Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Podcast January 5, 2021 Podcast - Building an Effective Industrial Control Systems Security Programme In this episode, Kevin Donahue, a senior director with Protiviti speaks with Protiviti's associate director Justin Turner and manager Derek Dunkel-JahanTigh about security for industrial control systems, or operational technology. Whitepaper July 13, 2021 How to implement an effective identity management strategy Identity management doesn’t happen overnight; there’s no “Easy” button to press, or magic snap-of-the-fingers instant fix. In fact, identity management has transformed into something far more complex than password authentication and simple security measures. It’s important to understand that jumping into a new technology instantaneously isn’t necessarily the right first step to ensuring a… Whitepaper July 12, 2021 Top 10 pitfalls of an IAM programme In spite of over 20 years of experience as an industry, Identity & Access Management (IAM) programmes continue to struggle — and with good reason. There is a lot that can go wrong with an IAM programme. Lack of funding, treating IAM like a project and not a programme, not having business buy-in, and trying to overly customise packaged software are all examples of significant challenges that… Whitepaper December 7, 2021 Vigilanza sul mercato NPEs: Quale risposta dei Servicer alla rinnovata attenzione? L’11 novembre 2021 Banca d’Italia ha rilasciato la comunicazione “Servicers in operazioni di cartolarizzazione. Profili di rischiosità e linee di vigilanza” che integra e in alcuni casi specifica il quadro previsionale rinnovato con il recente (quarto) aggiornamento (luglio 2021) delle Disposizioni di vigilanza per gli intermediari finanziari (Circolare n. 288 del 3 aprile 2015, Titolo… Newsletter November 6, 2019 LA SFIDA DELLA QUANTIFICAZIONE DEL RISCHIO CYBER Cambiano scenari e modelli, “incursori” e attori della protezione e non sempre l’approccio a silos basato sui controlli (regolamentarie non) e sulla sicurezza operativa riesce a precedere nuovi fenomeni. Se il cyber risk è fra le prime preoccupazioni per le aziende europee (italiane comprese) come indica il report “Regional Risk for Doing Business 2019” diffuso dal World Economic… Video September 3, 2020 Cyber Risk Quantification FAQs Cyber risk quantification (CRQ) uses industry leading and highly vetted probabilistic models to more accurately describe the cyber security and technology-based risks facing an organisation. Tune in to Protiviti's subject matter experts answer 15 frequently asked questions about CRQ. Whitepaper September 2, 2021 Towards an Identity-Centric Security Strategy Cyber attacks are rampant Let’s face it, cyber security professionals are not faring well against the increasing sophistication of attacks by hackers. According to the 2020 Verizon Data Breach Investigations report, the world witnessed a challenging year with a whopping 96% increase in successful data breaches against U.S. companies and government agencies as compared to 2019. Cyber attacks… Whitepaper June 1, 2022 How can an enterprise use access management to establish a Zero Trust environment? A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management programme is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based… Whitepaper December 19, 2024 The Compliance Playbook: Navigating the Financial Services Industry’s Compliance Priorities in 2025 As we enter the new year, the financial services industry once again faces compliance risks that are increasingly diverse and complex. Insights paper June 5, 2025 Protect Your Cloud Environment With CNAPP In 2023, a prominent global technology firm experienced a significant security breach when sensitive production data was inadvertently restored in a development environment. This misconfiguration led to the exposure of credentials and customer data, underscoring the persistent challenges even the most advanced tech companies face in securing cloud environments. Load More