Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog April 6, 2022 Driving The Top Line: Reflecting On A Critical Business Process Mission critical The quote-to-cash (Q2C) process is a vital part of the sales cycle that is responsible for driving revenue for an organization. It encompasses detailed sales functions spanning from initial quote configuration to payment receipt and revenue recognition. Optimizing the Q2C process allows companies to speed up sales cycles, close a higher percentage of deals and create a better… Blog April 12, 2022 What’s the Impact of the SpringShell Vulnerability? CVE 2022-22965, dubbed SpringShell (rated 9.8 CVSS Score) was found in Java’s Spring Framework. Spring, developed by VMware, is one of the most popular Java application deployment frameworks. On March 31, 2022, SpringShell (first known as Spring4Shell) was originally reported to VMware by multiple sources, and details were leaked online ahead of a public release and the formal CVE publication.… Blog April 14, 2022 10 Tips and Tricks for Moving to SAP BusinessObjects Private Cloud Edition SAP BusinessObjects is a well-established, on-premise enterprise business intelligence system, which has commonly been installed and configured within an organization’s own data center, with the responsibility of server maintenance falling on the organization itself. SAP has introduced the SAP BusinessObjects Private Cloud Edition (PCE) initiative, which shifts this responsibility to SAP and… Blog April 18, 2022 How to Talk to Boards About Ransomware And Risk Anyone who follows the news is already aware of the persistent threat of ransomware events. Board members are certainly aware, and they know what preparations their organizations are making to fend off, respond to and recover from ransomware attacks. However, they may be unaware of their own roles in the organizations’ response to ransomware and other attacks. Chief Information Security Officers… Blog April 19, 2022 Quantitative Cyber Risk Management 101: Baselining and Baseline Cycling Cyber risk is a growing threat to organizations of all shapes and sizes. Cyber risk quantification allows organizations to better understand the financial impact that these risks pose; however, setting the scope of quantification activities and clearly articulating their outputs can be a challenge. Recently, Protiviti teamed up with the FAIR Institute to review how organizations can implement key… Blog April 26, 2022 “Not My Problem" - The Oversight of Ownership Design Does this sound familiar? It’s Friday afternoon at 4 p.m. when a frantic text arrives from the COO: "Hey, no one can get into our CRM. Did you start a weekend update early or something?" After some investigation (and a call home to delay the planned weekend getaway), it turns out there’s an obsolete application running that is no longer supported by the vendor, nor the recently updated platform… Blog April 27, 2022 What to Expect From the SAP BusinessObjects Private Cloud Edition Experience SAP BusinessObjects continues to dominate business intelligence, so to continue offering a best-in-class platform, SAP is moving SAP BusinessObjects into the cloud. Known as SAP BusinessObjects Private Cloud Edition (PCE), SAP is offering the best of the BusinessObjects platform while easing the most cumbersome aspects of managing the platform. In this post, I share Protiviti’s experience with… Blog May 3, 2022 A CISO’s First 100 Days: Finding Champions and Building Relationships It’s our good fortune to have an abundance of information security expertise at Protiviti, and it’s even better when we assemble these experts to share their experiences. In this first of a three-blog series, we discuss the early days for the CISO’s transition into a new leadership role which include: Establishing crucial relationships with the business, IT and security and privacy teams. the… Blog May 5, 2022 7 Considerations for Maximizing ROI on AI/ML Investments Motivated by multiple drivers, enterprises across nearly all industries are increasingly embracing artificial intelligence (AI) and machine learning (ML), enhancing efficiency, profitability, customer experience, and improving evidence-based decision making. Ever-increasing volumes of available data, both structured and unstructured, combined with ongoing innovations in the software and… Blog May 17, 2022 A CISO’s First 100 Days (Part 2): Why Organizations Replace Their CISO . . . And Why It Matters We spend a lot of time thinking about how CISOs can prioritize their earliest actions and advising clients who happen to be new in their CISO roles. By taking the right steps early, new CISOs can convey confidence, demonstrate their capabilities and set themselves up for success. In our first post, we talked about cultivating relationships that contribute to a CISO’s effectiveness. Today, we… Load More