025
    In a dynamic business landscape filled with uncertainty, CAEs perceive most of the macroeconomic, strategic and operational risks organisations face to be higher magnitude threats compared to CEOs, CFOs and other C-suite respondents to our latest Top Risks Survey. This makes it imperative for internal audit leaders to work closely with leaders in the enterprise to ensure that risks are thoroughly…
  • Research Guide

    November 25, 2024
    Ask financial crime professionals what the most challenging part of their job is, and most will likely say it is the timely identification of suspicious activity. As much as companies have worked to improve their detection capabilities given their compliance obligations, their desire to protect their reputations and their understanding, as corporate citizens, of the impact of financial crime on…
  • Insights paper

    June 5, 2025
    In 2023, a prominent global technology firm experienced a significant security breach when sensitive production data was inadvertently restored in a development environment. This misconfiguration led to the exposure of credentials and customer data, underscoring the persistent challenges even the most advanced tech companies face in securing cloud environments.
Loading...