Insight Search

Sort by:
  • Blogs

    June 17, 2024
    With the retirement of third-party data on the horizon, marketers need to adjust and strategise on the data and tools available to them to find their customers. In the new first-party data world, what the customer directly gives you is what you already know, giving them more control. Customers have embraced that control and seek transparent ways of sharing information, when they want and when it…
  • Podcast

    March 13, 2025
    In this episode, Protiviti Managing Directors Constantine Boyadjiev and Todd Pleune delve into the various use cases of AI and its future possibilities. They discuss strategies for leaders to cultivate a culture of curiosity that encourages teams to embrace AI effectively. Tune in to discover high-level machine learning opportunities and large language models that can enhance your daily business…
  • Blogs

    December 15, 2023
    An overwhelming majority of global business leaders—85%—expect their home country to be “cashless” within a decade, and nearly a third expect it will happen within the next five years, according to findings of the Protiviti-Oxford survey, “Executive Outlook on the Future of Money, 2033 and Beyond.”
  • Blogs

    April 26, 2024
    Today’s digital retail consumers have little tolerance for organisations that do not meet high customer service standards for accurate and timely fulfillment of orders. Transparent and real-time communications about order status have become an industry norm, which means that retailers need constant access to real-time data and inventory management tools to keep pace with customers’ expectations.
  • Podcast

    March 21, 2025
    In this VISION by Protiviti Interview, Michael Pang, APAC lead of Protiviti’s technology consulting practice, sits down with Carol Lee to discuss data security and privacy management and her experience leading enterprisewide security programs to support cloud and digital transformation strategy. Lee is Vice President of ISACA's China Hong Kong Chapter as well as the Deputy GM, Cybersecurity and…
  • Blogs

    May 3, 2024
    A well-thought-out Fiori spaces and pages approach establishes a foundation for a user-friendly and scalable design that supports a least-privilege access model. When incorporated with security best practices, spaces and pages provide an intuitive experience within the Fiori launchpad in alignment with a business user’s tasks and responsibilities. As SAP S/4HANA users increasingly transition to…
  • Insights paper

    May 20, 2025
    The proliferation of connected medical devices continues to introduce new cybersecurity risks that could impact patient safety and the security and privacy of patient data. To address these challenges, it is imperative that medical device manufacturers (MDMs) and healthcare delivery organisations (HDOs) collaborate effectively and prioritise medical device security (including design,…
  • Whitepaper

    November 18, 2022
    Environmental protection laws have been in place in many countries for more than 50 years.1,2 The United Nations Environment Programme (UNEP) and the International Criminal Police Organisation (Interpol) have highlighted the rise of environmental crime, its links to bribery and corruption, and its devastating impact on environments globally.3 But despite the strong connection to money laundering…
  • Blogs

    April 28, 2022
    Several Key Policies Take Effect March 31, 2022 On March 29, 2021, the Bank of England (BoE), the Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA) issued a series of policy statements to both refine and finalise their approach to operational resilience for financial services firms. Almost concurrent with the release of the policy statements, the Basel Committee on…
  • Podcast

    January 20, 2020
    Welcome to the new edition of Powerful Insights and our series on Cybersecurity Awareness. Protiviti has a series of webinars on cybersecurity awareness that, along with these accompanying podcasts, are intended to highlight ways organisations can be proactive in addressing these critical security challenges today. We explore how leaders can dynamically build cyber resilience while maximising…
Loading...