Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper September 22, 2021 The Changing Regulatory Posture Covid-19, the economy, racial equity and climate. These are what the Biden-Harris transition team initially identified as the priorities of its administration. Since President Biden took office, other pressing issues such as immigration, cyber defense, and the U.S.’s exit from Afghanistan have been added to the list. The financial services industry wasn’t expected to, and does not, make the… Insights paper October 6, 2023 Principles for Data Recovery From a Severe Cyber Scenario This paper is intended to prompt increased dialogue between financial institutions, trade associations and regulatory authorities on a rapidly evolving topic. It lays out a set of principles that could align regulators, the financial sector and all three lines of defense within an organization to a cohesive view of resilience. A key objective of this paper is to highlight the challenges in… Podcast July 24, 2024 Podcast | Zero-Trust Post-Quantum Cryptography — with XSOC The migration to post-quantum cryptography (PQC) is about to begin and is necessary to protect against the threats of fault-tolerant quantum computing. However, critical assets like those in military, banking, and government environments also require other layers of security and strategies such as zero trust and increased encryption bit sizes. Join host Konstantinos Karagiannis as he discusses a… Video August 3, 2023 Video | How to Manage Resilience as an Organization Andrew Retrum, Managing Director, shares common challenges organizations face when building a resilient business and how they are preparing to meet those challenges by investing in understanding their services. To enhance your own preparedness, learn more about how Protiviti can help your organizations operational resilience, technology risk management, and cyber defense and cyber resilience.… Flash Report June 2, 2022 Moving Beyond the Heat Map: Making Better Decisions with Cyber Risk Quantification A major cybersecurity event can dissolve millions of dollars in assets and tarnish even the strongest company's reputation. As cybersecurity concerns grow and evolve, companies need to be prepared for the inevitable cyber attacks with strong defenses to identify breaches and minimize damage. But how does leadership know where to invest in cybersecurity? How much is at risk? What should be… Research Guide February 15, 2022 Insights with the Cybersecurity On May 12, President Joe Biden issued the Executive Order on Improving the Nation’s Cybersecurity. This executive order (EO) is the most recent action by the administration to strengthen U.S. national cyber defenses and address cybersecurity threats and attacks that continue to grow in magnitude, impact and frequency. It is intended to protect networks in the federal, public and private sectors,… Podcast March 13, 2024 Podcast ǀ Decoding CMMC Compliance for Government Contractor Data In this special edition of the Protiviti Legal Perspectives podcast series, we delve into the complexities of new data protection and cybersecurity government regulations in the defense industry with Alexander W. Major, Partner, McCarter & English and Perry Keating, President of Protiviti Government Services. The Cybersecurity Maturity Model Certification (CMMC) was recently promulgated,… Whitepaper April 28, 2022 Agile Risk Management - Navigating Changing Dynamics Including results of Protiviti’s large financial institution survey on business control functions An organization’s overall risk governance framework and the resulting interaction across the three lines of defense are critical to business success. The first line’s main objective is to understand applicable risks and controls and ultimately drive growth through customer engagement. The second and… Survey January 2, 2024 2024 Top Risks in the Government Services Industry Explore the 2024 Top Risks in Government Services: Navigate economic challenges, escalating cyber threats, and talent management concerns with strategic insights. Whitepaper June 1, 2022 How can an enterprise use access management to establish a Zero Trust environment? A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management program is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based… Load More