Insight Search

Sort by:
  • Blogs

    June 27, 2025
    Data is the lifeblood of the telecom industry. With the advent and proliferation of 5G, AI, IoT, and other transformative technologies, telecom companies manage vast amounts of structured and unstructured data. While this data is essential for delivering seamless customer experiences and driving innovation, it also brings significant risks.
  • Whitepaper

    February 6, 2025
    Protiviti’s risk and compliance experts weigh in on the top compliance priorities for healthcare organisations in 2025 and what these changes mean under a new administration. Providers, payers, and life sciences organisations must refine their strategies to comply with evolving regulatory requirements and enforcement, while also capitalising on the opportunities presented by emerging…
  • Flash Report

    February 28, 2024
    On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity Framework (CSF). This latest edition of the CSF is designed for all audiences, industry sectors and organization types, regardless of their degree of cybersecurity sophistication.
  • Blogs

    August 14, 2024
    CFOs should school CISOs on materiality evaluations and reporting to the board, while CISOs can help finance chiefs better understand recovery costs, remediation efforts, single versus aggregate breaches and the nature of compromised data. Partnering closely with their CISO is one of several actions CFOs should consider to strengthen their cybersecurity disclosures, preparedness and incident…
  • Whitepaper

    May 30, 2023
    Servicers in lending organisations are challenged with navigating economic headwinds that are pushing delinquency- and default-rate projections higher. This task has been complicated by increased global regulatory focus and dynamic customer expectations, which are further providing impetus for servicers to reassess existing strategies and processes from a compliance perspective while continuing…
  • Whitepaper

    February 8, 2023
    The digital revolution has led to an explosive growth in the amount of data created and collected, driving businesses to seek new ways to manage and discover value in the data they hold. In turn, the growth of stored data has been a longstanding management problem, which if not addressed can lead to potential vulnerabilities, data misuse, and possible data loss.
  • Blogs

    April 4, 2023
    Technical debt is no longer just a “technical” problem. As recent, widely publicised events have shown, it is a business problem that can have serious consequences for organisations. The government and Congress are taking notice of unfair consumer experiences, and it is crucial for businesses to address their technical debt and minimise the risk of negative press, government fines and damaged…
  • Whitepaper

    March 11, 2024
    Internal audit (IA) functions continue to undergo significant changes ranging from the expanded use of emerging technologies, including robust data analytics and artificial intelligence (AI), and options on where their people work (i.e., remote, hybrid or onsite). IA functions within healthcare organizations have continued to evolve and adapt— some faster than others. Keep the pace by comparing…
  • Survey

    April 17, 2025
    In a dynamic business landscape filled with uncertainty, CAEs perceive most of the macroeconomic, strategic and operational risks organisations face to be higher magnitude threats compared to CEOs, CFOs and other C-suite respondents to our latest Top Risks Survey. This makes it imperative for internal audit leaders to work closely with leaders in the enterprise to ensure that risks are thoroughly…
  • Insights paper

    June 5, 2025
    In 2023, a prominent global technology firm experienced a significant security breach when sensitive production data was inadvertently restored in a development environment. This misconfiguration led to the exposure of credentials and customer data, underscoring the persistent challenges even the most advanced tech companies face in securing cloud environments.
Loading...