Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Client Story January 21, 2025 Holistic Business Case, Power App Drive Revenue Growth and Margin Boost Learn how Protiviti's tailored logistics Power App and process optimisations fueled over 100% revenue growth and margin boost for a leading service provider. Blogs April 6, 2023 Migrating Security from Microsoft Dynamics 365 Finance and Supply Chain Management This blog post was authored by Julia Artzi - Consultant, Sarah Guthrie - Senior Consultant, Enterprise Application Solutions on The Technology Insights Blog.Microsoft Dynamics 365 Finance and Supply Chain Management (D365 F&SCM) publishes security changes with new code releases. These changes are automatically applied to out-of-the-box security roles, duties… Client Story November 5, 2024 Navigating Security and GRC Optimisation during an SAP S/4HANA Conversion Master navigating security and GRC optimisation during an SAP S/4HANA conversion for enhanced system reliability and advanced data insights. Podcast September 27, 2023 Regulation, risk and reward with HSBC’s Chief Compliance Officer, Asia Pacific Some of the key things that I see will be around digitalisation, open banking, artificial intelligence and robotics, workforce transformation, cyber security, and as mentioned, sustainable banking as well as regulatory technology. We're also already seeing an increase in regulatory complexity, and banks will need to invest significantly more, in my opinion, around regtech solutions. These… Blogs June 30, 2023 A house divided: Key differences in cybersecurity implementation for IT and OT This blog post was authored by Justin Turner - Director, Security and Privacy on the technology insights blog. Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll… Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Resource Guide February 5, 2025 A guide to the EU AI Act: Regulations, compliance and best practices As artificial intelligence (AI) continues its explosive growth within organizations around the world, with virtually every business function exploring opportunities to increase productivity, efficiency and revenue growth, a growing collection of regulations, standards and frameworks around the world is beginning to emerge. Among the most notable of these regulations is the European Union… Blogs March 26, 2025 CFOs’ Risk Outlook—The Economy, Cyber and Talent Are Top Concerns Economic conditions and inflationary pressures, followed by cyber threats and rising labor costs, are the top near-term concerns for finance chiefs, according to the 2025 Executive Perspectives on Top Risks global survey. Blogs May 15, 2023 Hyperbole, hype and hope? Trillions of reasons why the metaverse matters Ever since Steven Spielberg put the metaverse on the mainstream map in 2018 with his science-fiction adventure film, Ready Player One, based on Ernest Cline's novel of the same name, there has been a slow but steady drumbeat of momentum building around the potential and possibilities of this brave, new, immersive world. Sure, the metaverse had been talked about long before 2018, but once… Client Story May 23, 2024 Trusted Partnerships and Collaborative Efforts Drive Success in Data Privacy Initiatives We partnered with the client in building and maturing a data privacy program, including enhancing the company’s privacy rights process into a universal, globally scalable webform intake, 10+ custom workflows and an encrypted portal. Leveraged OneTrust autoblocking to establish baseline cookie compliance. Load More