Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper October 6, 2020 Back to Basics for Private Equity – Four Longer-Term Areas That Warrant Renewed Focus Post-COVID-19 October 2020 As the global economy slowly emerges from COVID-19 lockdowns, it is important for companies to focus once again on some of the longer-term challenges that may have taken a backseat in recent months. Private equity managers can partner with their portfolio companies to ensure these areas are receiving appropriate attention. Recently, we have published a number of… Research Guide March 7, 2025 Guide to Public Company Transformation: Frequently Asked Questions Initial public offerings (IPOs) often generate a great deal of excitement and can give new luster to company brands. It is easy to forget that IPOs can only thrive in the right business climate – and for organizations that have undertaken the business transformation necessary to reach this stage.As this Guide to Public Company Transformation makes clear, preparing to become a public company is… Podcast January 5, 2021 Podcast - Building an Effective Industrial Control Systems Security Programme In this episode, Kevin Donahue, a senior director with Protiviti speaks with Protiviti's associate director Justin Turner and manager Derek Dunkel-JahanTigh about security for industrial control systems, or operational technology. Podcast May 19, 2021 Podcast | Honeywell’s Roadmap to Quantum Value with Honeywell Quantum Solutions Honeywell surprised the quantum computing world in 2020 by announcing the most powerful system on Earth at the time … then claiming they’d make it ten times more powerful within a year! Turns out that having a century of industrial research experience can come in handy when trying to alter the future of high-performance computing. In this episode, we talk with Justin Ging from Honeywell Quantum… Whitepaper July 22, 2021 The shift to zero trust The future of organisations will be built on the ability to work securely from anywhere, using any device at any time. This was made clear during the COVID-19 pandemic, which forced millions of workers to work from home using company-owned or personal devices. As the velocity and persistence of cybersecurity attacks increase daily and digital transformation continues to be a priority for… Whitepaper July 12, 2021 Top 10 pitfalls of an IAM programme In spite of over 20 years of experience as an industry, Identity & Access Management (IAM) programmes continue to struggle — and with good reason. There is a lot that can go wrong with an IAM programme. Lack of funding, treating IAM like a project and not a programme, not having business buy-in, and trying to overly customise packaged software are all examples of significant challenges that… Whitepaper September 2, 2021 Towards an Identity-Centric Security Strategy Cyber attacks are rampant Let’s face it, cyber security professionals are not faring well against the increasing sophistication of attacks by hackers. According to the 2020 Verizon Data Breach Investigations report, the world witnessed a challenging year with a whopping 96% increase in successful data breaches against U.S. companies and government agencies as compared to 2019. Cyber attacks… Podcast October 8, 2020 Podcast: Cybersecurity Hits Close to Home Welcome you to a new edition of Powerful Insights and our continuing series on cybersecurity awareness. This series is intended to highlight ways organisations can be proactive in addressing these critical security challenges. We explore how leaders can dynamically build cyber resilience while maximising value. In this series, we will be talking to our cybersecurity leaders who are in… Flash Report April 28, 2022 Protecting your organisation from insider threats in a changing world Cybersecurity threats are growing exponentially as companies introduce an increasing number of Internet of Things (IoT) devices into operations and collect and store an ever- escalating amount of data. This technology and data sprawl is providing bad actors with more entry points into networks and systems. Too often, organisations have failed to make commensurate investments in data protection,… Newsletter November 6, 2019 LA SFIDA DELLA QUANTIFICAZIONE DEL RISCHIO CYBER Cambiano scenari e modelli, “incursori” e attori della protezione e non sempre l’approccio a silos basato sui controlli (regolamentarie non) e sulla sicurezza operativa riesce a precedere nuovi fenomeni. Se il cyber risk è fra le prime preoccupazioni per le aziende europee (italiane comprese) come indica il report “Regional Risk for Doing Business 2019” diffuso dal World Economic… Load More