Insight Search

Sort by:
  • Blogs

    April 13, 2021
    Cybersecurity, Privacy, Data and Resilience Dominate the Top Technology Challenges for Energy and Utilities Organisations.
  • Survey

    February 15, 2024
    Chief financial officers (CFOs) have a unique vantage point regarding talent management, one that explains why the ability to attract, develop and retain top talent represents their top risk concern in both 2024 and 2034.
  • Newsletter

    December 19, 2024
    As we enter the new year, the financial services industry once again faces compliance risks that are increasingly diverse and complex. For 2025 we asked a larger-than-usual group of Protiviti colleagues across the globe to help identify the most pressing compliance issues in their market. Artificial intelligence, financial crime, privacy and security, operational resilience, third party risk…
  • Blogs

    October 14, 2024
    From personal digital assistants to autonomous vehicles, artificial intelligence (AI) is revolutionising how we interact with technology and each other. Amidst this landscape, Microsoft Copilot and Open AI’s ChatGPT stand at the forefront, harnessing transformative technologies such as Generative Pretrained Transformers (GPT) and Large Language Models (LLM). 
  • Podcast

    March 13, 2024
    In this special edition of the Protiviti Legal Perspectives podcast series, we delve into the complexities of new data protection and cybersecurity government regulations in the defense industry with Alex Alexander W. Major, Partner, McCarter & English and Perry Keating, President of Protiviti Government Services. The Cybersecurity Maturity Model Certification (CMMC) was recently promulgated…
  • Blogs

    January 31, 2024
    Data is the lifeblood of today’s digitally transformed business environment and is growing rapidly as it is estimated that 90 percent of the world’s existing data was created in the last two years alone. With such rapid growth, simply understanding the context of what data is important to keep, classifying that data and organising it into a useful form cannot happen without the support of…
  • Flash Report

    December 14, 2020
    On December 13, 2020, the Cybersecurity & Infrastructure Security Agency (CISA) issued an emergency directive detailing required action for federal agencies to mitigate the threat of the recently discovered compromise involving SolarWinds® Orion® Network Management products that are currently being exploited by malicious actors. (Read the SolarWinds Security…
  • Client Story

    October 21, 2024
    Protiviti and OneTrust helped a global software and IT solutions provider enhance its consent management processes, ensuring regulatory compliance. 
  • Blogs

    September 4, 2024
    When approaching an ERP implementation, the topic of security is going to be broached and the question then becomes, “now or later?” Before discussing the considerations for implementing security before or after an ERP implementation, it is important to review the purpose of creating a custom security model. For most companies, creating compliant custom security is a requirement. 
  • Whitepaper

    June 1, 2022
    A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management programme is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based…
Loading...