Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog December 6, 2021 Achieving Technical Agility Agile practices are enabling teams across organizations to reimagine how to manage change and deliver services, but to achieve true business agility and become agile across the organization, it is crucial that we think beyond the scope of a team. Cross-functional leadership must recognize the need to work across lines of responsibility and address concerns of COOs, CIOs, CISOs, CDOs and other… Blog December 7, 2021 5 Critical Questions for IoT Device Security It’s no surprise that the Internet of Things (IoT) is undergoing rapid growth, creating a scenario where the tools are in high demand, but as technology outpaces the IoT ecosystem’s expansion, a vast attack surface is being created. What those new to IoT may not realize is that many IoT devices are being hacked within five minutes of being connected to the internet. Why? Because they have very… Blog December 13, 2021 Preparing for Cyber Disruption - The Future State of Ransomware Every day, clients come to us with questions about ransomware and how to best prepare their organizations against potential attacks. This is perhaps one of the most vexing challenges in cybersecurity as ransomware attack methods, motivation and barriers to entry are constantly evolving. We’ve collated three key questions that concisely explain ransomware: How do these attackers target my… Blog December 14, 2021 How Zero Trust Can Defend Against Ransomware As the number of ransomware attacks rise, the failure of businesses to properly invest in cybersecurity tools, technologies and trained resources continues to become more prevalent. Not only do the ransom demands continue to increase but the average cost of ransomware recovery continues to skyrocket. Sophos research revealed that the average ransomware recovery costs are $1.85 million compared to… Blog December 16, 2021 Log4Shell Frequently Asked Questions In response to the Apache Log4Shell vulnerability, we have compiled a list of the most frequently asked questions we are receiving from clients and the strategies we are seeing pursued across the market. Protiviti is monitoring this event closely and will continue to update this blog post to reflect the most accurate information. Last update: 1/7/2022 What is Log4j? Log4j is a Java-based logging… Blog December 17, 2021 Establishing an Omnichannel Data Management Process Using SAP Information Steward SAP Information Steward is a web-based application that provides users with centralized environment to analyze, assess, categorize, monitor and improve the enterprise data quality. This tool consists of five core functionalities: data insight, metadata management, cleansing package builder and match review. In this article, we will go over the basic functionalities of each area, followed by our… Blog January 4, 2022 Preparing For a More Protected Union The United States federal government has been acting to strengthen its cyber defenses. The actions taken and planned will not only impose new compliance obligations on governmental bodies, but also on private sector technology and service providers that deal with the government — and for businesses that support these providers. Recently, we hosted a webinar entitled To Form a More Protected Union… Blog January 10, 2022 Don’t Let Technical Debt and Other Cybersecurity Risks Drag on M&A Do your homework. The age-old mandate has newfound relevance for CISOs, given the intense pace of mergers and acquisitions (M&A) and escalating cybersecurity risks. Global business consolidation activity is strong. The number of deals (and the combined value of those transactions) through the first three quarters of 2021 surpassed the number of deals (and the combined value of those… Blog January 12, 2022 What You Read Most: Top Five SAP Insights From 2021 As we move ahead into the new year, here are Protiviti’s most popular SAP insights from 2021. Our subject matter experts addressed many pressing issues, and the topics covered promise to remain important throughout 2022. The top five most-read pieces are listed below. #1. Common Pitfalls of ERP Implementations: A… Blog January 18, 2022 Becoming a CISO: If I Knew Then What I Know Now Throughout my career as both a CISO and a consultant serving CISOs in companies around the globe, I’ve learned that Chief Information Security Officers, regardless of their current title, reporting structure or how they got to the role, share many things in common; one of which being, they love to talk about their experiences. Recently, we gathered three of the most experienced CISOs I know to… Load More