Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper March 22, 2019 Data, Application & Infrastructure Security Risk Assessment Let’s explore the Iceberg!Understanding gaps in how your applications and infrastructure protect your data is a priority for both Operations and Executives.Application interface is only the tip of the IcebergApplication are interfaces used to access and process data (business or personal) and are only the visible part of a more complex IT landscape. Whitepaper March 22, 2019 Evaluation de la Sécurité des Données, des Applicatifs et des Infrastructures L’interface applicative n’est que la partie émergée de l’iceberg!Comprendre les défaillances des environnements applicatifs et des infrastructures doit être une priorité pour les intervenants opérationnels ainsi que pour le management.Les applications sont des interfaces d’accès et de traitements des données (métiers, personnelles, …) et ne sont que la partie visible d’un Système d’Information (… Whitepaper May 28, 2024 DORA Compliance: Untangling Key Hurdles to Implementation The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final industry compliance required by 17 January 2025. The regulation underscores the importance of digital operational resilience in today’s increasingly interconnected and digitized landscape and seeks to expand the reach of European regulators incorporating… Newsletter March 31, 2025 Technology Insights Welcome to December issue of Technology Insights. Explore new webinars, videos, blogs, podcasts and much more. Video September 3, 2020 Cyber Risk Quantification FAQs Cyber risk quantification (CRQ) uses industry leading and highly vetted probabilistic models to more accurately describe the cyber security and technology-based risks facing an organisation. Tune in to Protiviti's subject matter experts answer 15 frequently asked questions about CRQ. Whitepaper May 20, 2021 New Executive Order Aims to Shore Up U.S. Cybersecurity Defenses A Primer for Federal Government Contractors On May 12, 2021, President Joe Biden signed an Executive Order (EO) to improve the United States’ cybersecurity and protect federal networks. Following the SolarWinds breach and, most recently, the Colonial Pipeline ransomware attack, the EO is the most recent action in the Biden administration’s plan to overhaul U.S. cybersecurity… Whitepaper September 2, 2021 Towards an Identity-Centric Security Strategy Cyber attacks are rampant Let’s face it, cyber security professionals are not faring well against the increasing sophistication of attacks by hackers. According to the 2020 Verizon Data Breach Investigations report, the world witnessed a challenging year with a whopping 96% increase in successful data breaches against U.S. companies and government agencies as compared to 2019. Cyber attacks… Flash Report March 3, 2021 Virginia Becomes the Second State to Enact Consumer Privacy Law The Commonwealth of Virginia passed the Consumer Data Protection Act (CDPA) into law on March 2, 2021, following overwhelming bipartisan support for a state consumer privacy law. The November 2020 election results provided the much needed impetus to strengthen consumer privacy for the Commonwealth of Virginia. State officials wasted no time in introducing the privacy bill. Now that the… Whitepaper June 1, 2022 How can an enterprise use access management to establish a Zero Trust environment? A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management programme is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based… Infographic June 3, 2024 Infographic | SIFMA’s Quantum Dawn VII Quantum Dawn VII is the latest iteration of SIFMA's biannual cybersecurity exercise focused on the outage of a critical third-party service provider (CTP). The simulation and concluding survey found many financial institutions are already experienced with the loss of CTPs, with protocols established for managing the outage. With such outages increasingly commonplace and regulators holding firms… Load More