Results for Search Submit Filter by: Advanced Filter All results Solutions Industry People Client Story Insights/Blogs Filter Blog February 12, 2019 Comparing the Canadian Guidelines of Meaningful Consent to GDPR The implementation of the European Union’s General Data Protection Regulation (GDPR) in 2018 drove a ripple effect around the world as organizations were forced to take a close look at their processes to protect personal data of their global customers. Of course, obtaining an individual’s consent to use their personal data has always been important, but the GDPR requirements tightened the… Blog February 14, 2019 Resolved: Develop a Proactive Security Strategy for 2019 and Beyond In January each year, many of us (myself included) typically take time to reflect on the year that was, and the things we want to improve upon in the coming 12 months. Like many, I made some 2019 resolutions that will help me in both my personal and professional life. I’ve often wondered, if we can make personal and professional resolutions to improve ourselves, can we also make resolutions to… Landing Page SAP Resource Center Blog February 25, 2019 SAP BI Platform Security Best Practices: Access Rights and Custom Access Levels This is the first in a series of blogs about security in the SAP BI Platform. The SAP BI Platform comes with a set of five default access levels: View Schedule View on Demand Full Control (owner) Full Control However, there are many situations where these either give too much access or not enough for a given situation. While it is possible to use an access level to assign security… Blog September 26, 2022 ESG: Strategy for Sustainable Businesses As businesses are increasingly being scrutinized by their employees, stockholders, customers and society at large, leaders are responding by taking visible stances and observable action on racial equity, LGBTQ+ rights and gender pay differences — and now, as news stories develop, on even more issues seemingly daily. In an age where news is immediate and opinions quickly shared, organizations’… Blog November 14, 2018 Why Organizations Should Consider a Cybersecurity Program Office As part of our Cybersecurity Webinar Series for October’s National Cybersecurity Awareness Month, we presented a webinar recently, discussing the value of establishing a program office dedicated to cybersecurity. Cyber crime is now considered one of the top three risks to an enterprise. Many organizations seek to build security by adding tools and processes on top of their established operations… Blog September 28, 2022 Don’t trawl for customers; consolidate your digital toolset and they will come to you Brands used to be like large-scale fishermen, throwing out their big nets to seek third-party data and hoping it would bring in their customers. The old digital landscape captured unreliable data, invaded customer privacy and gave customers no choice but to accept their reviled cookies despite the stale taste they left behind. With the retirement of third-party data on the horizon, marketers… Blog September 28, 2022 CX and the human dynamic Brands can make experiences more enjoyable by revisiting the human factor in their customer experience equation. By curating experiences that are rooted in purpose and exist to generate positive memories, companies can fully unlock the promise of a successful digital transformation. Rewiring expectations As humans, we journey through life with the help of others — listening to stories and… Blog November 16, 2018 Oracle Security in the Cloud As part of our webinar series for October’s National Cybersecurity Awareness Month, we recently offered a webinar on Oracle ERP Cloud, covering implementation and governance of security. Here are some of the key points from our discussion. The benefits of cloud-based applications are many – they are easy to access, requiring only the internet and a browser. Fewer resources are required to… Blog November 21, 2018 Recognizing the People Element in Data Security Implementations Implementing information security technology and creating related policies is relatively easy. Getting the organization to better manage risks through the use of that technology and embrace those policies is quite a bit harder. In a recent survey by ESI ThoughtLab, co-sponsored by Protiviti, untrained staff was seen as the greatest cyber threat by businesses because it can provide a… Load More