Results for “Risky Women” Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Whitepaper March 28, 2022 Risky Business: The Sanctions Challenges of Trade Finance As governments across the globe, including the EU, US, Canada, UK, Japan, Singapore and more, have imposed sanctions on Russia, with promises of additional action if Russia persists with its war on Ukraine, financial institutions and their customers are forced to review their trade and commodities transactions involving Russia to assess their legal and reputation risk. These reviews are… Solution and Industry Emerging Technologies Unternehmen müssen neue und innovative Technologien für sich nutzen, um am Markt bestehen zu können. Dafür benötigen Sie eine Strategie und einen Plan zur Implementierung Ihrer technologischen Unternehmensausrichtung.Wir helfen Ihnen, Business Cases zu identifizieren, in die richtigen neuesten Technologien zu investieren und Ihr Risiko- und Compliance-Management zu steuern. So werden Sie zum… Partner Catalyst Catalyst is a global nonprofit supported by many of the world’s most powerful CEOs and leading companies to help build workplaces that work for women. Catalyst provides holistic end-to-end solutions and equip companies with the strategy and tools they need to make change and measure impact at their organisations.To see how Protiviti engages with partners like Catalyst read our DEI Journey | For… Whitepaper December 17, 2024 Internal Audit Applications Of Machine Learning When analysing and addressing risks, internal audit functions deal with the analysis of large amounts of data. This is exactly where ML algorithms can be extremely helpful to identify hidden patterns and anomalies in the data. Isolating these most risky elements in a given audit area increases efficiency, effectiveness and overall risk coverage in the internal audit process.Modern developments in… Blog September 5, 2023 The High Cost of Gender Bias in Cybersecurity This post is the second in an occasional series about diversity in cybersecurity. Our first post discussed achieving diversity’s benefits in cybersecurity. In future posts, we’ll explore similar topics around diversity, equity and inclusion in the cybersecurity space. Any good manager will want to remain alert to impediments that prevent team members from contributing as fully as possible to… Blog February 11, 2020 Gender Diversity Can Aid Cybersecurity: CISO Panel Suggests Keys to Greater Female Participation It’s no secret that the current skills shortage is especially acute in the area of cybersecurity. A 2018 study by the International Information System Security Certification Consortium, or (ISC)², reported a shortage of nearly 3 million cybersecurity professionals globally, including a gap of roughly 500,000 trained staff in North America alone. And CIO/CTO respondents to Protiviti’s latest… Blog February 11, 2020 Gender Diversity Can Aid Cybersecurity: CISO Panel Suggests Keys to Greater Female Participation It’s no secret that the current skills shortage is especially acute in the area of cybersecurity. A 2018 study by the International Information System Security Certification Consortium, or (ISC)², reported a shortage of nearly 3 million cybersecurity professionals globally, including a gap of roughly 500,000 trained staff in North America alone. And CIO/CTO respondents to Protiviti’s latest Top… Whitepaper April 29, 2022 A crisis upon a crisis: Human trafficking of Ukrainian refugees The Ukrainian refugee crisis More than 5 million refugees – greater than 10% of the country’s population – have fled from Ukraine in the two months since the Russian invasion, about 90% are women and children. The number of refugees already rank the Ukrainian refugee crisis among the top five refugee crises in recent times, and there is no indication that the migration is ending. The… Blog April 15, 2025 Navigating CMMC Compliance Requirements with Microsoft For organizations doing business with the United States’ Department of Defense (DoD), the Cybersecurity Maturity Model Certification (CMMC) is a hot topic of conversation. CMMC ensures that Department of Defense (DoD) contractors and subcontractors implement robust cybersecurity measures to protect sensitive information, like Controlled Unclassified Information (CUI) and Federal Contract… Blog November 27, 2018 The Responsible Tech Firm Series Part 4: Corporate Social Responsibility Until fairly recently, companies rarely took public positions on anything but their products or services. That’s changing, particularly in the technology industry, as customers, shareholders and employees demand corporate social responsibility (CSR). Companies that want to build strong brands need to address CSR issues or face the prospect of losing investors, employees, and even the ability to… Load More