Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper May 2, 2023 Retail and CPG Companies Accelerate Innovation Amid Regulatory Pressures, Resistance to Change Most consumer packaged goods (CPG) and retail companies recognize the urgency of innovation. At the same time, their information technology (IT) leaders also are concerned about obstacles such as regulatory and compliance pressures, difficult economic conditions, and resistance to change undermining their innovation objectives. Client Story May 9, 2024 Mastering Compliance and Efficiency with SAP GRC Access and Process Control Elevate compliance and efficiency with SAP GRC implementation by Protiviti. Streamline access control and process management for seamless operations. Whitepaper October 22, 2024 Establishing a scalable AI governance framework Establishing an AI governance structure paves the way for effective management and measurement of AI solutions, fostering innovation while mitigating risk. In Focus July 23, 2024 Will CrowdStrike serve as a reboot on tech resiliency? Global IT systems are still in reboot and recovery after a software update by cybersecurity vendor CrowdStrike caused a massive worldwide outage of Windows computers. Global businesses, governments and organisations were impacted across several industries, including airlines, banks, telecommunications, and healthcare. While the dust settles on the specifics of the how and the why of the global… Whitepaper April 2, 2024 Enabling Enterprise AI Adoption Through Next-Generation Governance Artificial intelligence (AI) has become increasingly important in the enterprise, thanks in part to the rise of generative AI (GenAI). While not a new technology or concept, AI (including machine learning) holds tremendous promise to transform various business functions and activities worldwide — from accounting and finance to cybersecurity, customer experience and more. In boardrooms and C-suite… Client Story June 16, 2023 Leading Biotechnology Company Enhances AWS Environment Security and Risk Control A leading biotechnology company that develops life-transforming medicines has worked for decades to improve the lives of those who rely on their work. But recently, they found themselves in need of assistance to enhance the security of their AWS environment. Client Story June 16, 2023 Blockchain/Web3 Startup Blocks Gaps and Improves AWS Security Posture A blockchain/web3 startup engaged Protiviti to review their AWS environment. While getting the product to market as fast as possible was a primary goal for the client, security was an afterthought in many scenarios. To address this need and prevent a potential catastrophic security event, the client wanted a quick and consistent way to understand where their security gaps were and how they could… Survey March 29, 2023 The Innovation vs. Technical Debt Tug of War Technology leaders are exploring new ways to drive innovation and maximise the value of IT in a changing world driven by disruption and a need for acceleration Executive Summary Innovation is the name of the game in today’s global market. Recognising this new reality, CIOs, CTOs, CISOs and other technology executives and leaders are exploring new ways to fuel innovation throughout their… Whitepaper March 28, 2022 Urbanisation des activités du RSSI Travail à distance, cyber attaque, guerre asymétrique, fuite de données : les enjeux de la cyber sécurité sont de plus en plus importants. Certes, les investissements au sein des entreprises sont réels mais les attentes du management et des parties prenantes internes et externes sont de plus en plus présentes et les réponses attendues pour les actifs clés se doivent d’être relativement binaires,… Whitepaper March 22, 2019 Data, Application & Infrastructure Security Risk Assessment Let’s explore the Iceberg!Understanding gaps in how your applications and infrastructure protect your data is a priority for both Operations and Executives.Application interface is only the tip of the IcebergApplication are interfaces used to access and process data (business or personal) and are only the visible part of a more complex IT landscape. Load More