Insight Search

Sort by:
  • Insights paper

    October 8, 2024
    Creating and maintaining a sustainable PCI DSS compliance program is a crucial and complex task for organisations to protect payment card transactions and uphold consumer trust. However, despite the PCI DSS standard being around for almost 20 years, many organisations still struggle to achieve and validate compliance with it.In April 2016, the PCI Security Standards Council (SSC) introduced the…
  • Podcast

    May 22, 2025
    Carol Beaumier hosts Risky Women Radio and leads a compelling conversation with guest Dame Inga Beale. Together, they explore the challenges of leading companywide transformation programs, and the leadership skills needed to drive meaningful change. The discussion also touches on how leadership must evolve to meet future demands, how to navigate and overcome bias in the workplace, and Dame Inga’s…
  • Client Story

    July 12, 2018
    Even under normal conditions, creating a global supply chain capability from scratch is a complex and grueling endeavor. When a large U.S. retailer made a strategic decision to develop this ability — which included securing new overseas suppliers for tens of thousands of products, satisfying all customs requirements and creating a nationwide distribution capability — in less than six months, the…
  • Newsletter

    October 9, 2024
    Risk reporting to the board may not be fit for purpose in these uncertain times. Directors are trending toward expecting more dialogue, engagement and forward-looking insights based on relevant data and information. A principled approach would help.Boards and their companies face a constant and seemingly unending state of flux in the marketplace. Emergence of the unexpected is the norm. For…
  • Whitepaper

    July 14, 2025
    When we published our 2025 compliance priorities for financial services companies last December, we acknowledged that for a variety of reasons, understanding and managing compliance risks this year would be a true test of the industry’s commitment and acumen. Among factors adding to the challenge this year, we noted the rapid pace of technological advancement, geopolitical tensions, and diverging…
  • Podcast

    May 14, 2025
    Post-quantum cryptography is rapidly moving from the realm of NIST standards to running in production. The threat of quantum computing advances and coming regulations are driving this acceleration. One major component on the PQC migration plan for companies is VPN. In this episode we look at the Ambit corporate VPN client, which uses a standardised NIST PQC cipher: ML-KEM. Did you know there are…
  • In Focus

    November 4, 2024
    During National Cybersecurity Month in October, both the New York State Department of Financial Services (DFS) and the Biden administration issued releases on the opportunities and risks of artificial intelligence (AI). The DFS’s Industry Letter focuses on the impact of AI on the cybersecurity landscape while the Biden administration released the first-ever National Security Memorandum (NSM) on…
  • Survey

    April 17, 2025
    The higher education sector is contending with significant challenges. Rapid regulatory changes and declining enrolments due to demographic shifts and competition are creating uncertainty. The need for technological integration, increased governmental scrutiny on institutional practises, and financial instability due to tuition discounting are further complicating the landscape. Additionally,…
  • Whitepaper

    March 31, 2025
    Chief Compliance Officers (“CCOs”) are facing uncertain times due to a combination of factors that challenge the stability and predictability of their operating environments. These factors include geopolitical tensions; rapidly shifting political and regulatory agendas that are resulting in less uniform approaches across the globe; budget and headcount restraints; evolving business models; the…
  • Podcast

    July 24, 2024
    The migration to post-quantum cryptography (PQC) is about to begin and is necessary to protect against the threats of fault-tolerant quantum computing. However, critical assets like those in military, banking, and government environments also require other layers of security and strategies such as zero trust and increased encryption bit sizes. Join host Konstantinos Karagiannis as he discusses a…
Loading...