Insight Search

Sort by:
  • Newsletter

    May 10, 2022
    A Decade of Testing and Resilience Over the past 10 years, the Securities Industry and Financial Markets Association (SIFMA) has coordinated a series of industrywide resilience exercises known as Quantum Dawn. These exercises provide a forum for financial firms, regulatory bodies, central banks, law enforcement, government agencies, trade associations and information-sharing organizations to…
  • Whitepaper

    June 2, 2022
    Collaborating with internal audit to minimize cost overruns and maximize value Introduction Data analytics has proven to create significant benefits across most industries and organizational functions, including internal audit. In fact, nearly two-thirds of internal audit functions now use data analytics as part of the audit process, according to Protiviti’s 2017 Internal Audit Capabilities and…
  • Whitepaper

    February 4, 2021
    As an executive in healthcare, you make a lot of important decisions to ensure the financial health of your organization. One of those important decisions might be to select and implement a new enterprise resource planning (ERP) system. If you have made that decision, you have determined that your current information system, be it an existing ERP or best-of-breed solution, does not meet the…
  • Newsletter

    April 20, 2020
    Your monthly compliance news roundupOCC Reinforces Third-Party Risk Management ExpectationsRegulatory expectations related to third-party relationships have evolved considerably since 2013, when the Federal Reserve Board and Office of the Comptroller of the Currency (OCC) issued prescriptive guidances SR 13-19 and OCC 2013-29, respectively. To account for this evolution, the OCC…
  • Flash Report

    June 2, 2022
    IoT Vulnerabilities on the Rise A recently discovered set of Bluetooth-related vulnerabilities could mean thousands of IoT devices are vulnerable to attack and could experience deadlocks, crashes, buffer overflows and bypass of certain security settings. Researchers at the Singapore University of Technology and Design uncovered a set of 12 vulnerabilities affecting seven major system-on-a-chip (…
  • Podcast Transcript

    July 14, 2021
    The cryptographic apocalypse could be under five years away, depending on interconnect technologies that might allow quantum computers to work together. Is now the time to start planning for, or even implementing, post-quantum safe cryptography? It all depends on the shelf life of the data you’re trying to protect. Join host Konstantinos Karagiannis for a chat about post-quantum cryptography you…
  • Podcast

    July 14, 2021
    The cryptographic apocalypse could be under five years away, depending on interconnect technologies that might allow quantum computers to work together. Is now the time to start planning for, or even implementing, post-quantum safe cryptography? It all depends on the shelf life of the data you’re trying to protect. Join host Konstantinos Karagiannis for a chat about post-quantum cryptography you…
  • Newsletter

    April 17, 2020
    The global COVID-19 pandemic is a different experience from other catastrophic events like the September 11, 2001 attacks and the 2007-2008 global financial crisis. It is spawning new thinking in all quarters, especially in boardrooms. It’s been several weeks since coronavirus disease 2019 (COVID-19) truly captured everyone’s attention across the globe. But with new developments almost hourly,…
  • Whitepaper

    July 14, 2021
    The Microsoft 365 platform transforms how every member of an organization  chats,  emails,  shares files and performs the essential tasks inherent to all corporate roles. A comprehensive approach to Microsoft 365 deployment planning will ensure the efficiency, cost saving and employee satisfaction that the Microsoft 365 investment has the potential to deliver. Widely available…
  • Client Story

    April 9, 2021
    Data privacy has become a strategic priority as companies adapt to comply with rapidly proliferating data privacy laws. Recent years have seen the adoption of the European Union’s General Data Protection Regulation (GDPR), the more recent California Consumer Protection Act (CCPA), and similar regulations. These safeguards require companies to document the types of protected personal data used in…
Loading...