Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper June 1, 2022 How can an enterprise use access management to establish a Zero Trust environment? A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management programme is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based… Podcast Transcript January 5, 2021 Transcript - Building an Effective Industrial Control Systems Security Programme In this episode, Kevin Donahue, a senior director with Protiviti speaks with Protiviti's associate director Justin Turner and manager Derek Dunkel-JahanTigh about security for industrial control systems, or operational technology. Podcast May 19, 2021 Podcast | Honeywell’s Roadmap to Quantum Value with Honeywell Quantum Solutions Honeywell surprised the quantum computing world in 2020 by announcing the most powerful system on Earth at the time … then claiming they’d make it ten times more powerful within a year! Turns out that having a century of industrial research experience can come in handy when trying to alter the future of high-performance computing. In this episode, we talk with Justin Ging from Honeywell Quantum… Podcast January 5, 2021 Podcast - Building an Effective Industrial Control Systems Security Programme In this episode, Kevin Donahue, a senior director with Protiviti speaks with Protiviti's associate director Justin Turner and manager Derek Dunkel-JahanTigh about security for industrial control systems, or operational technology. Whitepaper July 13, 2021 How to implement an effective identity management strategy Identity management doesn’t happen overnight; there’s no “Easy” button to press, or magic snap-of-the-fingers instant fix. In fact, identity management has transformed into something far more complex than password authentication and simple security measures. It’s important to understand that jumping into a new technology instantaneously isn’t necessarily the right first step to ensuring a… Whitepaper July 12, 2021 Top 10 pitfalls of an IAM programme In spite of over 20 years of experience as an industry, Identity & Access Management (IAM) programmes continue to struggle — and with good reason. There is a lot that can go wrong with an IAM programme. Lack of funding, treating IAM like a project and not a programme, not having business buy-in, and trying to overly customise packaged software are all examples of significant challenges that… Whitepaper December 19, 2024 The Compliance Playbook: Navigating the Financial Services Industry’s Compliance Priorities in 2025 As we enter the new year, the financial services industry once again faces compliance risks that are increasingly diverse and complex. Insights paper June 5, 2025 Protect Your Cloud Environment With CNAPP In 2023, a prominent global technology firm experienced a significant security breach when sensitive production data was inadvertently restored in a development environment. This misconfiguration led to the exposure of credentials and customer data, underscoring the persistent challenges even the most advanced tech companies face in securing cloud environments. Whitepaper September 22, 2022 Artificial Intelligence: Can Humans Drive Ethical AI? Artificial intelligence (AI) is a powerful technology that’s driving innovation, boosting performance, and improving decision-making and risk management across enterprises. It’s also turning data into the key driver of competitive advantage. Over the next two years, organisations across all industries plan to deploy or increase their use of artificial intelligence, according to a recent global… Survey February 21, 2024 2024 Top Risks for Chief Audit Executives CAEs see a riskier near- and long-term environment than do most of their colleagues in the executive suite. Of all C-level respondents to our latest Top Risks Survey, internal audit leaders ascribe the highest-magnitude ratings to risks they expect to challenge their organisation’s ability to achieve its performance objectives during the next 12 months. Load More