Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog May 21, 2021 SAP GRC and Security Design Nuances for SAP Utilities As any current or former employee at a utilities company can attest, there are nuances to systems and applications used to run the business. This applies whether it’s a power company, gas company, water company, waste treatment company or any other utility. Utilities companies that run SAP are no exception, as they very likely leverage SAP’s Industry Specific – Utilities (IS-U) product to support… Blog May 24, 2021 CISO NEXT Industry Focus: Consumer Products and Retail Emerging from an unprecedented year that presented arduous hurdles to overcome, consumer products and retail companies confront a formidable cluster of unique information security challenges. Overcoming these obstacles requires CISOs to do more than ply their technical proficiency. They also need to elevate their communications and creative problem-solving skills. Crafting and marketing a… Blog May 25, 2021 People: A Forgotten Element of Technology Transformation In today’s rapidly evolving business world, the lines between technology and business have blurred. Organizations need to modernize and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s… Blog May 26, 2021 Properly Prepping Data for SAP S/4HANA As part of an organization’s SAP S/4HANA journey, or really any enterprise system implementation project, the lack of attention paid to data is an all-too-common pitfall. While it is understandable that project teams focus the majority of their attention on the functional build and testing requirements that are typically core to a program’s success, the lack of attention on data can - and usually… Blog May 27, 2021 E-Commerce Boom Heightens Privacy Risks, Creates Opportunity for Retailers to Enhance Data Practices At no time in history has customer data and privacy protection been a greater concern for consumers, businesses and regulators alike than in the current pandemic environment. The massive shift to online commerce and contactless payments that began in early 2020 spurred by confinement measures to contain the spread of COVID-19 has dramatically escalated security and privacy risks associated with… Blog June 1, 2021 SAP Analytics Cloud Planning and Group Reporting are the Next Generation of Planning and Consolidation Business Planning and Consolidation (BPC) has long been SAP’s flagship product for planning and consolidation. With SAP’s market strategy of going to the cloud, SAP Analytics Cloud (SAC) Planning and Group Reporting are now the preferred platforms over BPC. One of the strengths and value propositions of BPC was to have one integrated solution for consolidations and planning. At first glance, it… Blog June 2, 2021 Effective Cybersecurity is Essential as Cyber Threats Expected to Continue Over Next Decade In today’s rapidly evolving business world, the lines between technology and business have blurred. Organizations need to modernize and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s… Blog June 3, 2021 Application Modernization without Disruption Plenty of businesses are just fine with home-grown code. Various developers may have contributed to the code base, as reflected in its varying quality and style. Architectures might also be older: a system may run on a thick client or even a mainframe. Some leaders already recognize the advantages of application modernization, but they are daunted by the scope of potential changes it will… Blog June 4, 2021 How to Integrate Threat and Vulnerability Management into Security Operations In today’s cybersecurity threat landscape with its ever-growing volume of incidents, it is remarkable to think that proactive threat and vulnerability management remains a challenge for companies to address effectively. Organizations are adopting threat exposure management techniques to manage business risks stemming from developing and applying technology such as Internet of Things (IoT)… Blog June 7, 2021 Managing IoT for Data Privacy On March 9, 2021, Bloomberg reported hackers had accessed videos and data from thousands of security cameras in an event now known as the Verkada breach. Our first post about the incident covered the importance of end-to-end Internet of Things (IoT) security; this post takes a deeper look at IoT data privacy risk and suggests how purchasing organizations can mitigate it. It’s worth considering… Load More