Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organization’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Newsletter July 13, 2023 The Metaverse: The Dawn of a New Generation of Capabilities The big picture: The metaverse has the potential to be a disruptive, expansive and transformative force, even to the point of spawning its own economy. Every board has a fiduciary duty to evaluate that potential for its company’s future. By the numbers: According to a survey of 250 global business leaders, the metaverse has the potential to dramatically alter the future of the human experience… Client Story June 16, 2023 Global Leader in Design Software Hardens Its Platform Infrastructure to Meet FedRamp Compliance Requirements This global leader in software for designers, builders, engineers and others has worked to provide a solid platform across a multitude of industries. However, recent changes in FedRamp compliance requirements drove them to develop a new instance of its product platform, hardening their infrastructure for customers in the public sector. Survey December 12, 2023 2024 Top Risks in the Technology, Media and Telecommunications Industry TMT executives were asked to identify the biggest threats they anticipate over the next 12 months and a decade ahead. Many of the risks cited correlate in many ways and can be categorised under two broad themes: foundational risks, which are essentially challenges that leaders must address to keep their business thriving, and risks that are essential for continued growth and expansion. Insights paper January 8, 2024 How data sovereignty and data localisation impact your privacy programmes The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad strokes of various privacy laws may be consistent across jurisdictions, governments will dictate the collection, storage and interpretation of their citizens’ data through constantly evolving privacy regulations.The legislative bodies that write… Whitepaper December 27, 2023 Cybersecurity in solutions A Whitepaper on how solutions by stc transformed its Cybersecurity program for a sustainable digital future in partnership with Protiviti Member Firm for the Middle East Region. Newsletter January 10, 2024 The Top Risks for 2024: Risk Priorities Are Shifting Conducted in partnership with the NC State ERM Initiative, our global survey of C-level executives and directors highlights the influence of economic headwinds, talent issues, emerging technologies, cyber threats and geopolitical events on the 2024 risk landscape. This issue of Board Perspectives discusses the 10 highest-rated risk themes noted in the survey to provide a context for understanding… Newsletter February 7, 2024 The Top Risks 10 Years Out: Global Risks Are Persistent Capturing insights from over 1,100 C-level executives and directors across multiple industries with broad geographic representation, our global survey of C-level executives and directors survey offers insights for the top risks over the next 10 years out to 2034. The following table provides a context for understanding the most critical uncertainties companies face looking forward to 2034.TOP… Whitepaper June 27, 2023 What Role Should Compliance Play in ESG? By Bernadine Reese and Jackie SanzRegulators and many other stakeholders are intently focused on how financial institutions address environmental, social and governance (ESG) matters. Within financial institutions, boards of directors, executive management and much of the C-suite are weighing in on the ESG strategy and approach. Chief compliance officers (CCOs), though, have been remarkedly… Whitepaper March 24, 2023 Collaboration: The key to better management of cybercrime and financial crime By Carol Beaumier and Bernadine ReeseSharing information and lessons learned has become increasingly critical for the effective management of cybercrime and related financial crime. This need requires financial institutions to rethink how they have historically managed these risks. Load More