Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Podcast September 20, 2022 Risky Women Podcast | Risk & Compliance at the Speed of Modern Business: Lynn Haaland Christine Halvorsen, Protiviti's U.S. Risk and Compliance lead, talks with Lynn Haaland, Chief Compliance, Ethics & Privacy Officer at Zoom Video Communications about the Risk and Compliance at the speed of modern business. Halvorsen and Haaland discuss how to establish a successful framework for managing privacy and compliance in a technology company and how to balance top privacy issues at… Newsletter May 10, 2022 SIFMA Quantum Dawn VI A Decade of Testing and Resilience Over the past 10 years, the Securities Industry and Financial Markets Association (SIFMA) has coordinated a series of industrywide resilience exercises known as Quantum Dawn. These exercises provide a forum for financial firms, regulatory bodies, central banks, law enforcement, government agencies, trade associations and information-sharing organizations to… Podcast September 21, 2022 Podcast | Becoming a Quantum Coder— with ColdQuanta Are you interested in becoming a quantum coder? The job market looks as large as the machines are cold. We’re all struggling in the quantum computing industry to find talent. Do you have what it takes? You may even be able to get started with less experience than you think. Join host Konstantinos Karagiannis for a chat about the path to this exciting career with Peter Noell from ColdQuanta.… Newsletter August 15, 2022 Improving Board Performance in Disruptive Times The 2020s are well on their way to earning the ominous label of a troubling, disruptive decade, but there remain viable opportunities amid the challenges. What is the board’s role in preparing the organization for “show-stopping” and potentially existential risks? The Story: A global board survey conducted by McKinsey of approximately 1,500 corporate directors found that directors “are not… Newsletter September 28, 2022 Identifying and managing the critical risks of third-party providers “Outsourcing and other third-party relationships can bring multiple benefits to FIs, including: enhanced operational resilience; faster and more tailored financial products and services; cost reduction; greater innovation; and improved internal processes. However, outsourcing and third-party relationships can give rise to new or different risks to FIs and potentially to financial stability that… Podcast August 13, 2022 Podcast | Focusing on ESG Planning and Strategy ESG is a driving theme and priority for most organizations around the world today. And like any other key initiative within these organizations, whether it be global expansion or launching new product lines, there must be a plan and strategy for ESG programs and activities. They cannot be approached as a side project.In this episode of Board Perspectives, we speak with Protiviti’s Ellen Holder… Survey June 28, 2022 IT Audit Perspectives on Top Technology Risks Results of ISACA/Protiviti global survey reveal cybersecurity, privacy, data and regulatory compliance are top-of-mind concerns An uncertain global economy, volatile geopolitical developments, a persistent pandemic and an evolving catalog of technology risks have created mounting challenges for IT audit leaders and their functions. The results of the latest IT Audit Technology Risks Survey from… Whitepaper June 3, 2022 CFO Exchange - May 18 Chief Financial Officers (CFOs) of high-growth technology companies met virtually to share leading practices, discuss and exchange learnings on challenges, industry trends and topics of mutual interest. The agenda for this small-group meeting, conducted under Chatham House Rule, was created through a series of pre-interviews. Comments from participating CFOs are summarised below. Whitepaper June 1, 2022 How can an enterprise use access management to establish a Zero Trust environment? A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management program is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based… Flash Report June 3, 2022 SEC Cybersecurity Disclosure Enhancements Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and… Load More