Insight Search

Sort by:
  • Whitepaper

    April 9, 2025
    The threats faced by financial institutions are vast, multi-faceted and constantly evolving. The industry has responded in kind, in part by investing in resilience capabilities that enhance their ability to recover from destructive attacks, including attacks that may lead to data loss or critical system unavailability. 
  • Flash Report

    October 4, 2019
    L’autorité de contrôle prudentiel et de résolution (ACPR) a publié ce 2 octobre un document d’analyse transversale concernant le pilotage consolidé du dispositif de lutte contre le blanchiment des capitaux et le financement du terrorisme (ci-après LCB-FT) des groupes bancaires et assurantiels. Ce document est une synthèse des actions de contrôles ciblés effectuées entre 2016 et…
  • Whitepaper

    October 8, 2018
    Sans surprise, l’évaluation des tiers se révèle une des mesures les plus complexes à mettre en œuvre dans le cadre de la mise en conformité avec la loi « Sapin 2 » (*). De nombreuses questions méthodologiques émergent à cette occasion, en parallèle des impacts organisationnels engendrés par la superposition de couches d’évaluations requises par d’autres textes règlementaires (Devoir de…
  • Flash Report

    October 7, 2019
    Le conseil d’orientation de la lutte contre le blanchiment de capitaux et le financement du terrorisme (COLB) a publié le 20 septembre son analyse nationale des risques (ANR) de blanchiment des capitaux et de financement du terrorisme (BC-FT) en France. Les principaux risques qui ressortent de ce rapport sont :Pour le blanchiment des capitaux :Les fraudes fiscales,…
  • Whitepaper

    August 29, 2023
    You need to learn not only about generative artificial intelligence’s potential uses for delivery and management of healthcare, but also about its capabilities to support internal audit activity. At the same time, you need to understand hazards associated with its use and develop your approaches to realizing generative AI’s potential while managing its risks.
  • Flash Report

    August 7, 2020
    Identifying and Recovering Excessive Billings From Landlords Issue Is your landlord complying with the financial aspects of your lease? Commercial leases are often structured to include ambiguous and complex cost terminology aligning with the landlord’s financial interest. On top of a base rent payment, these leases often include subsequent expenses that vary year to year, such as common area…
  • Client Story

    June 16, 2023
    A globally-recognized CRM provider engaged Protiviti to assist them in determining methods to better protect customer data while complying with each customer's unique regulatory requirements. The client needed an efficient method to perform configuration checks on AWS resources to ensure it would remain compliant with the HIPAA framework so that it could grow its footprint in the healthcare…
  • Newsletter

    October 18, 2021
    Informed organisations in all industries are establishing carbon emissions reduction and net-zero carbon emissions targets. Directors’ conversations on strategy have an important role in businesses’ energy transformations. Energy consumption is a priority. The introduction of renewables continues as costs decline. The percentage of electricity consumed through non-fossil fuel sources — solar,…
  • Newsletter

    November 13, 2024
    Almost every organisation around the world is trying to figure out what artificial intelligence (AI) offers and how to deploy it to move the business forward. A road map can help directors engage more effectively in these strategic conversations. With the emergence of generative AI (GenAI), organisations all over the globe are taking a close look at the tremendous promise AI offers in…
  • Whitepaper

    August 1, 2022
    The purpose of security analytics in an organisation Security metrics and the analysis of security information can be challenging concepts even for leading organisations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organisation’s security capabilities. If policies are the…
Loading...