Cybersecurity Collection Cyber resilience is an organization’s ability to detect, prevent, respond, recover and learn from cybersecurity disruptions. Our cybersecurity collection explores common issues, trends and what organizations must do to prepare proactive and reactive solutions to and keep your assets safe. In Focus July 19, 2024 SEC rebuked in SolarWinds decision. What does it mean? U.S. District Judge Paul Engelmayer has dismissed most of the charges made by the U.S. Securities and Exchange Commission (SEC) against software company and 2020 cyberattack victim SolarWinds and its chief information security officer (CISO), Tim Brown. In its original lawsuit, filed in October 2023, the SEC alleged that SolarWinds had defrauded investors by... Read more Featured Insights BLOG September 17, 2024 Energy and Utility OT and IT Convergence Efforts Bring Opportunity Amid Challenges and Risk Like companies in other industries, energy and utilities (E&U) organizations want to more efficiently leverage data generated in the field by... IN FOCUS August 28, 2024 NIST unveils post-quantum cryptography standards. What does it mean? Earlier this month, the National Institute of Standards and Technology (NIST) approved three post-quantum cryptography (PQC) standards that constitute... BLOG July 9, 2024 The SEC’s Cyber Disclosure Rules: Lessons Learned So Far In Year One What qualifies as a material cybersecurity incident? Can we estimate our potential losses and the effects of business disruption? What were our... INSIGHTS PAPER June 20, 2024 Crypto and the Travel Rule: What’s Going On? Navigate crypto Travel Rule compliance: understanding its impact, the need for flexible solutions, and areas of focus for implementation. Button Button BLOG September 17, 2024 Energy and Utility OT and IT Convergence Efforts Bring Opportunity Amid Challenges and Risk Like companies in other industries, energy and utilities (E&U) organizations want to more efficiently leverage data generated in the field by... IN FOCUS August 28, 2024 NIST unveils post-quantum cryptography standards. What does it mean? Earlier this month, the National Institute of Standards and Technology (NIST) approved three post-quantum cryptography (PQC) standards that constitute... BLOG July 9, 2024 The SEC’s Cyber Disclosure Rules: Lessons Learned So Far In Year One What qualifies as a material cybersecurity incident? Can we estimate our potential losses and the effects of business disruption? What were our... INSIGHTS PAPER June 20, 2024 Crypto and the Travel Rule: What’s Going On? Navigate crypto Travel Rule compliance: understanding its impact, the need for flexible solutions, and areas of focus for implementation. Digital Identity CLIENT STORY April 19, 2024 Rural Lifestyle Retailer Builds Customer Loyalty With Enhanced CIAM Strategy Protiviti partnered with a rural lifestyle retailer client to assess its Customer Identity and Access Management (CIAM) program and architecture. ... FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organization On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... BLOG February 7, 2024 IAM in Operational Technology: How and Where to Make it Work By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now... BLOG October 3, 2023 Emerging Trends in IAM Part 4: Going Passwordless with the FIDO Use Case The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their... Button Button CLIENT STORY April 19, 2024 Rural Lifestyle Retailer Builds Customer Loyalty With Enhanced CIAM Strategy Protiviti partnered with a rural lifestyle retailer client to assess its Customer Identity and Access Management (CIAM) program and architecture. ... FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organization On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... BLOG February 7, 2024 IAM in Operational Technology: How and Where to Make it Work By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now... BLOG October 3, 2023 Emerging Trends in IAM Part 4: Going Passwordless with the FIDO Use Case The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their... Data Privacy & Protection BLOG July 16, 2024 Put Privacy First To Build Trust and Elevate the Customer Experience This blog was originally posted on Forbes.com. Kim Bozzella is a member of the Forbes Technology Council. Here's a problem I often see: Most... CLIENT STORY May 23, 2024 Trusted Partnerships and Collaborative Efforts Drive Success in Data Privacy Initiatives We partnered with the client in building and maturing a data privacy program, including enhancing the company’s privacy rights process into a... FLASH REPORT April 11, 2024 The American Privacy Rights Act of 2024: Could this framework become the data privacy panacea? On April 8, 2024, U.S. Representative Cathy McMorris Rodgers (R-WA) and U.S. Senator Maria Cantwell (D-WA) announced the American Privacy Rights Act.... INSIGHTS PAPER March 20, 2024 Mastering Data Dilemmas: Navigating Privacy, Localization and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape... Button Button BLOG July 16, 2024 Put Privacy First To Build Trust and Elevate the Customer Experience This blog was originally posted on Forbes.com. Kim Bozzella is a member of the Forbes Technology Council. Here's a problem I often see: Most... CLIENT STORY May 23, 2024 Trusted Partnerships and Collaborative Efforts Drive Success in Data Privacy Initiatives We partnered with the client in building and maturing a data privacy program, including enhancing the company’s privacy rights process into a... FLASH REPORT April 11, 2024 The American Privacy Rights Act of 2024: Could this framework become the data privacy panacea? On April 8, 2024, U.S. Representative Cathy McMorris Rodgers (R-WA) and U.S. Senator Maria Cantwell (D-WA) announced the American Privacy Rights Act.... INSIGHTS PAPER March 20, 2024 Mastering Data Dilemmas: Navigating Privacy, Localization and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape... Security Resilience BLOG September 26, 2024 The Strategic Imperative of Enterprise Resilience In a volatile business environment, the concept of resilience has emerged as a cornerstone of strategic management. More than just a trendy concept,... IN FOCUS July 23, 2024 Will CrowdStrike serve as a reboot on tech resiliency? Global IT systems are still in reboot and recovery after a software update by cybersecurity vendor CrowdStrike caused a massive worldwide outage of... IN FOCUS July 19, 2024 SEC rebuked in SolarWinds decision. What does it mean? U.S. District Judge Paul Engelmayer has dismissed most of the charges made by the U.S. Securities and Exchange Commission (SEC) against software... WHITEPAPER May 28, 2024 DORA Compliance: Untangling Key Hurdles to Implementation The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final... Button Button BLOG September 26, 2024 The Strategic Imperative of Enterprise Resilience In a volatile business environment, the concept of resilience has emerged as a cornerstone of strategic management. More than just a trendy concept,... IN FOCUS July 23, 2024 Will CrowdStrike serve as a reboot on tech resiliency? Global IT systems are still in reboot and recovery after a software update by cybersecurity vendor CrowdStrike caused a massive worldwide outage of... IN FOCUS July 19, 2024 SEC rebuked in SolarWinds decision. What does it mean? U.S. District Judge Paul Engelmayer has dismissed most of the charges made by the U.S. Securities and Exchange Commission (SEC) against software... WHITEPAPER May 28, 2024 DORA Compliance: Untangling Key Hurdles to Implementation The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final... Security Strategy & Architecture BLOG July 23, 2024 5 Tips to Navigate Security in Agile Development In today's fast-paced digital landscape, DevOps practices have revolutionized software development and deployment, allowing organizations to achieve... WHITEPAPER May 9, 2024 SIFMA’s Quantum Dawn VII After-Action Report The latest iteration of SIFMA’s biannual cybersecurity exercise focused on the outage of a critical third-party service provider. The simulation and... BLOG April 9, 2024 Securing Large Language Models: Unique Challenges and Rethinking Traditional Security Approaches Large Language Models (LLMs) are computational systems that process and generate text by learning from vast datasets. These advanced models, which can... SURVEY April 4, 2024 CIOs and CTOs See Skills, Staffing and Talent as Top Risk Concerns Businesses today face a myriad of challenges as they work to adapt and transform their operational models in order to overcome future obstacles,... Button Button BLOG July 23, 2024 5 Tips to Navigate Security in Agile Development In today's fast-paced digital landscape, DevOps practices have revolutionized software development and deployment, allowing organizations to achieve... WHITEPAPER May 9, 2024 SIFMA’s Quantum Dawn VII After-Action Report The latest iteration of SIFMA’s biannual cybersecurity exercise focused on the outage of a critical third-party service provider. The simulation and... BLOG April 9, 2024 Securing Large Language Models: Unique Challenges and Rethinking Traditional Security Approaches Large Language Models (LLMs) are computational systems that process and generate text by learning from vast datasets. These advanced models, which can... SURVEY April 4, 2024 CIOs and CTOs See Skills, Staffing and Talent as Top Risk Concerns Businesses today face a myriad of challenges as they work to adapt and transform their operational models in order to overcome future obstacles,... Content Collections Technology Industry Collection A curated collection of topics, trends and insights to help technology, media and telecommunications (TMT) industry organizations face today's challenges and opportunities. For any critical point in a company's growth, explore Protiviti's insights and solutions. Our team will enable your business with a comprehensive… Read More Board and C-Suite Leadership Collection Sharing the latest trends, risks, and challenges for board directors and CEOs around the globe. This collection of thought leadership provides practical insights and guidance for new and experienced board members alike on such topics as data/artificial intelligence, technology modernization, succession planning, disruptive… Learn More Audit & Risk Management Collection Protiviti leaders and subject-matter experts from around the world provide insights on key issues facing organizations in our dynamic, challenging and competitive global business climate. Our world-class internal audit and risk assessment experience provides a wealth of information and data to help you meet future challenges. Read More