Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Podcast April 18, 2022 Podcast | The Promise of Blockchain in Supply Chain Management In this 14-minute podcast, Protiviti Managing Directors Bernie Donachie and Ed Page discuss the applications and promise of blockchain in managing supply chains. Whitepaper October 8, 2020 Next Gen Now – The Intelligent Automation Opportunity for Airlines IntroductionAirlines, like many businesses, have been expanding their use of intelligent automation in recent years. They’re combining automation technologies like robotic process automation (RPA) with artificial intelligence (AI) to rethink their operations, innovate and create value. However, because many of these initiatives have been viewed more as aspirational experiments than critical… Leadership Michael Porier Michael Porier is a Managing Director in the Houston office and is one of the founding members of Protiviti since 2002. Michael is the Lead for the local Cybersecurity Practice, National Lead for the Government Industry Cybersecurity Program, and is one of firms Subject Matter Experts for Cyber Resilience and Business Continuity solutions, overseeing related assessments and remediation… Leadership Muazzam Malik Muazzam has 20+ years of experience in partnering with clients to design, implement, and transform security programs, and solve complex cybersecurity and data privacy challenges. Muazzam is known for his methodical approach to building sustainable security solutions for tactical and strategic problems. Major Projects Muazzam has served as the lead QSA on numerous PCI DSS report on compliance… Leadership Paul Kooney Paul is a Managing Director with over 25 years of experience in both the public and private sectors focused on innovative third-party risk management program development, payment card industry security, and cybersecurity and privacy compliance. Paul is a member of the Shared Assessment Steering Committee where he is the current Chair and helps lead and contribute to the development of third-party… Leadership Jacob Iley Jacob is a Managing Director with 20 years of experience in strategic cybersecurity program development and transformation, risk assessments, regulatory and industry compliance, and cybersecurity and privacy assessments. Jacob serves global clients across various industries, specialising in the healthcare, consumer products, and technology industries. Leadership Dan Hansen Dan is a Managing Director in Protiviti's IT Consulting Practice and leads the Security & Privacy practice in the San Francisco Bay Area. He has over 16 years of IT process and risk management experience and has led numerous IT engagements, focusing on information security, outsourced and co-sourced internal audit support, Payment Card Industry (PCI) assessments, disaster recovery and… Leadership Nick Britton Nick is a Managing Director in Protiviti’s Technology Consulting practice who focuses on assisting organisations in proactively identifying vulnerabilities and risks through targeted technical testing. Nick leads Protiviti’s Attack & Penetration practice in defining testing methodology and developing solutions to support organisations in performing assessments and building strategy in… Leadership Tom Stewart Tom is a Senior Director leading the global delivery of Protiviti’s Attack and Penetration practice. Tom and his team assist clients in performing network penetration testing, web application penetration testing, and advanced red team engagements. Tom has deep skills and knowledge in network and application security as well as well-known standards and regulations. Leadership Mike Ortlieb Mike is a Senior Director in Protiviti’s Orlando Technology practice. He has over 18 years experience in the Information Security field. At Protiviti, Mike leads the threat hunting / proactive breach assessment practice and oversees client engagements related to information security program management, compliance, and technical security assessments. This includes vulnerability… Load More