Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs April 6, 2023 How SAP Central Finance Benefits Manufacturers This blog post was authored by Sheeraz Iqbal, Director, Enterprise Application Solutions on The Sap Insights Blog. Manufacturers often have heterogenous systems to accommodate different processes in a manufacturing cycle. From procurement and inventory management to calculating overhead, these systems carry critical financial data and information that are necessary to determine… Whitepaper July 12, 2021 Top 10 pitfalls of an IAM programme In spite of over 20 years of experience as an industry, Identity & Access Management (IAM) programmes continue to struggle — and with good reason. There is a lot that can go wrong with an IAM programme. Lack of funding, treating IAM like a project and not a programme, not having business buy-in, and trying to overly customise packaged software are all examples of significant challenges that… Newsletter December 11, 2020 Unleash Adhocracy to Face Emerging Risks Emerging risks are newly developing risks that cannot yet be fully assessed but could, in the future, affect the viability of an organisation’s strategy and business model. A risk-savvy culture sometimes needs an informal adhocracy to identify emerging risks in a timely manner. While every organisation has a risk assessment process, we often hear that the process as it exists now is too static… Blogs March 4, 2022 The CFO’s Gambit: A Multidimensional Strategic Role On the three-dimensional chessboard of business, CFOs are expanding their roles in multiple directions at once. Finance leaders now shape and drive corporate strategy in areas ranging from advanced technology investments to organisational design, and from supply chain resilience to organisational culture. Simply stated, they are positioning themselves as players in the strategic dialogue in the C… Whitepaper August 26, 2020 China’s Cybersecurity Law: Personal Information Protection Law (PIPL) Overview As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection. Podcast June 7, 2024 Podcast | Strategic Sourcing: Gaining Advantage, Mitigating Risk – with Lucas Manganaro Supply chain management continues to be a hot topic in countless organisations in light of ongoing geopolitical challenges, evolving impacts of climate change, new tariffs, changing labor markets, and much more. How can supply chain and procurement leaders attack these and other challenges? It starts with building and implementing a strategic sourcing strategy. Protiviti recently published… Whitepaper July 14, 2021 Enterprise Thinking: Planning the Deployment of Microsoft 365 to Ensure Investment The Microsoft 365 platform transforms how every member of an organisation chats, emails, shares files and performs the essential tasks inherent to all corporate roles. A comprehensive approach to Microsoft 365 deployment planning will ensure the efficiency, cost saving and employee satisfaction that the Microsoft 365 investment has the potential to deliver. Widely available… Blogs September 10, 2021 Ransomware Crisis: 11 Actions to Avoid a Ransomware Attack Why Securing our Critical Infrastructure Matters Operational Technology (OT) remains a key, but vulnerable technology for organisations with critical infrastructure. The Australian Government has defined critical infrastructure as “those physical facilities, supply chains, information technologies and communication networks which, if destroyed, degraded or rendered unavailable for an extended… Whitepaper March 11, 2025 Generative AI: Business Rewards vs. Security Risks Explore ISMG’s Second Annual Generative AI Study, sponsored by Protiviti. Learn how businesses balance AI innovation with security risks in this comprehensive report Newsletter April 13, 2023 Transforming the Business to Operate at Market Speed As a term in business, “agile” is typically used to refer to a project management methodology, especially for software development. But there is a different, more strategic connotation of agility that merits close attention by boards as markets evolve. Load More