Results for “Quantum Computing” Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog March 24, 2020 Operational Resilience: Measuring Impact Tolerance the FAIR Way Among the UK supervisory authorities’ proposals and expectations for building operational resilience, the rules on “impact tolerance” have generated substantial debate and confusion. Mostly, the discussion has centered around how firms would go about quantifying that point in time when the viability of their important business services and processes is irrevocably threatened by a disruptive event… Blog October 7, 2016 10 Tips for Companies to Raise Cyber Awareness Among Employees October is Cyber Security Awareness Month. Follow our blog for the latest from our experts on how to reduce your cybersecurity risk and related issues. Although much of the media attention surrounding cybersecurity tends to focus on hackers forcing their way into systems, research shows companies are almost twice as likely to suffer from a self-inflicted breach via email phishing, or other… Flash Report June 8, 2023 U.S. Banking Regulators Finalize (Finally) Revised Third-Party Risk Management Guidance On Tuesday, June 6, 2023, the Office of the Comptroller of the Currency (OCC), the Board of Governors of the Federal Reserve System, and the Federal Deposit Insurance Corporation (collectively, the agencies) issued the “Interagency Guidance on Third-Party Relationships: Risk Management.”[1] This marks the long-awaited finalization of the proposed guidance that was initially issued on July 19,… Blog March 13, 2017 Partly Cloudy: Outage Raises Resiliency Concerns Everyone needs a little downtime – critical IT infrastructure, not so much. Security and reliability have long been the two primary enterprise concerns when it comes to the cloud. And while security has been the dominant concern over the past couple of years, recent high-profile cloud outages have brought reliability front and center. A recent outage affected almost 150,000 sites. In the not so… Blog March 12, 2014 Today’s IT Organization – Delivering Security, Value and Performance Amid Major Transformation Today, Protiviti released the results of its 2014 IT Priorities Survey, and in it, there are some remarkable findings. Indeed, if there is one word to describe the state of IT organizations in 2014, it is transformation. We found that nearly two out of three organizations are undergoing a major IT transformation. Consider the change and disruption this undoubtedly is creating within IT… Leadership Shinoy George Shinoy George is a Managing Director and the Security Operations and Managed Security Services (MSS) Practice Leader within Protiviti. He has over 20 years of technology consulting experience delivering cyber defense solutions, security options, forensics, and overseeing design and construction of client cybersecurity centers.Shinoy is a global technology operating executive and trusted advisor… Blog November 16, 2023 Cashless Countries, Digital Dollars, Privacy in Peril? New Protiviti-Oxford Global Executive Survey What we found: Eighty-five percent of executives expect a cashless society as soon as 2028 and are preparing to embrace a new, digital currency future, according to the results of a new global survey, Executive Outlook on the Future of Money, 2033 and Beyond, which Protiviti conducted in collaboration with the University of Oxford. Why it matters: The survey, part of VISION by Protiviti’s … Survey September 26, 2024 From AI to Cyber - Deconstructing a Complex Technology Risk Landscape Protiviti’s global internal audit survey 2024 highlights the challenges and technology risk trends faced by internal auditors worldwide. Download the report. Leadership Tom Andreesen Tom is a managing director with over 33 years’ experience helping organizations develop and implement a variety of business and technology solutions to enhance their operations. Tom has also helped companies establish risk management capabilities and overall governance programs to help address operational risks, technology risks, and regulatory compliance requirements. Tom is the leader of… Blog April 9, 2024 Securing Large Language Models: Unique Challenges and Rethinking Traditional Security Approaches Large Language Models (LLMs) are computational systems that process and generate text by learning from vast datasets. These advanced models, which can understand and generate human-like text, have become integral in driving business innovations, enhancing operational efficiencies and fostering deeper stakeholder engagement. Despite their transformative impact, LLMs also introduce new… Load More