Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog October 13, 2020 Enrich SAP Analytics Cloud with Microsoft’s Excel Plug-In As a relatively new SAP analytics tool, the features SAP Analytics Cloud (SAC) offers are ever-evolving to benefit the end user. Earlier this year, SAP introduced an Excel add-in that allows companies to integrate their SAC analytic and planning models with Excel and explore data insights in the familiar spreadsheet tool. In this blog, we’ll look at how this new plug-in works and explain why it… Blog October 14, 2020 Four Common Mistakes in Cloud Environments In our previous blog, Establishing Foundational Cloud Governance, we outlined the modern technology operating environment and governance structure mistakes organizations make while using a hybrid-cloud environment. This blog looks at a few other mistakes that organizations are likely to make. The Number One Mistake: Failure to Automate An organization… Blog October 15, 2020 The Power of Hybrid Analytics As part of a typical business intelligence program, organizations are bound to take advantage of multiple systems. One system may provide exceptional reporting capabilities. Another may provide best-in-class dashboarding. Yet another may provide outstanding predictive abilities. The challenge is understanding where and how to access multiple systems in a business intelligence landscape. This is… Blog October 16, 2020 Podcast: Gone Phishing - Elaborate Scams Are on the Rise. Are You Smart Enough to Recognize Them? During cybersecurity awareness month, we are showcasing several podcasts on security and privacy issues. In this podcast, I share a personal experience with, and an in-depth analysis of, a sophisticated phishing scam. How can companies protect themselves against increasingly elaborate phishing attempts and other malicious actions? Listen to the story here. Blog October 19, 2020 Penetration Testers Tool Kit: A Transition from PowerShell to C# Attackers are continuously evolving their tool sets to keep ahead of defenders. In this blog, we highlight and discuss one major transition occurring in the attack and penetration space: the move from PowerShell to C# as an attack framework. The History PowerShell has been an asset to penetration testers for years. Unrestricted access to… Blog October 20, 2020 As Organizations Transform, the Role of the Project Manager Is Changing Project management as a function is undergoing rapid and profound transformation, and organizations are reconsidering the value project managers (PMs) can bring to their programs and projects. Over the course of a series of blogs, Protiviti will explore the evolution of the project management function from an administrative role to a transformation agent, along with the impacts to organizations… Blog October 21, 2020 Governing SAP Applications with Cloud Identity Access Governance Previously, we wrote about Cloud Identity Access Governance (IAG) based on the latest news coming out of a recent SAPinsider event. In this post, we would like to provide an update on the solution and clarify two editions we think are important to understand. Integrations There has been renewed focus by SAP to continue to innovate and integrate their suite of enterprise applications. Earlier this… Blog October 22, 2020 Upgrading to SAP GRC 12: Down to the Wire We are just weeks away from the SAP GRC application reaching the end of its mainstream maintenance on December 31 of this year (see illustration below). Organizations who are running Access Control, Process Control or Risk Management 10.x should be upgrading to GRC 12 now; otherwise, the consequences for not upgrading could include entering the extended maintenance period or customer-… Blog October 27, 2020 Seven Key Factors to a Successful PMO Transformation Established enterprises and rapidly growing firms continue to adapt to changing business environments driven by competition, acquisitions, emerging technologies and new risks. The same changes that are transforming the project management role and skills, discussed in this previous blog, are also altering the program (or project) management office (PMO). The need for alignment, built-in… Blog October 30, 2020 Flash Report: FBI Warns of Ransomware Assault on the Healthcare and Public Health Sector On October 28, 2020, the Federal Bureau of Investigation (FBI), the Department of Health and Human Services (HHS), and the Cybersecurity and Infrastructure Security Agency (CISA) issued a Joint Cybersecurity Advisory regarding credible information of imminent cyber attacks to infect systems in the Healthcare and Public Health (HPH) sector with Ryuk ransomware. Ransomware campaigns using the… Load More