Insight Search

Sort by:
  • Client Story

    March 27, 2020
    For one global biopharmaceutical company, the ability to access vital data when and where it’s needed can affect more than just performance — it can impact the ability to save lives. This industry leader develops, manufactures and distributes breakthrough medical therapies to treat patients with serious and life-threatening medical conditions. The company conducts clinical trials to better…
  • Client Story

    June 25, 2019
    FASB’s new lease accounting guidance (ASC Topic 842), issued on February 25, 2016, requires organizations to recognize lease assets and liabilities on the balance sheet and disclose key information on lease transactions. For most companies with leased assets, the change significantly affects financial reporting. Companies must obtain key information through lease abstraction and populate a data…
  • Flash Report

    June 3, 2022
    Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and…
  • Whitepaper

    June 1, 2022
    A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management program is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based…
  • Whitepaper

    June 3, 2022
    Chief Financial Officers (CFOs) of high-growth technology companies met virtually to share leading practices, discuss and exchange learnings on challenges, industry trends and topics of mutual interest. The agenda for this small-group meeting, conducted under Chatham House Rule, was created through a series of pre-interviews. Comments from participating CFOs are summarised below.
  • Podcast Transcript

    September 9, 2022
    Quantum volume. Algorithmic qubits. Qubit counts in general. What do they really tell us about the usability and power of a quantum computer? As we learned from classical computing, only benchmark software can really compare how systems perform different tasks. Super.tech is back to discuss their SupermarQ benchmark suite that gives us real performance data for quantum hardware. Guest: …
  • Podcast Transcript

    September 9, 2022
    Controlling a quantum computer can mean a lot of things. For Q-CTRL, it includes better error correction and tools that help improve the performance of algorithms … by a factor of 9,000. It also means having a strong educational environment to help solve the talent shortage facing the industry. Join host Konstantinos Karagiannis for a chat with Michael J. Biercuk from Q-CTRL on how control…
  • Client Story

    October 7, 2024
    Telecom leader innovates pay structures for next-gen growth, setting new standards with a unified job architecture and base pay framework to attract top talent.
  • Newsletter

    September 2, 2024
    Dealing with regulatory change and uncertainty continuously ranks among the top risks identified by board members and C-suite executives across the globe. Some believe that recent U.S. Supreme Court decisions will increase this risk for companies doing business in the United States, while others applaud the Court’s actions. What is happening, and what does this mean for boards and their companies?
  • In Focus

    July 19, 2024
    U.S. District Judge Paul Engelmayer has dismissed most of the charges made by the U.S. Securities and Exchange Commission (SEC) against software company and 2020 cyberattack victim SolarWinds and its chief information security officer (CISO), Tim Brown. In its original lawsuit, filed in October 2023, the SEC alleged that SolarWinds had defrauded investors by concealing security weaknesses in its…
Loading...