Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs March 8, 2024 Know the Business Continuity Risks and Solutions When Investing in SaaS We often hear our clients ask what steps to take to develop a Software as a Service (SaaS) strategy for IT environments. Both the CIO and business owners recognise the benefits of SaaS solutions, which are readily available and often focused on a particular business need. SaaS products are becoming more popular, and usage is expected to grow at a double-digit rate in the coming years, driven by… Blogs August 5, 2024 Why sales transformations fail and critical steps to avoid common pitfalls In today’s virtual selling environment, revenue-aligned organisations must adopt a different mindset to drive successful sales transformations. Technology alone is not enough for successful digital transformation in sales; practical considerations and change reinforcement are crucial. Client Story November 5, 2024 Navigating Security and GRC Optimisation during an SAP S/4HANA Conversion Master navigating security and GRC optimisation during an SAP S/4HANA conversion for enhanced system reliability and advanced data insights. Podcast September 27, 2023 Regulation, risk and reward with HSBC’s Chief Compliance Officer, Asia Pacific Some of the key things that I see will be around digitalisation, open banking, artificial intelligence and robotics, workforce transformation, cyber security, and as mentioned, sustainable banking as well as regulatory technology. We're also already seeing an increase in regulatory complexity, and banks will need to invest significantly more, in my opinion, around regtech solutions. These… Blogs June 30, 2023 A house divided: Key differences in cybersecurity implementation for IT and OT This blog post was authored by Justin Turner - Director, Security and Privacy on the technology insights blog. Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll… Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Resource Guide February 5, 2025 A guide to the EU AI Act: Regulations, compliance and best practices As artificial intelligence (AI) continues its explosive growth within organizations around the world, with virtually every business function exploring opportunities to increase productivity, efficiency and revenue growth, a growing collection of regulations, standards and frameworks around the world is beginning to emerge. Among the most notable of these regulations is the European Union… Blogs March 26, 2025 CFOs’ Risk Outlook—The Economy, Cyber and Talent Are Top Concerns Economic conditions and inflationary pressures, followed by cyber threats and rising labor costs, are the top near-term concerns for finance chiefs, according to the 2025 Executive Perspectives on Top Risks global survey. Blogs May 15, 2023 Hyperbole, hype and hope? Trillions of reasons why the metaverse matters Ever since Steven Spielberg put the metaverse on the mainstream map in 2018 with his science-fiction adventure film, Ready Player One, based on Ernest Cline's novel of the same name, there has been a slow but steady drumbeat of momentum building around the potential and possibilities of this brave, new, immersive world. Sure, the metaverse had been talked about long before 2018, but once… Client Story May 23, 2024 Trusted Partnerships and Collaborative Efforts Drive Success in Data Privacy Initiatives We partnered with the client in building and maturing a data privacy program, including enhancing the company’s privacy rights process into a universal, globally scalable webform intake, 10+ custom workflows and an encrypted portal. Leveraged OneTrust autoblocking to establish baseline cookie compliance. Load More