Insight Search

Sort by:
  • Podcast Transcript

    September 15, 2023
    In this episode, hosted by Protiviti Associate Director Alyse Mauro Mason, we focus on financial inclusion, defining financial inclusion and its impact, what it means for your business, and how to manage the risk of more inclusive credit and lending practices.Alyse’s guests are Tracie Anderson of TransUnion and Shelley Metz-Galloway of Protiviti.Tracie is Principal, Economic Inclusion Strategy, U…
  • Whitepaper

    May 10, 2024
    Die Arbeitswelt hat sich in den letzten Jahren dramatisch gewandelt. Covid-19, Inflation und soziale Bewegungen haben sämtliche Prognosen vor 2020 auf den Kopf gestellt. Wie sieht die Workforce im Jahr 2030 aus?
  • Survey

    January 31, 2022
    For CFOs, talent, culture and resilience rate as immediate and long-term strategic challenges Massive disruptions in the global supply chain. Challenges in attracting and retaining talent to address needs all across the enterprise. COVID-19 variants. Cyber attacks and ransomware. Wildfires and flooding. Geopolitical tensions in specific regions and shifts on issues related to climate change.…
  • Whitepaper

    February 16, 2021
    Pandemic-related policies and regulation, economic conditions are top concerns in energy and utilities industry The continuing global challenges and potential existential threat posed by the ongoing COVID-19 pandemic. Political divisiveness and polarisation. Social and economic unrest. Gridlock. Artificial intelligence (AI), automation and other rapidly developing digital technologies. Rapid…
  • Newsletter

    May 19, 2020
    This issue of The Bulletin is the second of our two-part discussion of the challenge in finding equilibrium in these uncertain times. In Part 1, we discussed the attributes and actions needed to find equilibrium in the likely phased transition from the coronavirus disease 2019 (COVID-19) lockdown.[1] Given that a period of ongoing change will follow the lockdown, equilibrium means…
  • Newsletter

    March 23, 2020
    The discussion below is a more complete coverage, including examples, of the topic addressed in Issue 126 of Board Perspectives: Risk Oversight and on NACD/BoardTalk.In a crisis, clear thinking is needed in the boardroom. The unprecedented nature of the COVID-19 pandemic has set in motion one of the most abrupt disruptions in decades, leaving organisations reeling with uncertainty…
  • Podcast

    February 15, 2024
    In this episode of Risky Women Radio, host Kimberley Cole, CEO of the Risky Women organisation kicks off Series 7 by discussing the predictions for 2024 in the field of risk regulation and compliance. She is joined by Carol Beaumier and Bernadine Reese from Protiviti, who share their insights on the compliance environment over the past decade and the evolving role of the chief compliance officer.…
  • Flash Report

    April 28, 2022
    Cybersecurity threats are growing exponentially as companies introduce an increasing number of Internet of Things (IoT) devices into operations and collect and store an ever- escalating amount of data. This technology and data sprawl is providing bad actors with more entry points into networks and systems. Too often, organisations have failed to make commensurate investments in data protection,…
  • Whitepaper

    June 1, 2022
    A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management programme is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based…
  • Whitepaper

    August 1, 2022
    The purpose of security analytics in an organisationSecurity metrics and the analysis of security information can be challenging concepts even for leading organisations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organisation’s security capabilities. If policies are the…
Loading...