Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Survey May 29, 2023 Talent, culture, cybersecurity and data privacy represent top risk issues for public sector organisations The level of uncertainty in today’s global marketplace and the velocity of change continue to produce a multitude of potential risks that can disrupt an organisation’s business model and strategy on very short notice. Unfolding events in Eastern Europe, changes in government leadership in several countries around the globe, escalating inflation, rising interest rates, ever-present cyber threats,… In Focus April 29, 2025 Oracle Cloud security: Preventing unauthorised access and data theft Data breaches have increasingly plagued organisations worldwide, underscoring the urgent need for robust security measures. The latest reported incidents involving Oracle have spotlighted the critical importance of protecting customer data. Whitepaper August 12, 2021 Building a Comprehensive Data Privacy Programme: Four Actionable Steps for Technology Companies Introduction Most technology companies today understand that ensuring data privacy and protection is an imperative for their business; however, few manage this process well or even invest enough resources in that effort. As governments and consumers around the world continue to raise their expectations of how technology businesses should handle and process private and sensitive data,… Survey February 15, 2024 2024 Top Risks for Chief Financial Officers Chief financial officers (CFOs) have a unique vantage point regarding talent management, one that explains why the ability to attract, develop and retain top talent represents their top risk concern in both 2024 and 2034. Flash Report March 9, 2023 New White House Cybersecurity Strategy Creates Additional Concerns for Businesses Das Weiße Haus veröffentlichte vor kurzem eine umfassende nationale Cybersicherheitsstrategie, welche mit Sicherheit große Auswirkungen auf Regierungsbehörden und Privatunternehmen haben wird. Podcast June 2, 2021 Podcast | Quantum Computing Use Cases with Super.tech The holy grail of quantum computing in the near term is a use case that provides advantage. We believe it’s only a matter of time, but major companies have to plan and prepare now so that they are not left behind when these applications arrive. Join host Konstantinos Karagiannis for a chat about quantum computing use cases with Pranav Gokhale from Super.tech. We cover mostly financial customer… Survey January 7, 2022 Three Conversation Starters That Advance CISO/CFO Collaboration The quality and, in some cases, the existence of the CISO/CFO relationship varies by company. In organisations where the CISO role is positioned and promoted as a source of value, CISOs and CFOs tend to collaborate more often and more meaningfully than in companies that treat information security as a cost center (and typically struggle with cybersecurity as a result). Protiviti’s 2021… Video July 28, 2023 Video | Digitale Transformation – Portrait Erwin de Man Erwin de Man, Managing Director bei Protiviti Deutschland, ist Experte für Digitale Transformation. Angesichts der ständigen Marktveränderungen ist die digitale Zukunft ein zentrales Thema, das Unternehmen vor viele Unsicherheiten stellt. Podcast March 23, 2022 Podcast | Quantum Machine Learning Using PennyLane with Xanadu Quantum machine learning, or QML, is one of the three major application categories for quantum computing, along with optimisation and simulation. As we’re working with customers at Protiviti to find advantageous use cases in QML, we rely daily on a tool called PennyLane from Xanadu. Join host Konstantinos Karagiannis, and special cohost Emily Stamm, for a chat with Nathan Killoran from Xanadu to… Flash Report June 3, 2022 SEC Cybersecurity Disclosure Enhancements: They’re Coming, in One Form or Another Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and… Load More