Results for “Finance Trends Survey” Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Leadership Douglas Sellers Douglas is a Managing Director within Protiviti’s Software Services (PSS) group based out of Chicago. For the past 22 years he has been helping clients innovate, create, and realize value by blending business with technology through software development. Doug has deep expertise in bringing software solutions to market, establishing software managed service arrangements with clients, and… Leadership Ryan Reents Ryan Reents serves as Operations Leader for Protiviti’s Transaction Services practice and has 15 years of experience across the transaction lifecycle. He has spent time both in industry and public consulting. Ryan is viewed by his clients and collogues as an SME in the areas of transaction synergies, dis-synerges, strategic cost take outs, financial modeling, transition service agreements (TSAs… Leadership Joseph A. Tarantino Joseph Tarantino has been president and CEO of Protiviti, a global consulting firm, since December 2007. He is responsible for the company’s worldwide operations, with a global executive team reporting to him. Tarantino has been with Protiviti since its inception in 2002. One of five founding members of the Protiviti Operating Committee, he served previously as managing director of the firm’s U.… Blog May 25, 2022 Planning A Successful Dynamics 365 CE Solution Delivery In this rapidly evolving digital age, unifying customer data and providing a 360-degree view of the various interactions and relationships across lines of business will enable organizations with a more proactive approach to engage customers to accelerate business results. Customer engagement is a hot topic, and there is no shortage of blogs and articles that provide varying degrees of insights on… Blog January 7, 2025 From Recovery to Resilience: Evolving ITDR for the Modern Enterprise Enterprise IT disaster recovery (ITDR) planning and architecture is changing dramatically with proliferating threat and failure scenarios, an ever-increasing number of attack surfaces and the increased impact (or blast radius) of security or resilience-related incidents. Businesses must now consider multiple sites on-prem and/ or cloud running thousands of devices (servers, storage and networking… Blog November 14, 2023 Strategies to Generate GenAI Success While the various forms of artificial intelligence (AI) have captured the imagination of nearly everyone in the business world, generative AI (GenAI) is rapidly becoming the hottest new kid on the block. We’ve seen the terms AI and GenAI being used synonymously but there are many types of AI. GenAI is the latest one and represents the ability of a model to create novel output. GenAI is a big… Blog November 15, 2023 Inclusive Culture Starts with Contract Language This post is the third and final in an occasional series about diversity in cybersecurity. Our first post discussed achieving diversity’s benefits in cybersecurity; the second explored the high cost of gender bias in cybersecurity. Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in… Blog May 16, 2023 Cybersecurity Risk Assessments vs. Gap Assessments: Why Both Matter As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s operations, cybersecurity risks remain top of mind for many organizations. To this end, organizations are continuously seeking to validate their cybersecurity defenses in protecting their assets and mitigating cybersecurity risks. Two important tools that… Blog May 10, 2023 Today’s Quantum-Inspired Approaches for ROI Quantum computing will change the world— the industry has rightfully accepted this as fact. However, until it does, we must contend with some limitations in the noisy intermediate scale quantum (NISQ) era machines we have today. Many use cases allow us to show customers how to solve complex business problems with actual NISQ quantum computers. Still, we often must accept that it will be some time… Blog April 26, 2023 API Security: Key to Interoperability or Key to an Organization? Most applications built today leverage Application Programming Interfaces (APIs), code that makes it possible for digital devices, applications and servers to communicate and share data. This code, or collection of communication protocols and subroutines, simplifies that communication, or data sharing. The use of APIs is growing exponentially, year over year and with the growth of cloud computing… Load More