Insight Search

Sort by:
  • Whitepaper

    June 9, 2021
    Protiviti is proud to be a gold sponsor of the IIA’s International Conference, which will be held virtually this year. The IIA’s International Conference is the premier training and networking event for internal audit professionals worldwide. The theme for The IIA’s 2021 International Conference, Scaling New Heights, sets the stage to share new and forward-looking information and leading…
  • Blogs

    May 15, 2022
    Microsoft Dynamics 365 Finance & Operations provides a database logging feature that can be used to track insert, update, delete, and rename key operation changes made to tables and fields in the application. Database logging is a valuable feature of Microsoft Dynamics 365 used to provide a chronological record of changes that occur within the application. Each record contains details of the…
  • Flash Report

    February 12, 2021
    According to Harvard Business Review research, 70-90% of M&A deals fail. Poor planning and execution at all stages of the deal (the deal zone, transaction zone, and post-close zone) contribute significantly to this high failure rate. Further, Protiviti research has shown that the most common mistakes an organisation can make during a transaction include improper planning, poor due diligence,…
  • Whitepaper

    March 19, 2021
    Planning and Implementation of a New Approach to the Workplace Organisations have learned much about themselves, their workforce and their business during the COVID-19 Pandemic. For many, there was a forced shift to working from home. While those employees who cared for children or other relatives struggled to some extent, most employees shifted to working from home seamlessly. Nevertheless,…
  • Survey

    January 7, 2022
    The quality and, in some cases, the existence of the CISO/CFO relationship varies by company. In organisations where the CISO role is positioned and promoted as a source of value, CISOs and CFOs tend to collaborate more often and more meaningfully than in companies that treat information security as a cost center (and typically struggle with cybersecurity as a result). Protiviti’s 2021…
  • Blogs

    September 7, 2021
    I’m a professional hacker, or as we are referred to in the security industry, a penetration tester. As a penetration tester, I am hired by organisations to attack their systems, networks, applications, and employees in the same fashion that a malicious attacker would. It is my job to find and exploit weaknesses before malicious attackers can. These weaknesses include application and network-…
  • Newsletter

    June 12, 2024
    Acute talent shortages across numerous industries underscore the risks emanating from outdated, reactionary approaches to managing people, succession and culture. The question arises, what is the board’s role in forging a 21st-century approach to managing talent?Changing times have led to fleeting employee loyalty, as talented individuals have more options than ever before with greater…
  • Podcast Transcript

    June 25, 2021
    Next in our Transformation series, guest host Lucy Pearman talks with Jo Ann Barefoot about RegTech innovation from how regulators are using technology to how financial services need to urgently expand their experimentation and adoption rates. Jo Ann Barefoot is CEO & Cofounder of AIR – the Alliance for Innovative Regulation – and host of the global podcast show Barefoot Innovation. A noted…
  • Blogs

    October 14, 2024
    As a leader about to undertake an ERP transformation, it is important to remember that these projects rarely go as planned. Like a house remodel, there will be hidden costs to be addressed throughout the implementation.  Whether it be that design tastes (requirements) change, the costs unexpectedly increase or an unexpected labor shortage that increases the timeline, it is important to learn…
  • Flash Report

    April 28, 2022
    What Happened to Mammoth Bank? Mammoth Bank demonstrated how quantification can be deployed to analyse ransomware risk accurately to acquire critical insights needed to build cyber resilience. Learn more about this fictional entity’s journey below.
Loading...