Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog June 23, 2022 Maximizing OT Security and Resiliency Through a Risk-Based Framework The past 18 months have seen a significant increase in threats targeting critical infrastructure and operational technology (OT) networks. These environments are prime targets due to their age, complexity and importance to organizations. OT is the driver behind the largest corporations in the world – whether it is mixing the secret recipe for Coca-Cola, generating power for millions of customers… Blog June 27, 2022 Balancing Opportunity and Risk: Security for RPA Platforms Robotic process automation (RPA) was first used to execute predetermined, rules-based tasks twenty or so years ago. Since then, RPA has functioned as a virtual workforce for businesses, which benefit from its power to collect data, execute processes rapidly and unerringly, and facilitate higher levels of quality — while enhancing customer satisfaction. We’ve previously addressed at length the… Blog June 28, 2022 Video Blog: 3 Keys to Successful Microsoft Power Platform Governance Protiviti's Haniel Croitoru, a long-time Microsoft MVP, shares his thoughts on why it's important to include governance around the Microsoft Power Platform - a low-code tool that allows citizen developers to build solutions (with the potential for disastrous results!). Spend three minutes learning the three keys to successful Power Platform governance. Hint: monitoring and alerting… Blog July 5, 2022 Sustainability in Third-Party Risk Management: Going Back to the Basics The mere terms third-party, supplier, vendor, service provider and customer demand context and definition. Either an organization conducts cybersecurity and privacy due diligence on critical third parties or is on the receiving end fielding customer due diligence requests – and often, doing both. Wherever each organization is on the third-party risk management journey, its leaders should know… Blog June 16, 2022 Demystifying Digital Transformation in Finance Digital transformation in finance has been on the docket for years. So, why do organizations still struggle? The status quo is filled with manual, spreadsheet-driven workflows and fractured application ecosystems that may have been caused by failed attempts at digital transformation — and significant investments alone will not guarantee success. These issues have led to reduced data integrity… Blog June 22, 2022 Balancing Opportunity and Risk: Security for RPA Platforms Robotic process automation (RPA) was first used to execute predetermined, rules-based tasks twenty or so years ago. Since then, RPA has functioned as a virtual workforce for businesses, which benefit from its power to collect data, execute processes rapidly and unerringly, and facilitate higher levels of quality — while enhancing customer satisfaction. We’ve previously addressed at length the… Blog June 23, 2022 Labor Shortages Challenge Supply Chains to Automate While Retaining Employees and Their Trust Among the business topics that have dominated the press over the past two years, supply chain difficulties and labor shortages have certainly been at the top. But the two are not mutually exclusive. Organizations across all industries are having a hard time finding employees to keep their supply chains operating as efficiently and smoothly as possible; goals that have been made more difficult… Blog June 27, 2022 Evolving No Surprises Act Requirements Continue to Be a Heavy Lift — Here’s How Healthcare Providers and Facilities Can Remain Diligent The aptly named No Surprises Act (NSA), signed into law in December 2020 with an implementation deadline of January 1, 2022, is meant to help protect patients from financial hardship due to surprise medical bills. Such bills are often the result of patients receiving emergency or nonemergency services from providers that don’t participate in their health plan’s network. Patients become aware of… Blog June 28, 2022 New IT Audit Survey From Protiviti and ISACA Ranks Cybersecurity, Privacy, Data and Regulatory Compliance as Top Technology Challenges Where to even begin? An uncertain global economy, volatile geopolitical developments, a persistent pandemic, a changing regulatory landscape, and an evolving catalog of technology risk concerns have created mounting challenges for IT audit leaders and their functions. It is a real eye opener seeing the results of the latest IT Audit Technology Risks Survey from ISACA and Protiviti. One clearly… Blog June 29, 2022 A Hot Jobs Market Requires Organizations to Strengthen Talent Acquisition Strategies Fierce competition among organizations for too few workers has created a job seeker’s market. Unemployment has remained at a historically low rate of 3.6% since the end of April, and employers were seeking to fill 11.5 million job openings as of the end of April after hiring 6.7 million during the month. But for a temporary increase in unemployment due to the pandemic lockdowns, this is largely… Load More