Results for “Quantum Computing” Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog September 18, 2024 The Economist’s Dexter Thillien: Privacy in peril amid digital data explosion "When we’re talking about biometric data and biometric computing it raises a question of what type of data we might be sharing. When it is possible to change an email address or even your financial or other details, it is impossible to change your fingerprint or your DNA." "I still don’t think that self-regulation is the answer. While I mentioned the GDPR might not be as well enforced as it… Whitepaper October 22, 2020 How Firms Can Tackle Technology Risk Blind Spots to Build Resilience Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt… Leadership Mike Ortlieb Mike is a Senior Director in Protiviti’s Orlando Technology practice. He has over 18 years experience in the Information Security field. At Protiviti, Mike leads the threat hunting / proactive breach assessment practice and oversees client engagements related to information security program management, compliance, and technical security assessments. This includes vulnerability… Flash Report May 14, 2021 President Biden executive order to strengthen U.S. Cybersecurity will impact federal agencies and public and private sector organisations On May 12, President Joe Biden issued the Executive Order on Improving the Nation’s Cybersecurity. This executive order (EO) is the most recent action by the administration to strengthen U.S. national cyber defenses and address cybersecurity threats and attacks that continue to grow in magnitude, impact and frequency. It is intended to protect networks in the federal, public and private… Blog January 23, 2024 What You Read Most: Top Five SAP Insights from 2023 Over the past year, our leading experts came together to address some of the hot topics in the SAP space. Here are Protiviti’s most popular SAP insights from 2023 as we kick off the new year. We anticipate these topics will remain important for your success in 2024. #1. Lessons Learned: Shell Conversion to SAP BW Bridge for SAP Datasphere By: Jacintha Anandaraj In the modern digital era,… Whitepaper April 25, 2022 Human v. machine: Tackling artificial intelligence risks in financial institutions In the novel Tell the Machine Goodnight, Katie Williams tells the story of Pearl, a technician for Apricity Corporation, which has developed a machine that “uses a sophisticated metric, taking into account factors of which we are not consciously aware,” and with 99.7% accuracy, offers recommendations for what will make people happy. Does this narrative provide a glimpse into our future? Will… Whitepaper April 29, 2022 Building Resilience in the Cloud In 2019, AFME published its first paper on the adoption of public cloud in capital markets[1]. Since then, the adoption of cloud has continued to progress, along with focus from policymakers and regulators. Though the use of cloud and Cloud Service Providers (CSPs) offers a significant uplift in resilience and security compared to banks' on-premise environments, the regulatory focus continues to… Blog July 1, 2020 Beyond Business Continuity Management: Building Resilience for Extreme but Plausible Events in a Post-COVID-19 World The concept of an extreme but plausible event is a moving and expanding target. Over time, our thinking on what can be deemed implausible or improbable will continue to evolve. The magnitude of impact from real events will reshape our view of what today is considered extreme. It is true that organizations and their business continuity management (BCM) teams often contemplate scenarios that are… Newsletter May 3, 2022 Ransomware: Preventing an Attack and Responding to and Recovering From an Attack Ransomware attacks have been around for many years. In the past, cyber-threat actors would penetrate a company’s computer and network systems and obtain data with the objective of returning it upon payment. The demanded payments were usually smaller than the ransoms requested in recent incidents. Most of these incidents weren’t financially material, nor were they reported publicly. By contrast,… Landing Page Powerful Insights Load More