Insight Search

Sort by:
  • Client Story

    April 19, 2024
    Protiviti partnered with a rural lifestyle retailer client to assess its Customer Identity and Access Management (CIAM) program and architecture. 
  • Newsletter

    December 19, 2024
    As we enter the new year, the financial services industry once again faces compliance risks that are increasingly diverse and complex. For 2025 we asked a larger-than-usual group of Protiviti colleagues across the globe to help identify the most pressing compliance issues in their market. Artificial intelligence, financial crime, privacy and security, operational resilience, third party risk…
  • Client Story

    April 9, 2021
    Data privacy has become a strategic priority as companies adapt to comply with rapidly proliferating data privacy laws. Recent years have seen the adoption of the European Union’s General Data Protection Regulation (GDPR), the more recent California Consumer Protection Act (CCPA), and similar regulations. These safeguards require companies to document the types of protected personal data used in…
  • In Focus

    October 17, 2024
    As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security of its national defense supply chain: The Cybersecurity Maturity Model Certification (CMMC) Programme. The new rule, published Oct. 15, marks a significant step towards enhancing cybersecurity across the Defense Industrial Base (DIB).
  • Survey

    March 29, 2023
    Technology leaders are exploring new ways to drive innovation and maximise the value of IT in a changing world driven by disruption and a need for acceleration Executive Summary Innovation is the name of the game in today’s global market. Recognising this new reality, CIOs, CTOs, CISOs and other technology executives and leaders are exploring new ways to fuel innovation throughout their…
  • Whitepaper

    October 22, 2020
    Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt…
  • Newsletter

    March 31, 2025
    Welcome to December issue of Technology Insights. Explore new webinars, videos, blogs, podcasts and much more.
  • Whitepaper

    March 28, 2022
    Travail à distance, cyber attaque, guerre asymétrique, fuite de données : les enjeux de la cyber sécurité sont de plus en plus importants. Certes, les investissements au sein des entreprises sont réels mais les attentes du management et des parties prenantes internes et externes sont de plus en plus présentes et les réponses attendues pour les actifs clés se doivent d’être relativement binaires,…
  • Whitepaper

    March 22, 2019
    Let’s explore the Iceberg!Understanding gaps in how your applications and infrastructure protect your data is a priority for both Operations and Executives.Application interface is only the tip of the IcebergApplication are interfaces used to access and process data (business or personal) and are only the visible part of a more complex IT landscape.
  • Whitepaper

    March 22, 2019
    L’interface applicative n’est que la partie émergée de l’iceberg!Comprendre les défaillances des environnements applicatifs et des infrastructures doit être une priorité pour les intervenants opérationnels ainsi que pour le management.Les applications sont des interfaces d’accès et de traitements des données (métiers, personnelles, …) et ne sont que la partie visible d’un Système d’Information (…
Loading...