Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Infographic June 3, 2024 Infographic | SIFMA’s Quantum Dawn VII Quantum Dawn VII is the latest iteration of SIFMA's biannual cybersecurity exercise focused on the outage of a critical third-party service provider (CTP). The simulation and concluding survey found many financial institutions are already experienced with the loss of CTPs, with protocols established for managing the outage. With such outages increasingly commonplace and regulators holding firms… Podcast September 22, 2025 FPS Podcast | CMMC Rule is Out - What Contractors Must Know With DOD Contracts On September 10th, 2025 the "CMMC Final Rule" was published in CFR48. After about seven years of starts and stops, determining Level classifications, the number of controls and compliance needed, CMMC certification is now set to be in certain DOD contracts starting November 10th. Cost of compliance has varied greatly, but when dealing with FCI and CUI data, this certification will protect that… Newsletter March 15, 2022 Private Equity Insights: Top Risks for 2022 In this issue of Private Equity Insights, we take a deep dive into the top risk issues facing companies owned by private equity (PE) in 2022 and over the next 10 years. These insights were obtained from our 10th annual survey of top risks by Protiviti and NC State University’s ERM Initiative.Of the global boards of directors and executives surveyed, respondents from PE-owned company… Client Story April 9, 2021 Global Chocolatier Adopts Privacy Technology to Prevent Data Exposure Data privacy has become a strategic priority as companies adapt to comply with rapidly proliferating data privacy laws. Recent years have seen the adoption of the European Union’s General Data Protection Regulation (GDPR), the more recent California Consumer Protection Act (CCPA), and similar regulations. These safeguards require companies to document the types of protected personal data used in… Survey March 29, 2023 The Innovation vs. Technical Debt Tug of War Technology leaders are exploring new ways to drive innovation and maximise the value of IT in a changing world driven by disruption and a need for acceleration Executive Summary Innovation is the name of the game in today’s global market. Recognising this new reality, CIOs, CTOs, CISOs and other technology executives and leaders are exploring new ways to fuel innovation throughout their… Whitepaper October 22, 2020 How Firms Can Tackle Technology Risk Blind Spots to Build Resilience Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt… Whitepaper March 21, 2023 Mitigating crypto sanctions evasion risk in financial institutions The Financial Action Task Force (FATF) has long warned that criminals leverage virtual assets not only for predicate or money-laundering offenses but also to evade financial sanctions and raise funds to support terrorism. Even so, the number of recent headlines about criminal activity and sanctions evasion in the crypto industry is alarming. Cryptocurrency-based crime hit an all-time high of $20.… Whitepaper March 28, 2022 Urbanisation des activités du RSSI Travail à distance, cyber attaque, guerre asymétrique, fuite de données : les enjeux de la cyber sécurité sont de plus en plus importants. Certes, les investissements au sein des entreprises sont réels mais les attentes du management et des parties prenantes internes et externes sont de plus en plus présentes et les réponses attendues pour les actifs clés se doivent d’être relativement binaires,… Whitepaper March 22, 2019 Evaluation de la Sécurité des Données, des Applicatifs et des Infrastructures L’interface applicative n’est que la partie émergée de l’iceberg!Comprendre les défaillances des environnements applicatifs et des infrastructures doit être une priorité pour les intervenants opérationnels ainsi que pour le management.Les applications sont des interfaces d’accès et de traitements des données (métiers, personnelles, …) et ne sont que la partie visible d’un Système d’Information (… Whitepaper March 22, 2019 Data, Application & Infrastructure Security Risk Assessment Let’s explore the Iceberg!Understanding gaps in how your applications and infrastructure protect your data is a priority for both Operations and Executives.Application interface is only the tip of the IcebergApplication are interfaces used to access and process data (business or personal) and are only the visible part of a more complex IT landscape. Load More