Blog library

A collection of Protiviti blogs. 

Blogs

May 17, 2024

Inclusive culture starts with contract language

Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in responses. Over the past several years, more and more potential customers are seeking cybersecurity partners whose values in the areas of diversity, equity and inclusion (DEI) correspond with their own....
The shift to new in-office, work-from-home and hybrid working models is leading many organisations to reexamine their compensation and benefits strategies to support cultural objectives and attract talent.
DevOps is dead – or so the story goes. This statement is echoed more and more these days, much to the dismay of the DevOps faithful, however technologists need to be careful to read between the lines. DevOps is most certainly NOT dead. DevOps is more alive than ever, although the connotation of the term DevOps continues to evolve. The key point remains: as software development teams move past legacy methodologies…
Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in responses. Over the past several years, more and more potential customers are seeking cybersecurity partners whose values in the areas of diversity, equity and inclusion (DEI) correspond with their own. Sometimes, enterprises will provide examples of non-…
An SAP S/4HANA transformation project has many risks that need to be managed and often, it is difficult for the project team operating day to day on detailed tasks to “see the forest for the trees.” The PMO has intimate knowledge of the key processes and risks associated with the project and, as such, is in an ideal position to develop mitigation strategies in collaboration with the system integrator and the…
These turbulent times of evolving threats and rising personal responsibility considerations for cybersecurity leaders make the CISO role a challenging but rewarding position. The CISO must contend with an increasing sophistication of attacks, potential geopolitical adversaries and the material impact cybersecurity can have on organisational value. Whether it’s a new CISO or a seasoned cybersecurity executive, the…
Building technology resilience is a continuous process. Technology resilience programs call for diligent monitoring, constant adaptation to evolving threats and continual evolution to respond to a shifting threat landscape. To begin with, they require a strong business case and well-articulated benefits to secure executive commitment and program funding. Then, continuous advancement of technology resilience…
A well-thought-out Fiori spaces and pages approach establishes a foundation for a user-friendly and scalable design that supports a least-privilege access model. When incorporated with security best practices, spaces and pages provide an intuitive experience within the Fiori launchpad in alignment with a business user’s tasks and responsibilities. As SAP S/4HANA users increasingly transition to the Fiori landscape,…
Replacing a C-suite executive or high-potential employee can be costly. Yet many organisations’ leadership development and succession programs are hamstrung by inadequacies that can lead to damaging talent loss.
Today’s digital retail consumers have little tolerance for organisations that do not meet high customer service standards for accurate and timely fulfillment of orders. Transparent and real-time communications about order status have become an industry norm, which means that retailers need constant access to real-time data and inventory management tools to keep pace with customers’ expectations.
The role of a cyber incident responder is more critical than ever as these professionals are tasked with protecting organisations from cyber threats, mitigating risks and minimising the impact of security incidents. As cyber threats continue to proliferate, targeting organisations of all sizes and sectors, it is imperative for cyber incident response (CIR) teams to be well prepared at mitigating threats. One of the…
Loading...