Cybersecurity Collection Cyber-Resilienz ist die Fähigkeit einer Organisation, Störungen der Cybersicherheit zu erkennen, zu verhindern, darauf zu reagieren, Cybersicherheit wiederherzustellen und daraus zu lernen. Unsere Cybersecurity-Sammlung thematisiert häufige Fälle, Trends sowie die Maßnahmen, die Unternehmen ergreifen müssen, um proaktive und reaktive Lösungen zu entwickeln und ihre Vermögenswerte zu schützen. Insights paper March 20, 2024 Mastering Data Dilemmas: Navigating Privacy, Localisation and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape surrounding data protection, organisations must adapt swiftly to ensure compliance and maintain trust with their customers and stakeholders. However, both data sovereignty and localisation play an important role in privacy, as... Read more Featured Insights BLOG July 10, 2024 How Telcos Can Manage Rising Third-Party Risks The use of third-party systems and equipment by telecommunications service providers may be as old as the first telegraph transmission. It’s nothing... BLOG July 9, 2024 The SEC’s Cyber Disclosure Rules: Lessons Learned So Far In Year One What qualifies as a material cybersecurity incident? Can we estimate our potential losses and the effects of business disruption? What were our... INSIGHTS PAPER June 20, 2024 Crypto and the Travel Rule: What’s Going On? Navigate crypto Travel Rule compliance: understanding its impact, the need for flexible solutions, and areas of focus for implementation. WHITEPAPER April 2, 2024 KI-Einführung in Unternehmen durch Governance der nächsten Generation ermöglichen KI hat in Unternehmen zunehmend an Bedeutung gewonnen. Sie birgt ein enormes Potenzial für die Umgestaltung verschiedener Unternehmensfunktionen sowie... Button Button BLOG July 10, 2024 How Telcos Can Manage Rising Third-Party Risks The use of third-party systems and equipment by telecommunications service providers may be as old as the first telegraph transmission. It’s nothing... BLOG July 9, 2024 The SEC’s Cyber Disclosure Rules: Lessons Learned So Far In Year One What qualifies as a material cybersecurity incident? Can we estimate our potential losses and the effects of business disruption? What were our... INSIGHTS PAPER June 20, 2024 Crypto and the Travel Rule: What’s Going On? Navigate crypto Travel Rule compliance: understanding its impact, the need for flexible solutions, and areas of focus for implementation. WHITEPAPER April 2, 2024 KI-Einführung in Unternehmen durch Governance der nächsten Generation ermöglichen KI hat in Unternehmen zunehmend an Bedeutung gewonnen. Sie birgt ein enormes Potenzial für die Umgestaltung verschiedener Unternehmensfunktionen sowie... Data Privacy & Protection BLOG July 16, 2024 Put Privacy First To Build Trust and Elevate the Customer Experience This blog was originally posted on Forbes.com. Kim Bozzella is a member of the Forbes Technology Council. Here's a problem I often see: Most... CLIENT STORY May 23, 2024 Trusted Partnerships and Collaborative Efforts Drive Success in Data Privacy Initiatives We partnered with the client in building and maturing a data privacy program, including enhancing the company’s privacy rights process into a... FLASH REPORT April 11, 2024 The American Privacy Rights Act of 2024: Could this framework become the data privacy panacea? On April 8, 2024, U.S. Representative Cathy McMorris Rodgers (R-WA) and U.S. Senator Maria Cantwell (D-WA) announced the American Privacy Rights Act.... INSIGHTS PAPER January 8, 2024 How data sovereignty and data localisation impact your privacy programmes The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad... Button Button BLOG July 16, 2024 Put Privacy First To Build Trust and Elevate the Customer Experience This blog was originally posted on Forbes.com. Kim Bozzella is a member of the Forbes Technology Council. Here's a problem I often see: Most... CLIENT STORY May 23, 2024 Trusted Partnerships and Collaborative Efforts Drive Success in Data Privacy Initiatives We partnered with the client in building and maturing a data privacy program, including enhancing the company’s privacy rights process into a... FLASH REPORT April 11, 2024 The American Privacy Rights Act of 2024: Could this framework become the data privacy panacea? On April 8, 2024, U.S. Representative Cathy McMorris Rodgers (R-WA) and U.S. Senator Maria Cantwell (D-WA) announced the American Privacy Rights Act.... INSIGHTS PAPER January 8, 2024 How data sovereignty and data localisation impact your privacy programmes The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad... Digital Identity FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... BLOG February 7, 2024 IAM in Operational Technology: How and Where to Make it Work By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now... BLOG April 5, 2024 New SEC Cybersecurity Disclosure Rules: Key Takeaways From Companies’ Responses While the ink is still drying on many 2023 Form 10-Ks, Protiviti has reviewed a subset of the filings to gauge how firms are responding to the U.S.... BLOG October 3, 2023 Emerging Trends in IAM Part 4: Going Passwordless with the FIDO Use Case The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their... Button Button FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... BLOG February 7, 2024 IAM in Operational Technology: How and Where to Make it Work By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now... BLOG April 5, 2024 New SEC Cybersecurity Disclosure Rules: Key Takeaways From Companies’ Responses While the ink is still drying on many 2023 Form 10-Ks, Protiviti has reviewed a subset of the filings to gauge how firms are responding to the U.S.... BLOG October 3, 2023 Emerging Trends in IAM Part 4: Going Passwordless with the FIDO Use Case The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their... Security Strategy & Architecture BLOG July 23, 2024 5 Tips to Navigate Security in Agile Development In today's fast-paced digital landscape, DevOps practices have revolutionized software development and deployment, allowing organizations to achieve... WHITEPAPER May 9, 2024 SIFMA’s Quantum Dawn VII After-Action Report The latest iteration of SIFMA’s biannual cybersecurity exercise focused on the outage of a critical third-party service provider. The simulation and... BLOG April 9, 2024 Securing Large Language Models: Unique Challenges and Rethinking Traditional Security Approaches Large Language Models (LLMs) are computational systems that process and generate text by learning from vast datasets. These advanced models, which can... SURVEY April 4, 2024 CIOs and CTOs See Skills, Staffing and Talent as Top Risk Concerns Businesses today face a myriad of challenges as they work to adapt and transform their operational models in order to overcome future obstacles,... Button Button BLOG July 23, 2024 5 Tips to Navigate Security in Agile Development In today's fast-paced digital landscape, DevOps practices have revolutionized software development and deployment, allowing organizations to achieve... WHITEPAPER May 9, 2024 SIFMA’s Quantum Dawn VII After-Action Report The latest iteration of SIFMA’s biannual cybersecurity exercise focused on the outage of a critical third-party service provider. The simulation and... BLOG April 9, 2024 Securing Large Language Models: Unique Challenges and Rethinking Traditional Security Approaches Large Language Models (LLMs) are computational systems that process and generate text by learning from vast datasets. These advanced models, which can... SURVEY April 4, 2024 CIOs and CTOs See Skills, Staffing and Talent as Top Risk Concerns Businesses today face a myriad of challenges as they work to adapt and transform their operational models in order to overcome future obstacles,... Security Resilience IN FOCUS July 23, 2024 Dient CrowdStrike als Neustart für die technische Ausfallsicherheit? Nachdem ein Software-Update des Cybersecurity-Anbieters CrowdStrike zu einem weltweiten Ausfall von Windows-Computern geführt hat, befinden sich die... INFOGRAPHIC June 3, 2024 Infographic | SIFMA’s Quantum Dawn VII Quantum Dawn VII is the latest iteration of SIFMA's biannual cybersecurity exercise focused on the outage of a critical third-party service provider ... WHITEPAPER May 28, 2024 DORA Compliance: Untangling Key Hurdles to Implementation The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final... BLOG December 12, 2023 Why Care about Technology Risks and Building Resilience? This is the first post in a two-part series exploring the benefits of technology resilience. It defines technology resilience and describes its value... Button Button IN FOCUS July 23, 2024 Dient CrowdStrike als Neustart für die technische Ausfallsicherheit? Nachdem ein Software-Update des Cybersecurity-Anbieters CrowdStrike zu einem weltweiten Ausfall von Windows-Computern geführt hat, befinden sich die... INFOGRAPHIC June 3, 2024 Infographic | SIFMA’s Quantum Dawn VII Quantum Dawn VII is the latest iteration of SIFMA's biannual cybersecurity exercise focused on the outage of a critical third-party service provider ... WHITEPAPER May 28, 2024 DORA Compliance: Untangling Key Hurdles to Implementation The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final... BLOG December 12, 2023 Why Care about Technology Risks and Building Resilience? This is the first post in a two-part series exploring the benefits of technology resilience. It defines technology resilience and describes its value... Content Collections Technology Industry Collection Eine kuratierte Sammlung aus Themen, Trends und Erkenntnissen, die Unternehmen der Technologie-, Medien- und Telekommunikationsbranche (TMT) bei der Bewältigung der aktuellen Herausforderungen und Chancen unterstützen. In jeder kritischen Phase Ihres Unternehmenswachstums helfen Ihnen Protivitis Erkenntnisse und Lösungen.Unser… Mehr erfahren Board and C-Suite Leadership Collection Erfahren Sie mehr über die Herausforderungen und Interessensgebiete von Vorständen auf der ganzen Welt. Von Umwelt-, Sozial- und Governance-Angelegenheiten (ESG) bis hin zur Risikoüberwachung bietet diese Sammlung praktische Einblicke und Orientierung sowohl für neue als auch erfahrene Vorstandsmitglieder. Mehr erfahren Audit & Risk Management Collection Protiviti-Führungskräfte und Subject-Matter-Experten aus der ganzen Welt bieten Einblicke in die wichtigsten Themen, mit denen Unternehmen in unserem dynamischen, herausfordernden und wettbewerbsorientierten globalen Geschäftsklima konfrontiert sind. Unsere erstklassige Erfahrung in den Bereichen Interne Revision und… Mehr erfahren