Results for Search Submit Filter by: Advanced Filter All results Solutions Industry People Client Story Insights/Blogs Filter Partner Tenable Tenable is a leader in exposure management, helping organisations understand and reduce cyber risk across their entire attack surface. Their platform delivers continuous visibility, prioritisation and remediation insights.Protiviti partners with Tenable to help clients build proactive cybersecurity strategies rooted in visibility and risk alignment. Together, we deliver solutions that strengthen… Blog August 11, 2021 In Mergers and Acquisitions, ESG Issues Are Becoming a Growing Factor To date, companies have often discussed environmental, social, and governance (ESG) factors from a qualitative perspective – reflecting on the company’s stated values, marketing communications and other statements. But today, almost 90% of M&A targets are only being acquired after a thorough review of their ESG quantitative performance, indicating that buyers are becoming increasingly… Blog May 5, 2021 The Post-Quantum World: A New Protiviti Podcast Series Explores the Exciting New World of Quantum Computing Quantum computing capabilities are exploding, causing disruption and opportunities, but many technology and business leaders don’t understand the impact this technology will have on their business. Protiviti has launched a bi-weekly podcast, The Post-Quantum World, as we discuss hot topics and the business impacts, benefits and threats of this exciting new capability. In each episode, hosted… Blog May 6, 2021 Slow Adoption of Next-Gen Internal Audit Technologies and Skills Poses Risk to Companies, New Protiviti Survey Finds According to Protiviti’s 2021 Next-Generation Internal Audit Survey, most of the chief audit executives (CAEs) and senior internal audit leaders surveyed reported that their teams are still in the early stages of, or have yet to embark on, their next-gen internal audit journeys. However, amidst the digital acceleration perpetuated by the COVID-19 pandemic and as internal audit teams face a more… Blog May 11, 2021 Don’t Bore the Board: 5 CISO Hacks for Highly Effective Presentations Several years ago, we invited board members to speak candidly about presentations from company executives. Those free-flowing conversation more than lived up to what was billed as a “Don’t Bore the Board” panel discussion. The panel members’ engaging insights remain instructive to chief information security officers (CISOs) today as security leaders strive to hone their increasingly… Blog May 12, 2021 SEC Guidance on SPAC Warrants: More Than a Financial Statement Consideration On April 12, 2021, the U.S. Securities and Exchange Commission (SEC) issued a staff statement regarding the financial reporting considerations for warrants issued by special-purpose acquisition companies (SPACs). This new guidance advises that warrants that lack an embedded feature (specifically, those that are options to purchase shares at a predetermined price within a defined time period)… Blog May 14, 2021 Flash Report: President Biden Executive Order to Strengthen U.S. Cybersecurity Will Impact Federal Agencies and Public and Private Organizations On May 12, President Joe Biden issued the Executive Order on Improving the Nation’s Cybersecurity. This executive order (EO) is the most recent action by the administration to strengthen U.S. national cyber defenses and address cybersecurity threats and attacks that continue to grow in magnitude, impact and frequency. It is intended to protect networks in the federal, public and private… Blog May 18, 2021 There’s a Culture Shift Happening in Medical Device Manufacturing. Are CISOs Ready? There’s a fundamental sea change happening in the medical device security world. Driven by the increasing threats of cyberattacks, corporate competition, and the ever-growing need to protect the massive volumes of valuable patient data, chief information security officers (CISOs) are rethinking how they defend against these evolving challenges.… Blog May 19, 2021 Vulnerability Management for Manufacturers: Don’t Wait for an Event to Trigger a Response; Start Building a Program Today When Verizon released its Data Breach Investigations Report (DBIR) last May, it found 381 of the 3,950 data breaches confirmed in the prior year occurred in manufacturing businesses. Hackers’ motivations were largely financial, although espionage played a part as well. Nearly a quarter of incidents in manufacturing involved ransomware, which is especially damaging to those needing highly… Blog May 20, 2021 E-Commerce Boom Heightens Privacy Risks, Creates Opportunity for Retailers to Enhance Data Practices At no time in history has customer data and privacy protection been a greater concern for consumers, businesses and regulators alike than in the current pandemic environment. The massive shift to online commerce and contactless payments that began in early 2020 spurred by confinement measures to contain the spread of COVID-19 has dramatically escalated security and privacy risks associated with… Load More