Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Video December 11, 2020 Understanding the Relationship Between Business Continuity Management and Operational Resilience We often get asked, what is the difference between business continuity management (BCM) and operational resilience? Rather than look at the differences, we believe the best way to answer this question is to look at the relationship between these two programs. Podcast May 24, 2023 Achieving Audit Relevance – with Andrew Struthers-Kennedy and Angelo Poulikakos Top-performing internal audit groups share similar traits: They focus more on streamlined, tailored, impactful communications and reporting. They evolve and adapt routinely, and they push themselves to find and build talent and resources from both within and outside their organizations. But guess what? Fewer than six in 10 internal audit functions have access to the talent they need across any of… Client Story May 5, 2025 EvergreenHealth’s Journey to a Comprehensive Employment Brand and Talent Marketing Strategy EvergreenHealth's comprehensive employment brand and talent marketing strategy by Protiviti increased application rates, reduced turnover by 3.5%, and decreased recruitment expenses. Podcast Transcript May 24, 2023 Transcript | Achieving Audit Relevance – with Andrew Struthers-Kennedy and Angelo Poulikakos Top-performing internal audit groups share similar traits: They focus more on streamlined, tailored, impactful communications and reporting. They evolve and adapt routinely, and they push themselves to find and build talent and resources from both within and outside their organizations. But guess what? Fewer than six in 10 internal audit functions have access to the talent they need across any of… Podcast October 8, 2024 Podcast | Strategic and Sustainable Sourcing – with Radhi Subramanian and Debjani Mallick An increasingly important issue for board members to address today is sustainability – specifically, sustainable sourcing and operations. These challenges not only have global compliance implications, but also brand and reputation issues, which are especially important to the board.In this episode, we speak with Protiviti’s Radhi Subramanian and Debjani Mallick about strategic and sustainable… Whitepaper February 16, 2021 Top Risks for 2021 and 2030 - Energy and Utilities Industry Perspectives Pandemic-related policies and regulation, economic conditions are top concerns in energy and utilities industry The continuing global challenges and potential existential threat posed by the ongoing COVID-19 pandemic. Political divisiveness and polarization. Social and economic unrest. Gridlock. Artificial intelligence (AI), automation and other rapidly developing digital technologies. Rapid… Client Story February 6, 2023 Global Multimedia Organization Transforms Sourcing and Procurement Function and Saves Millions Using spend analytics findings, Protiviti helped the client build and strengthen a procurement department with a custom procurement taxonomy. Working with the client’s first procurement leader, we helped secure an e-sourcing tool. Client Story May 9, 2024 Mastering Compliance and Efficiency with SAP GRC Access and Process Control Elevate compliance and efficiency with SAP GRC implementation by Protiviti. Streamline access control and process management for seamless operations. Resource Guide June 16, 2025 Navigating New Tariffs: Enhance Agility and Confidence Fluctuating tariffs and potential shifts in trade relationships are creating significant challenges for management teams. Companies across industries are pivoting to operate under greater volatility and uncertainty. While the direction, magnitude, and duration of tariffs remain unclear, companies need options and flexibility. Protiviti offers the expertise to help you develop agility and navigate… Newsletter September 8, 2021 Ransomware: Preventing an Attack and Responding to and Recovering From an Attack Ransomware attacks have been around for many years. In the past, cyber-threat actors would penetrate a company’s computer and network systems and obtain data with the objective of returning it upon payment. The demanded payments were usually smaller than the ransoms requested in recent incidents. Most of these incidents weren’t financially material, nor were they reported publicly. By contrast,… Load More