Results for Search Submit Filter by: Advanced Filter All results Solutions Industry People Client Story Insights/Blogs Filter Whitepaper June 24, 2022 PCI Security Standards Council Publishes New Versions of Self-Assessment Questionnaires On April 29, 2022, the PCI Security Standards Council (PCI SSC) released new versions of the PCI DSS Self-Assessment Questionnaires (SAQs) ahead of the anticipated June 2022 release timeline. After the release of the new version of PCI DSS 4.0 a month prior, the new versions of the SAQs have been updated to reflect changes in the standard, as well as to adjust requirements applicable for… Podcast June 27, 2022 Podcast | Building Technology and Data Enabled Capabilities Innovation, transformation and the introduction of more advanced technologies are on the agendas of most groups in an organization today. The same certainly holds true for internal audit functions – but perhaps not at the same levels of engagement as departments such as finance and IT. In fact, the results of the latest Next-Generation Internal Audit Survey from Protiviti show that overall… Podcast June 29, 2022 Podcast | From Qubits to Qumodes in Photonic Quantum Computing with QuiX Quantum In late 2020, physicists in China generated controversy by claiming quantum advantage with a photonic quantum computing system that’s technically not programmable. Other companies have been experimenting with photonic systems, including QuiX Quantum. How do these machines work? Should scientists redefine what quantum advantage means, focusing on practical, usable problems a machine is solving?… Blog June 16, 2022 Data Analytics: Strategies to Demonstrate Value and Achieve Transformation Recently, chief information officers, chief data officers and other leaders got together to discuss how data analytics programs can help organizations achieve transformation, and how that contribution of value can be measured. We joined to share our insights at this CIO Online virtual roundtable event, which included leaders from organizations in healthcare, financial services, utilities,… Blog June 21, 2022 Video Blog: Data Governance with Microsoft Purview If you've ever wanted to sit down with some of Protiviti's Microsoft MVPs, here's your chance. Spend a few minutes with Drew Madelung, Associate Director and MVP and David Drever, Senior Manager and MVP, as they review how to improve your organization's data governance processes with Microsoft Purview. Their conversation includes: The importance of data governance and how to control and manage… Blog June 22, 2022 SAP Data Warehouse Cloud – Is it the Right Product for Your Company? Many companies are evaluating how to leverage cloud tools within their business analytics and data programs. In this blog, our SAP experts have provided a high-level architecture of SAP Data Warehouse Cloud (SAP DWC) and core functionalities ranging from supported connections, data consumption and manipulation, to preparing for analytical usage. SAP DWC is an end-to-end data management business… Blog June 23, 2022 Maximizing OT Security and Resiliency Through a Risk-Based Framework The past 18 months have seen a significant increase in threats targeting critical infrastructure and operational technology (OT) networks. These environments are prime targets due to their age, complexity and importance to organizations. OT is the driver behind the largest corporations in the world – whether it is mixing the secret recipe for Coca-Cola, generating power for millions of customers… Blog June 4, 2021 How to Integrate Threat and Vulnerability Management into Security Operations In today’s cybersecurity threat landscape with its ever-growing volume of incidents, it is remarkable to think that proactive threat and vulnerability management remains a challenge for companies to address effectively. Organizations are adopting threat exposure management techniques to manage business risks stemming from developing and applying technology such as Internet of Things (IoT)… Blog June 7, 2021 Managing IoT for Data Privacy On March 9, 2021, Bloomberg reported hackers had accessed videos and data from thousands of security cameras in an event now known as the Verkada breach. Our first post about the incident covered the importance of end-to-end Internet of Things (IoT) security; this post takes a deeper look at IoT data privacy risk and suggests how purchasing organizations can mitigate it. It’s worth considering… Blog June 8, 2021 Balancing Identity and Access Management for Risk Versus Speed In today’s rapidly evolving business world, the lines between technology and business have blurred. Organizations need to modernize and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s… Load More