Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog December 14, 2021 How Zero Trust Can Defend Against Ransomware As the number of ransomware attacks rise, the failure of businesses to properly invest in cybersecurity tools, technologies and trained resources continues to become more prevalent. Not only do the ransom demands continue to increase but the average cost of ransomware recovery continues to skyrocket. Sophos research revealed that the average ransomware recovery costs are $1.85 million compared to… Blog December 16, 2021 Log4Shell Frequently Asked Questions In response to the Apache Log4Shell vulnerability, we have compiled a list of the most frequently asked questions we are receiving from clients and the strategies we are seeing pursued across the market. Protiviti is monitoring this event closely and will continue to update this blog post to reflect the most accurate information. Last update: 1/7/2022 What is Log4j? Log4j is a Java-based logging… Blog December 17, 2021 Establishing an Omnichannel Data Management Process Using SAP Information Steward SAP Information Steward is a web-based application that provides users with centralized environment to analyze, assess, categorize, monitor and improve the enterprise data quality. This tool consists of five core functionalities: data insight, metadata management, cleansing package builder and match review. In this article, we will go over the basic functionalities of each area, followed by our… Blog January 4, 2022 Preparing For a More Protected Union The United States federal government has been acting to strengthen its cyber defenses. The actions taken and planned will not only impose new compliance obligations on governmental bodies, but also on private sector technology and service providers that deal with the government — and for businesses that support these providers. Recently, we hosted a webinar entitled To Form a More Protected Union… Blog January 10, 2022 Don’t Let Technical Debt and Other Cybersecurity Risks Drag on M&A Do your homework. The age-old mandate has newfound relevance for CISOs, given the intense pace of mergers and acquisitions (M&A) and escalating cybersecurity risks. Global business consolidation activity is strong. The number of deals (and the combined value of those transactions) through the first three quarters of 2021 surpassed the number of deals (and the combined value of those… Blog January 12, 2022 What You Read Most: Top Five SAP Insights From 2021 As we move ahead into the new year, here are Protiviti’s most popular SAP insights from 2021. Our subject matter experts addressed many pressing issues, and the topics covered promise to remain important throughout 2022. The top five most-read pieces are listed below. #1. Common Pitfalls of ERP Implementations: A… Blog January 18, 2022 Becoming a CISO: If I Knew Then What I Know Now Throughout my career as both a CISO and a consultant serving CISOs in companies around the globe, I’ve learned that Chief Information Security Officers, regardless of their current title, reporting structure or how they got to the role, share many things in common; one of which being, they love to talk about their experiences. Recently, we gathered three of the most experienced CISOs I know to… Blog January 19, 2022 Get “Fancy” With Unlimited SAP GRC Reporting Integration of SAP SAC and other third-party reporting capabilities Based on our experience gained during many SAP governance, risk and compliance (GRC) implementations over recent years, we know that clients are always looking for more flexibility and visualizations to meet their internal reporting requirements. While SAP GRC provides comprehensive reports, these are table-based with limited… Blog January 26, 2022 Looking Forward: SBOM to Improve Responsiveness For the Next Log4Shell What is Log4Shell? On December 10, 2021, a vulnerability known as Log4Shell (CVE-2021-44228) was disclosed, related to a popular Java logging library (log4j). Log4Shell gained a lot of attention due to how simple it is to exploit, how pervasive Log4j is, and the potential level of access it can provide. Within a few days of being released, many companies discovered vulnerabilities in their… Blog January 31, 2022 CISOs and Year Two of the Pandemic – How Did We Adapt and What Still Must Change? In December 2021, in my role as president of the ISSA Delaware Valley Chapter, I had the honor of hosting a panel with five Chief Information Security Officers (CISOs), representing five different industries, each facing unique challenges presented by the global COVID-19 pandemic. The panelists included: Robert Younce - CISO of Mannington Mills, one of the world's leading manufacturers of fine… Load More