Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blogs September 7, 2021 A Hacker’s View: Social Media Protections in an Increasingly Connected World I’m a professional hacker, or as we are referred to in the security industry, a penetration tester. As a penetration tester, I am hired by organisations to attack their systems, networks, applications, and employees in the same fashion that a malicious attacker would. It is my job to find and exploit weaknesses before malicious attackers can. These weaknesses include application and network-… Whitepaper January 4, 2018 Frequently Asked Questions about Developing and Maintaining an Effective Internal Audit Function The internal audit (IA) profession has undergone remarkable growth since 2004, when we published the first edition of our Guide to Internal Audit. At that time, we determined guidance was needed to address a number of pivotal regulatory developments, most notably the revised listing requirements from the New York Stock Exchange (NYSE) that stated for the first time, “Every listed company… Whitepaper August 26, 2020 Interpretations of the Updates to China’s Cybersecurity Law All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017. Whitepaper August 26, 2020 China's Cybersecurity Law: Cross-Border Data Transfer As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this fifth installment focuses on the cross-border transfer of data — or data localisation — that is outlined in Article 37. Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Blogs June 3, 2021 Leverage the Cloud to Modernise Technology and Enable Business Goals In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti… Blogs June 4, 2021 Control Cloud to Manage Security and Risk Ensuring IT risks are managed, and compliance requirements are met has only intensified with the recent rapid growth in adoption of cloud services. Deployment of production workloads, migration of regulated systems and increasing storage of large volumes of data in the cloud has driven the need for security and controls to be deployed across customer cloud environments. Blogs November 17, 2021 Enable Transformation, Manage Risk with a Cloud Control Framework Businesses are experiencing increased agility and reliability – and cost reductions – through cloud transformation but adopting cloud solutions can result in new risks. Sometimes, they impede enterprise vision and regulatory compliance. Applying an appropriate framework to help manage the risk of cloud adoption can mitigate or even eliminate these hazards. In an earlier blog, we introduced… Blogs November 29, 2022 Data Governance Shapes Enterprise Transformation In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s… Blogs March 4, 2022 The CFO’s Gambit: A Multidimensional Strategic Role On the three-dimensional chessboard of business, CFOs are expanding their roles in multiple directions at once. Finance leaders now shape and drive corporate strategy in areas ranging from advanced technology investments to organisational design, and from supply chain resilience to organisational culture. Simply stated, they are positioning themselves as players in the strategic dialogue in the C… Load More