Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Survey November 7, 2023 What Boards Need to Know About the CFO’s Changing Priorities As board members engage with CFOs, they should keep in mind that CFO priorities increasingly overlap with the company’s top strategic goals and risks. Case in point: Environmental, social and governance (ESG) metrics and measurement rate as the CFO’s topmost priority in Protiviti’s latest Global Finance Trends Survey. Further evidence of this trend lies in the fact that a majority of finance… Blogs March 9, 2022 The Decade Ahead : Working in Internal Audit The internal audit function is the only function within any organisation which has the mandate to look across and examine all aspects of the businesses and its processes. It’s a very empowering position and it’s also very unique and compelling as a profession. An internal auditor can gain insights into an organisation with a holistic view. The internal audit process requires one to assess… Newsletter December 12, 2021 Assessment Questions for Audit Committees to Consider (Offered in Conjunction With Protiviti’s The Bulletin, “Setting the 2022 Audit Committee Agenda”) As they self-assesses their performance periodically, audit committees may find useful the illustrative questions we have made available in our Assessment Questions for Audit Committees to Consider. Committee members should periodically assess the committee’s composition, charter and agenda… Blogs September 4, 2024 Microsoft D365 Security Design Implementation Considerations When approaching an ERP implementation, the topic of security is going to be broached and the question then becomes, “now or later?” Before discussing the considerations for implementing security before or after an ERP implementation, it is important to review the purpose of creating a custom security model. For most companies, creating compliant custom security is a requirement. Podcast Transcript November 25, 2022 Transcript | Financial Index Tracking via Quantum Computing— with Multiverse Using cardinality constraints for portfolio optimisation opens the doors to new applications for creating innovative portfolios and exchange-traded-funds (ETFs). All while providing better returns with less market risk. Host Konstantinos Karagiannis recently co-authored a paper on portfolio optimisation with Sam Palmer from Multiverse Computing. Find out how the team was able to outperform… Podcast October 5, 2022 Podcast | Financial Index Tracking via Quantum Computing— with Multiverse Using cardinality constraints for portfolio optimization opens the doors to new applications for creating innovative portfolios and exchange-traded-funds (ETFs). All while providing better returns with less market risk. Host Konstantinos Karagiannis recently co-authored a paper on portfolio optimization with Sam Palmer from Multiverse Computing. Find out how the team was able to outperform… Whitepaper March 4, 2021 YARA Signatures for Identifying HAFNIUM Attack on Exchange Servers Protiviti has assessed the YARA rules and verified that they accurately address the indicators known on March 2, 2021. Whenever using external links as a source, Protiviti recommends that all clients practice caution when ingesting open source data, as its usage is at their own risk. Thanks to Florian Roth for making the following rule available on GitHub under the MIT license. (Note: "… Blogs June 17, 2021 Don’t Bore the Board: 5 CISO Hacks for Highly Effective Presentations Several years ago, we invited board members to speak candidly about presentations from company executives. Those free-flowing conversation more than lived up to what was billed as a “Don’t Bore the Board” panel discussion. The panel members’ engaging insights remain instructive to CISOs today as security leaders strive to hone their increasingly important board presentation approaches. One… Blogs May 13, 2022 Why Consolidated Security Will Help Meet Cyber Challenges Companies face multiple threats as the security landscape continues to evolve. But how can they get to grips with the cyber risks they face and a record number of data breaches? Taken together, all areas of risk and security are essential in modern businesses: from IT and physical systems to cybersecurity and personal protection. But if they aren’t implemented correctly, they all have the… Flash Report March 9, 2023 New White House Cybersecurity Strategy Creates Additional Concerns for Businesses The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well as private businesses. The Biden-Harris Administration has been percolating a comprehensive cybersecurity strategy for some time and in early March released the aptly named “National Cybersecurity Strategy.” The 35-page document was created to help… Load More