Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog October 24, 2018 Navigating the Legal and Regulatory Landscape As companies around the world adapt to comply with the EU’s General Data Protection Regulation (GDPR), legislators in the United States are under pressure from constituents to pass even more consumer privacy protection. That pressure increases with every major data privacy breach and has reached a point where the heads of major social media organizations were recently called to testify before the… Blog October 29, 2018 Security in a Multicloud Environment Security in a Multicloud Environment Multicloud strategies are often adopted with benefits such as enhanced reliability, access to vendor-specific solutions and the ability to avoid vendor lock-in in mind. These anticipated benefits of engaging with multiple cloud providers also create challenges in scaling and maintaining security and compliance across diverse environments. Three of the most… Blog November 1, 2018 Quantifying Cyber Risk: Takeaways from FAIRCON18 At a time when cyber/information security risk looms large on the minds of directors and executives, quantitative risk assessments are gaining traction as a way to understand and measure that risk. While the need to measure this risk grows, most organizations are still at a low level of maturity regarding the proper use of risk terminology and risk modeling. Getting support and, more importantly… Blog November 6, 2018 Finance Data Priorities: First Get It Right, Then Make It Pretty Baseball great Yogi Berra is fondly remembered for famously miscalculating that, “Baseball is 90 percent mental. The other half is physical.” Unfortunately, making similar miscalculations on data in the business world is neither funny nor fondly remembered – such errors can damage reputations and create conflicts with customers, investors and regulators. As we increase our reliance on data for… Blog November 14, 2018 Why Organizations Should Consider a Cybersecurity Program Office As part of our Cybersecurity Webinar Series for October’s National Cybersecurity Awareness Month, we presented a webinar recently, discussing the value of establishing a program office dedicated to cybersecurity. Cyber crime is now considered one of the top three risks to an enterprise. Many organizations seek to build security by adding tools and processes on top of their established operations… Blog November 16, 2018 Oracle Security in the Cloud As part of our webinar series for October’s National Cybersecurity Awareness Month, we recently offered a webinar on Oracle ERP Cloud, covering implementation and governance of security. Here are some of the key points from our discussion. The benefits of cloud-based applications are many – they are easy to access, requiring only the internet and a browser. Fewer resources are required to… Blog November 21, 2018 Recognizing the People Element in Data Security Implementations Implementing information security technology and creating related policies is relatively easy. Getting the organization to better manage risks through the use of that technology and embrace those policies is quite a bit harder. In a recent survey by ESI ThoughtLab, co-sponsored by Protiviti, untrained staff was seen as the greatest cyber threat by businesses because it can provide a… Blog November 26, 2018 Enhancing Security Strategy for Cloud-Based Technology As part of our Cybersecurity Webinar Series last month, we presented a webinar on enhancing security strategy for cloud-based technology. Here is a summary of the topic discussed. For the full discussion, including questions from the live audience, click on this link to listen to the archived version of the webinar. State of the Industry Digital innovation is a double-edged… Blog November 30, 2018 Securing SAP S/4HANA with GRC 12 and IAG With enterprises focusing on big data, mobility and cloud while managing cybersecurity risks that could exploit internal vulnerabilities that allow access to sensitive data, organizations have been on high alert about how to manage this risk effectively. Protiviti recently held a webinar highlighting new features in SAP’s latest governance module, GRC 12, and Cloud Identity Access… Blog January 14, 2019 Think Purple to Strengthen Security Solutions "Major cyber security breaches have become routine as organizations rely increasingly on vulnerable technologies and third-party providers" – Protiviti’s 2018 Security Threat Report Organizations always ask us the same three things: Can we really prevent a breach? Can we detect a breach? Are we currently breached? Staying ahead of each of these three scenarios requires an organization to… Load More