Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blogs June 17, 2021 Don’t Bore the Board: 5 CISO Hacks for Highly Effective Presentations Several years ago, we invited board members to speak candidly about presentations from company executives. Those free-flowing conversation more than lived up to what was billed as a “Don’t Bore the Board” panel discussion. The panel members’ engaging insights remain instructive to CISOs today as security leaders strive to hone their increasingly important board presentation approaches. One… Blogs July 16, 2021 Success from Scarcity: 5 Lessons in Frugal Innovation In a culture of abundance, scarcity is often equated with adversity. But abundance can be a burden as well, leaving otherwise healthy companies unprepared to deal with extended periods of lack of resources. The global COVID-19 pandemic provided a wake-up call for many organisations in developed economies as they found themselves scrambling to adapt to resource constraints that are a way of life… Blogs August 5, 2021 Human Capital Reporting in a Changing World The COVID-19 pandemic. A new administration in the U.S. with, so far, a markedly different tone than the previous one. The MeToo and Black Lives Matter movements. Environmental, social and governance (ESG) reporting. It would be easy to attribute the emergence of human capital reporting requirement by the Securities and Exchange Commission (SEC) to a wave of accountability demands in a… Blogs August 5, 2021 An Approach to Measuring the Value of Human Capital Stakeholders have long believed that effective assessments of a company’s performance and prospects require solid information on workforce costs and productivity, on how employees are hired, developed and managed, and other human capital factors. Agencies, governing bodies and investors have recently exerted pressure on a number of authorities worldwide to ensure more human capital information is… Blogs August 9, 2021 Returning to the Office with an Adaptable, High-Performance Team The response to the pandemic from organisations can be classified into multiple phases. In the first phase, business leaders scrambled to equip teams for remote work. Later, ad hoc groups sprang up to devise return-to-office (RTO) plans. Soon after, many recognised they’d have to optimise tools and processes for remote collaboration that would last months longer than they had anticipated. And now… Blogs September 7, 2021 A Hacker’s View: Social Media Protections in an Increasingly Connected World I’m a professional hacker, or as we are referred to in the security industry, a penetration tester. As a penetration tester, I am hired by organisations to attack their systems, networks, applications, and employees in the same fashion that a malicious attacker would. It is my job to find and exploit weaknesses before malicious attackers can. These weaknesses include application and network-… Whitepaper January 4, 2018 Frequently Asked Questions about Developing and Maintaining an Effective Internal Audit Function The internal audit (IA) profession has undergone remarkable growth since 2004, when we published the first edition of our Guide to Internal Audit. At that time, we determined guidance was needed to address a number of pivotal regulatory developments, most notably the revised listing requirements from the New York Stock Exchange (NYSE) that stated for the first time, “Every listed company… Whitepaper August 26, 2020 Interpretations of the Updates to China’s Cybersecurity Law All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017. Whitepaper August 26, 2020 China's Cybersecurity Law: Cross-Border Data Transfer As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this fifth installment focuses on the cross-border transfer of data — or data localisation — that is outlined in Article 37. Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Load More