Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper November 18, 2022 Managing credit risk in a differentiated downturn In this issue of the Credit Pulse, we look at credit risk considering the macroeconomic and geopolitical trends likely to shape the financial services industry over the next six months. First, we focus on critical considerations for loan servicers in the post-pandemic era. Then, we discuss risk management practices for non-financial organizations that extend trade credit and institutions that… Podcast Transcript August 26, 2021 TRANSCRIPT | CARTA WITH MARIO DUSAJ Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With a combined 30+ years of IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Infographic February 21, 2024 Infographic | 2024 Top Risks for Chief Audit Executives Recognizing the interplay of near-term and future risks is essential for comprehensive enterprise-wide risk management. Such reflection and evaluation offer CAEs valuable insights into how these intertwined risks can impact an organization's strategic success and long-term viability. Podcast Transcript August 26, 2021 TRANSCRIPT | PRIVACY & CONSENT WITH KATIE STEVENS Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With a combined 30+ years of IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Whitepaper February 8, 2023 Building Sustainable Data Governance Programs with Agile Concepts The digital revolution has led to an explosive growth in the amount of data created and collected, driving businesses to seek new ways to manage and discover value in the data they hold. In turn, the growth of stored data has been a longstanding management problem, which if not addressed can lead to potential vulnerabilities, data misuse, and possible data loss. Whitepaper October 1, 2022 Guide to business continuity & resilience Instill your organization with the advantage to endure company disruptions and consistently meet business goals with reduced financial, operational, cybersecurity, and efficiency losses. Assess your areas of risk and develop, enhance, as well as maintain plans to enable resilience, regardless of the circumstance. Client Story April 19, 2024 Rural Lifestyle Retailer Builds Customer Loyalty With Enhanced CIAM Strategy Protiviti partnered with a rural lifestyle retailer client to assess its Customer Identity and Access Management (CIAM) program and architecture. Client Story March 11, 2024 Law Firm Navigates High-Stakes Class Action Litigation Our client had taken on a high-stakes, high-profile class action suit that, if successful, could result in a settlement impacting one of the world’s largest electronic consumer products companies and their customers. The client was faced with reviewing millions of pages of complex, highly technical documents provided by the defendant, and would require Protiviti to provide project management… Podcast February 15, 2024 Risky Women Podcast | Top Compliance Priorities 2024 In this episode of Risky Women Radio, host Kimberley Cole, CEO of the Risky Women organization kicks off Series 7 by discussing the predictions for 2024 in the field of risk regulation and compliance. She is joined by Carol Beaumier and Bernadine Reese from Protiviti, who share their insights on the compliance environment over the past decade and the evolving role of the chief compliance officer.… Flash Report July 31, 2023 SEC Cybersecurity Disclosure Enhancements: Efforts to Boost Investor Confidence On 26 July 2023, the U.S. Securities and Exchange Commission (SEC) adopted amendments1 to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing risk to public companies, investors and market… Load More