Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs January 13, 2023 The Evolution of Attacker Behavior: 3 Case Studies This blog post was authored by Mike Ortlieb, Director, Security and Privacy and Chris Porter, Associate Director, Security and Privacy on The Technology Insights Blog. Threat actors are an ever-evolving species. Portrayed in popular advertising as guys dressed in black, probably sporting a ski mask, the harsh reality is that these bad actors are everywhere and are getting more creative… Podcast January 16, 2025 Risky Women Podcast | Driving Tech & Innovation in Risk Management In this episode, Jo Shoppee, head of operational risk, technology, at ANZ Bank, shares her unexpected journey into risk management, from working as a teller at ANZ to becoming a technology risk specialist. Jo discusses the challenges of balancing career and family, advocating for part-time roles for senior leaders, and emphasises the importance of compassion and understanding in risk management,… Whitepaper September 22, 2021 The Changing Regulatory Posture Covid-19, the economy, racial equity and climate. These are what the Biden-Harris transition team initially identified as the priorities of its administration. Since President Biden took office, other pressing issues such as immigration, cyber defense, and the U.S.’s exit from Afghanistan have been added to the list. The financial services industry wasn’t expected to, and does not, make the… Insights paper October 6, 2023 Principles for Data Recovery From a Severe Cyber Scenario This paper is intended to prompt increased dialogue between financial institutions, trade associations and regulatory authorities on a rapidly evolving topic. It lays out a set of principles that could align regulators, the financial sector and all three lines of defense within an organisation to a cohesive view of resilience. A key objective of this paper is to highlight the challenges in… Podcast July 24, 2024 Podcast | Zero-Trust Post-Quantum Cryptography — with XSOC The migration to post-quantum cryptography (PQC) is about to begin and is necessary to protect against the threats of fault-tolerant quantum computing. However, critical assets like those in military, banking, and government environments also require other layers of security and strategies such as zero trust and increased encryption bit sizes. Join host Konstantinos Karagiannis as he discusses a… Video August 3, 2023 Video | How to Manage Resilience as an Organisation Andrew Retrum, Managing Director, shares common challenges organisations face when building a resilient business and how they are preparing to meet those challenges by investing in understanding their services. To enhance your own preparedness, learn more about how Protiviti can help your organisations operational resilience, technology risk management, and cyber defense and cyber resilience.… Podcast March 13, 2024 Podcast ǀ Decoding CMMC Compliance for Government Contractor Data In this special edition of the Protiviti Legal Perspectives podcast series, we delve into the complexities of new data protection and cybersecurity government regulations in the defense industry with Alex Alexander W. Major, Partner, McCarter & English and Perry Keating, President of Protiviti Government Services. The Cybersecurity Maturity Model Certification (CMMC) was recently promulgated… Blogs July 14, 2023 Cybersecurity risk assessments vs. gap assessments: Why both matter This blog post was authored by Rob Woltering - Associate Director, Security and Privacy on the technology insights blog. As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s operations, cybersecurity risks remain top of mind for many organisations. To this end, organisations are continuously… Survey January 2, 2024 2024 Top Risks in the Government Services Industry Explore the 2024 Top Risks in Government Services: Navigate economic challenges, escalating cyber threats, and talent management concerns with strategic insights. Whitepaper June 1, 2022 How can an enterprise use access management to establish a Zero Trust environment? A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management programme is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based… Load More