Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Podcast February 17, 2025 Risky Women Podcast | 2025 Top Compliance Priorities Kimberley Cole hosts Risky Women Radio with guests Carol Beaumier and Bernadine Reese to discuss the top compliance issues in 2025. They reflect on 2024, highlighting the impact of U.S. Supreme Court decisions on regulatory authority and a U.K. court ruling on discretionary commissions. The guests also discuss the importance of AI in compliance, the need for dynamic risk assessments and the… Podcast Transcript August 26, 2021 TRANSCRIPT | PRIVACY & CONSENT WITH KATIE STEVENS Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With a combined 30+ years of IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Whitepaper September 19, 2022 Guide to business continuity & resilience Plan for the Unexpected. Build Resiliency. Instill your organisation with the advantage to endure company disruptions and consistently meet business goals with reduced financial, operational, cybersecurity, and efficiency losses. Assess your areas of risk and develop, enhance, as well as maintain plans to enable resilience, regardless of the circumstance. Flashing back to 2020, the world… Newsletter July 17, 2024 Private Equity Insights Q2 2024 In this issue of Private Equity Insights, we offer guidance on how private equity can leverage procurement to unlock value and drive performance improvements. We also look at the growing role of AI in finance and how the board can sharpen its focus on M&A due diligence. Other topics include the board’s role in talent management and the results of our latest VISION survey on the future of… Whitepaper November 18, 2022 Managing credit risk in a differentiated downturn In this issue of the Credit Pulse, we look at credit risk considering the macroeconomic and geopolitical trends likely to shape the financial services industry over the next six months. First, we focus on critical considerations for loan servicers in the post-pandemic era. Then, we discuss risk management practices for non-financial organizations that extend trade credit and institutions that… Infographic February 21, 2024 Infographic | 2024 Top Risks for Chief Audit Executives Recognizing the interplay of near-term and future risks is essential for comprehensive enterprise-wide risk management. Such reflection and evaluation offer CAEs valuable insights into how these intertwined risks can impact an organization's strategic success and long-term viability. Podcast February 15, 2024 Risky Women Podcast | Top Compliance Priorities 2024 In this episode of Risky Women Radio, host Kimberley Cole, CEO of the Risky Women organisation kicks off Series 7 by discussing the predictions for 2024 in the field of risk regulation and compliance. She is joined by Carol Beaumier and Bernadine Reese from Protiviti, who share their insights on the compliance environment over the past decade and the evolving role of the chief compliance officer.… Whitepaper February 8, 2023 Building Sustainable Data Governance Programmes with Agile Concepts The digital revolution has led to an explosive growth in the amount of data created and collected, driving businesses to seek new ways to manage and discover value in the data they hold. In turn, the growth of stored data has been a longstanding management problem, which if not addressed can lead to potential vulnerabilities, data misuse, and possible data loss. Client Story April 19, 2024 Rural Lifestyle Retailer Builds Customer Loyalty With Enhanced CIAM Strategy Protiviti partnered with a rural lifestyle retailer client to assess its Customer Identity and Access Management (CIAM) program and architecture. Podcast September 17, 2025 Podcast | Running Shor’s Algorithm on Logical Qubits — with Infleqtion For the first time, Shor’s Algorithm is running on logical qubits! The team at Infleqtion used their Sqale neutral atom processor to accomplish the feat. While the setup only uses six logical qubits, and we’re still in the range of factoring 15 or 21, this is both a proof of concept and a proof of the need for post-quantum cryptography (PQC). We discuss the aggressive 2.5:1 physical-to-logical… Load More