Cybersecurity Collection Cyber resilience is an organisation’s ability to detect, prevent, respond, recover and learn from cybersecurity disruptions. Our cybersecurity collection explores common issues, trends and what organisations must do to prepare proactive and reactive solutions to and keep your assets safe. Insights paper March 20, 2024 Mastering Data Dilemmas: Navigating Privacy, Localisation and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape surrounding data protection, organisations must adapt swiftly to ensure compliance and maintain trust with their customers and stakeholders. However, both data sovereignty and localisation play an important role in privacy, as... Read more Featured Insights INSIGHTS PAPER June 20, 2024 Crypto and the Travel Rule: What’s Going On? Navigate crypto Travel Rule compliance: understanding its impact, the need for flexible solutions, and areas of focus for implementation. FLASH REPORT April 11, 2024 The American Privacy Rights Act of 2024: Could this framework become the data privacy panacea? On April 8, 2024, U.S. Representative Cathy McMorris Rodgers (R-WA) and U.S. Senator Maria Cantwell (D-WA) announced the American Privacy Rights Act.... SURVEY April 4, 2024 CIOs and CTOs See Skills, Staffing and Talent as Top Risk Concerns Businesses today face a myriad of challenges as they work to adapt and transform their operational models in order to overcome future obstacles,... WHITEPAPER April 2, 2024 Enabling Enterprise AI Adoption Through Next-Generation Governance Artificial intelligence (AI) has become increasingly important in the enterprise, thanks in part to the rise of generative AI (GenAI). While not a new... Button Button INSIGHTS PAPER June 20, 2024 Crypto and the Travel Rule: What’s Going On? Navigate crypto Travel Rule compliance: understanding its impact, the need for flexible solutions, and areas of focus for implementation. FLASH REPORT April 11, 2024 The American Privacy Rights Act of 2024: Could this framework become the data privacy panacea? On April 8, 2024, U.S. Representative Cathy McMorris Rodgers (R-WA) and U.S. Senator Maria Cantwell (D-WA) announced the American Privacy Rights Act.... SURVEY April 4, 2024 CIOs and CTOs See Skills, Staffing and Talent as Top Risk Concerns Businesses today face a myriad of challenges as they work to adapt and transform their operational models in order to overcome future obstacles,... WHITEPAPER April 2, 2024 Enabling Enterprise AI Adoption Through Next-Generation Governance Artificial intelligence (AI) has become increasingly important in the enterprise, thanks in part to the rise of generative AI (GenAI). While not a new... Digital Identity FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... BLOGS February 23, 2024 The importance of dark web monitoring In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of... BLOGS June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essentialcybersecuritypractices that bolster an organisation’s security posture by uncovering... BLOGS January 11, 2023 For $62.59, the 8 Character Password is Still Dead Five years ago, we wrote a post called “The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight... Button Button FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... BLOGS February 23, 2024 The importance of dark web monitoring In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of... BLOGS June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essentialcybersecuritypractices that bolster an organisation’s security posture by uncovering... BLOGS January 11, 2023 For $62.59, the 8 Character Password is Still Dead Five years ago, we wrote a post called “The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight... Data Privacy & Protection CLIENT STORY May 23, 2024 Trusted Partnerships and Collaborative Efforts Drive Success in Data Privacy Initiatives We partnered with the client in building and maturing a data privacy program, including enhancing the company’s privacy rights process into a... INSIGHTS PAPER January 8, 2024 How data sovereignty and data localisation impact your privacy programmes The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad... SURVEY December 7, 2023 Executive Perspectives on Top Risks for 2024 and 2034 The 12th annual Top Risks Survey report highlights top-of-mind issues for directors and executives around the globe over the next year - 2024 - and a... WHITEPAPER February 21, 2023 ISO 27001: 2022 - Key Changes and Approaches to Transition This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organizations can take to... Button Button CLIENT STORY May 23, 2024 Trusted Partnerships and Collaborative Efforts Drive Success in Data Privacy Initiatives We partnered with the client in building and maturing a data privacy program, including enhancing the company’s privacy rights process into a... INSIGHTS PAPER January 8, 2024 How data sovereignty and data localisation impact your privacy programmes The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad... SURVEY December 7, 2023 Executive Perspectives on Top Risks for 2024 and 2034 The 12th annual Top Risks Survey report highlights top-of-mind issues for directors and executives around the globe over the next year - 2024 - and a... WHITEPAPER February 21, 2023 ISO 27001: 2022 - Key Changes and Approaches to Transition This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organizations can take to... Security Resilience IN FOCUS July 23, 2024 Will CrowdStrike serve as a reboot on tech resiliency? Global IT systems are still in reboot and recovery after a software update by cybersecurity vendor CrowdStrike caused a massive worldwide outage of... INFOGRAPHIC June 3, 2024 Infographic | SIFMA’s Quantum Dawn VII Quantum Dawn VII is the latest iteration of SIFMA's biannual cybersecurity exercise focused on the outage of a critical third-party service provider ... WHITEPAPER May 28, 2024 DORA Compliance: Untangling Key Hurdles to Implementation The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final... BLOGS July 31, 2023 Cyber risk quantification for chaos management The most important use of any risk assessment tool is that it must contribute to better decision making on how to manage individual risks. Whether... Button Button IN FOCUS July 23, 2024 Will CrowdStrike serve as a reboot on tech resiliency? Global IT systems are still in reboot and recovery after a software update by cybersecurity vendor CrowdStrike caused a massive worldwide outage of... INFOGRAPHIC June 3, 2024 Infographic | SIFMA’s Quantum Dawn VII Quantum Dawn VII is the latest iteration of SIFMA's biannual cybersecurity exercise focused on the outage of a critical third-party service provider ... WHITEPAPER May 28, 2024 DORA Compliance: Untangling Key Hurdles to Implementation The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final... BLOGS July 31, 2023 Cyber risk quantification for chaos management The most important use of any risk assessment tool is that it must contribute to better decision making on how to manage individual risks. Whether... Security Strategy & Architecture WHITEPAPER May 9, 2024 SIFMA’s Quantum Dawn VII After-Action Report The latest iteration of SIFMA’s biannual cybersecurity exercise focused on the outage of a critical third-party service provider. The simulation and... SURVEY April 4, 2024 CIOs and CTOs See Skills, Staffing and Talent as Top Risk Concerns Businesses today face a myriad of challenges as they work to adapt and transform their operational models in order to overcome future obstacles,... BLOGS July 31, 2023 Simple is secure: Streamlining smart contract design For security teams looking to implement and design smart contracts, there are many intricacies and nuances that can be overwhelming. Using established... BLOGS July 14, 2023 Smart contracts part 1: What is a smart contract? In recent years, there’s been considerable talk of blockchain and its use cases in the business world. While some of these topics have specific use... Button Button WHITEPAPER May 9, 2024 SIFMA’s Quantum Dawn VII After-Action Report The latest iteration of SIFMA’s biannual cybersecurity exercise focused on the outage of a critical third-party service provider. The simulation and... SURVEY April 4, 2024 CIOs and CTOs See Skills, Staffing and Talent as Top Risk Concerns Businesses today face a myriad of challenges as they work to adapt and transform their operational models in order to overcome future obstacles,... BLOGS July 31, 2023 Simple is secure: Streamlining smart contract design For security teams looking to implement and design smart contracts, there are many intricacies and nuances that can be overwhelming. Using established... BLOGS July 14, 2023 Smart contracts part 1: What is a smart contract? In recent years, there’s been considerable talk of blockchain and its use cases in the business world. While some of these topics have specific use... Content Collections Technology Industry Collection A curated collection of topics, trends and insights to help technology, media and telecom (TMT) industry organisations face today's challenges and opportunities. For any critical point in a company's growth, explore Protiviti's insights and solutions. Our team will enable your business with a comprehensive approach to… Read More Board and C-Suite Leadership Collection Sharing the latest trends, risks, and challenges for board directors and CEOs around the globe. This collection of thought leadership provides practical insights and guidance for new and experienced board members alike on such topics as data/artificial intelligence, technology modernisation, succession planning, disruptive… Learn More Audit & Risk Management Collection Protiviti leaders and subject-matter experts from around the world provide insights on key issues facing organisations in our dynamic, challenging and competitive global business climate. Our world-class internal audit and risk assessment experience provides a wealth of information and data to help you meet future challenges. Read More