Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs April 21, 2023 Enhancing cyber capabilities using a threat-driven strategy Senior leaders focused on cybersecurity recognise there is considerable guidance, best practices, frameworks, regulations and varied opinions on how programmes should design defensive capabilities. In addition, depending on the day, the various pressures in the organisation’s macro-environment may be greater or lesser and invite different priorities for time, team and budget. Despite… Survey November 21, 2023 TMT finance leaders cite ESG, inflation and data security among top priorities TMT finance leaders cite ESG, inflation and data security among top priorities“The more things change, the more they remain the same” aptly describes the current dynamic for finance leaders across the technology, media and telecommunications (TMT) industry group.Inflation, supply chain challenges, consumer demand for sustainable and inclusive practices and reporting, new technologies,… Podcast September 12, 2023 Podcast | The Evolution of SOX: Tech Adoption and Cost Focus Amid Business Changes, Cyber and ESG Mandates In this episode, we dive into SOX compliance – specifically, the findings of and key takeaways from Protiviti’s latest Sarbanes-Oxley Compliance Survey. The results of our research are featured in our just-released report, The Evolution of SOX: Tech Adoption and Cost Focus Amid Business Changes, Cyber and ESG Mandates.The 2024 - Empowering the progress of SOX innovation is out now. Read now.… Video June 23, 2023 Video | The Countdown to DSA Compliance A new and dramatic approach to regulating big technology firms is coming into force across the European Union. The Digital Services Act (DSA), which the European Council signed into law on September 15, 2022, aims to protect the digital space against the spread of illegal content, particularly on social networks, content sharing platforms and e-commerce sites. The countdown has begun for… Whitepaper July 27, 2022 Balancing Opportunity and Risk: Security for RPA Platforms Robotic process automation (RPA) was first used to execute predetermined, rules-based tasks twenty or so years ago. Since then, RPA has functioned as a virtual workforce for businesses, which benefit from its power to collect data, execute processes rapidly and unerringly, and facilitate higher levels of quality — while enhancing customer satisfaction.We’ve previously addressed at length the… Blogs October 30, 2024 The Future of Microsoft Copilot for Finance As the wheel of digital transformation continues to turn, it brings with it profound changes across a myriad of industries. Perhaps none so much as in the finance function, which finds itself on the cusp of a new era defined by artificial intelligence (AI)-driven efficiency tools. Podcast April 26, 2021 Podcast: Future of Compliance - Adapting to Technological Paces As costs for risk functions continue to increase, it is crucial to both reduce manual tasks and innovate processes through technological tools as well as an expanded skillset. In this episode of Protiviti’s Powerful Insight’s “Future of Compliance” podcast series, Protiviti Risk and Compliance Managing Director, Vicki Alexander speaks with Nishant Desai, the Chief Compliance Officer of… Survey March 27, 2023 Industry Experience With Remote Branch Inspections Beginning in 2020, the Financial Industry Regulatory Authority (FINRA), the Securities and Exchange Commission (SEC) and several states provided temporary relief from the operational challenges of conducting on-site branch inspections during the pandemic, allowing firms to utilise technology to fulfill their inspection obligations remotely. Now, FINRA has proposed a voluntary, three-year remote… Blogs September 4, 2024 Microsoft D365 Security Design Implementation Considerations When approaching an ERP implementation, the topic of security is going to be broached and the question then becomes, “now or later?” Before discussing the considerations for implementing security before or after an ERP implementation, it is important to review the purpose of creating a custom security model. For most companies, creating compliant custom security is a requirement. Blogs May 17, 2024 Developing a security function during a CISO’s first 100 days These turbulent times of evolving threats and rising personal responsibility considerations for cybersecurity leaders make the CISO role a challenging but rewarding position. The CISO must contend with an increasing sophistication of attacks, potential geopolitical adversaries and the material impact cybersecurity can have on organisational value. Whether it’s a new CISO or a seasoned… Load More