Insight Search

Sort by:
  • Whitepaper

    July 12, 2021
    In spite of over 20 years of experience as an industry, Identity & Access Management (IAM) programs continue to struggle — and with good reason. There is a lot that can go wrong with an IAM program. Lack of funding, treating IAM like a project and not a program, not having business buy-in, and trying to overly customize packaged software are all examples of significant challenges that can…
  • Video

    September 3, 2020
    Cyber risk quantification (CRQ) uses industry leading and highly vetted probabilistic models to more accurately describe the cyber security and technology-based risks facing an organization. Tune in to Protiviti's subject matter experts answer 15 frequently asked questions about CRQ.
  • Podcast

    May 19, 2021
    Honeywell surprised the quantum computing world in 2020 by announcing the most powerful system on Earth at the time … then claiming they’d make it ten times more powerful within a year! Turns out that having a century of industrial research experience can come in handy when trying to alter the future of high-performance computing. In this episode, we talk with Justin Ging from Honeywell Quantum…
  • Podcast

    January 5, 2021
    In this episode, Kevin Donahue, a senior director with Protiviti speaks with Protiviti's associate director Justin Turner and manager Derek Dunkel-JahanTigh about security for industrial control systems, or operational technology. 
  • Podcast Transcript

    January 5, 2021
    In this episode, Kevin Donahue, a senior director with Protiviti speaks with Protiviti's associate director Justin Turner and manager Derek Dunkel-JahanTigh about security for industrial control systems, or operational technology. 
  • Whitepaper

    September 2, 2021
    Cyber attacks are rampant Let’s face it, cyber security professionals are not faring well against the increasing sophistication of attacks by hackers. According to the 2020 Verizon Data Breach Investigations report, the world witnessed a challenging year with a whopping 96% increase in successful data breaches against U.S. companies and government agencies as compared to 2019. Cyber attacks…
  • Infographic

    September 1, 2021
    Cybersecurity, privacy, data and resilience dominate the top technology challenges for technology, media and telecommunications (TMT) organizations, according to the annual ISACA/Protiviti Global Survey of IT audit leaders and professionals. These issues, which already were top-of-mind risks for most organizations, have been fueled further by pandemic-driven times of remote work…
  • Flash Report

    September 30, 2021
    What Happened to Mammoth Bank? Mammoth Bank demonstrated how quantification can be deployed to analyze ransomware risk accurately to acquire critical insights needed to build cyber resilience. Learn more about this fictional entity’s journey below.
  • Whitepaper

    August 1, 2022
    The purpose of security analytics in an organization Security metrics and the analysis of security information can be challenging concepts even for leading organizations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organization’s security capabilities. If policies are the…
  • Video

    December 21, 2024
    In the latest episode of the Protiviti Legal Perspectives podcast series, host Chad Volkert, Global Solutions leader at Protiviti, welcomes Joel Wuesthoff, a managing director in Protiviti’s Legal Consulting practice. With over two decades of experience in the legal industry, Joel brings deep expertise in litigation, e-discovery, data management and the evolving domains of data privacy and…
Loading...