Results for Search Submit Filter by: Advanced Filter All results Solutions Industry People Client Story Insights/Blogs Filter Blogs August 5, 2021 An Approach to Measuring the Value of Human Capital Stakeholders have long believed that effective assessments of a company’s performance and prospects require solid information on workforce costs and productivity, on how employees are hired, developed and managed, and other human capital factors. Agencies, governing bodies and investors have recently exerted pressure on a number of authorities worldwide to ensure more human capital information is… Blogs August 9, 2021 Returning to the Office with an Adaptable, High-Performance Team The response to the pandemic from organisations can be classified into multiple phases. In the first phase, business leaders scrambled to equip teams for remote work. Later, ad hoc groups sprang up to devise return-to-office (RTO) plans. Soon after, many recognised they’d have to optimise tools and processes for remote collaboration that would last months longer than they had anticipated. And now… Blogs September 7, 2021 A Hacker’s View: Social Media Protections in an Increasingly Connected World I’m a professional hacker, or as we are referred to in the security industry, a penetration tester. As a penetration tester, I am hired by organisations to attack their systems, networks, applications, and employees in the same fashion that a malicious attacker would. It is my job to find and exploit weaknesses before malicious attackers can. These weaknesses include application and network-… Whitepaper January 4, 2018 Frequently Asked Questions about Developing and Maintaining an Effective Internal Audit Function The internal audit (IA) profession has undergone remarkable growth since 2004, when we published the first edition of our Guide to Internal Audit. At that time, we determined guidance was needed to address a number of pivotal regulatory developments, most notably the revised listing requirements from the New York Stock Exchange (NYSE) that stated for the first time, “Every listed company… Whitepaper August 26, 2020 Interpretations of the Updates to China’s Cybersecurity Law All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017. Whitepaper August 26, 2020 China's Cybersecurity Law: Cross-Border Data Transfer As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this fifth installment focuses on the cross-border transfer of data — or data localisation — that is outlined in Article 37. Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Whitepaper August 26, 2020 China’s Cybersecurity Law: Personal Information Protection Law (PIPL) Overview As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection. Whitepaper August 26, 2020 China's Cybersecurity Law: Multi-Level Protection Scheme (MLPS) In part one of our Point of View (POV) series Interpretations of the updates to China’s Cybersecurity Law, we highlighted the updated legal requirements that impact organisations looking to do business in mainland China. Blogs November 29, 2022 Data Governance Shapes Enterprise Transformation In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s… Load More