Insight Search

Sort by:
  • Whitepaper

    June 8, 2020
    This article addresses both the challenges CIOs and technology leaders experienced during the COVID-19 pandemic and how companies and their technology functions responded to it. We learned that the organisations and their stakeholders most likely to shape their narratives in a positive direction were those who understood and leveraged the benefits of the new technology labor model that supports a…
  • Whitepaper

    October 22, 2020
    Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt…
  • Podcast Transcript

    May 5, 2023
    Intel is preparing to build its first quantum dot processor. But you don’t have to wait to try your hand at writing code for it. Thanks to the Intel Quantum SDK, you can access the support system and software stack for this future chip via simulators today. Prepare to run algorithms on a bleeding-edge platform in this episode of The Post-Quantum World. I’m your host, Konstantinos Karagiannis. I…
  • Podcast

    April 26, 2021
    As costs for risk functions continue to increase, it is crucial to both reduce manual tasks and innovate processes through technological tools as well as an expanded skillset. In this episode of Protiviti’s Powerful Insight’s “Future of Compliance” podcast series, Protiviti Risk and Compliance Managing Director, Vicki Alexander speaks with Nishant Desai, the Chief Compliance Officer of…
  • Podcast

    March 13, 2024
    In this special edition of the Protiviti Legal Perspectives podcast series, we delve into the complexities of new data protection and cybersecurity government regulations in the defense industry with Alex Alexander W. Major, Partner, McCarter & English and Perry Keating, President of Protiviti Government Services. The Cybersecurity Maturity Model Certification (CMMC) was recently promulgated…
  • Podcast

    April 28, 2022
    The current and future state of risk analytics is bedrock to empowering the compliance function’s forward-looking agenda. With the evolution of enterprise risks, advancements in analytics, and the ever-morphing regulatory landscape, compliance can be transformed by being further data driven, and monetise the deployment of advanced analytics in empowering intelligent decision-making and risk…
  • Blogs

    May 20, 2021
    One of the most important lessons healthcare companies learned during the COVID-19 pandemic is that they need to implement and maintain better strategies, processes and procedures to enable resiliency and recovery. As they seek to mature their business continuity plans (BCPs)/continuity of operations plans (COOPs), not only to satisfy recently increased regulatory scrutiny by the Centers for…
  • Client Story

    April 28, 2022
    Web application accessibility is critical to the ongoing success of any digital application. In fact, the Americans with Disabilities Act (ADA) includes digital assets in its definition of “public places of accommodation” that should adhere to accessibility standards. Jamf, a global software company based in Minneapolis, Minn., produces applications to manage Apple devices and services and has a…
  • Podcast

    July 28, 2023
    ChatGPT is the talk of the town today. But as we all know, generative AI is much more than this one tool. Gen AI represents a new frontier of promise, productivity and capabilities for organisations around the world. But it also comes with risks that these organisations must understand and manage if they’re going to capitalise successfully on these new technologies.In this episode, we talk all…
  • In Focus

    October 17, 2024
    As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security of its national defense supply chain: The Cybersecurity Maturity Model Certification (CMMC) Programme. The new rule, published Oct. 15, marks a significant step towards enhancing cybersecurity across the Defense Industrial Base (DIB).
Loading...