Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Client Story July 24, 2022 Managing through change: A small professional association gains flexibility and freedom Smaller firms can’t afford to be heavily dependent on technical consultants or bound to a portfolio of siloed applications that don’t provide the ability to track data. Recently, the visionary leader of a healthcare professional association freed her business from these dilemmas. But the flexibility and strength her small team stood to gain from their digital transformation initiative were… Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organization’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Whitepaper March 24, 2023 Collaboration: The key to better management of cybercrime and financial crime By Carol Beaumier and Bernadine ReeseSharing information and lessons learned has become increasingly critical for the effective management of cybercrime and related financial crime. This need requires financial institutions to rethink how they have historically managed these risks. Whitepaper September 8, 2022 Risk Management and Internal Controls Study Report - Roles, Responsibilities & Liabilities of Independent Directors Study findings emphasize the need for Companies to strengthen Internal Control Safeguards to prevent Corporate Frauds Confederation of Indian Industries (CII) and Protiviti Member Firm for India, in association with National Foundation for Corporate Governance (NFCG) has come out with a detailed study emphasizing the need for companies to strengthen Internal Control safeguards to prevent… Survey March 10, 2023 Talent, culture, cybersecurity and resiliency represent top risk issues for higher education institutions The level of uncertainty in today’s global marketplace and the velocity of change continue to produce a multitude of potential risks that can disrupt an organisation’s business model and strategy on very short notice. Unfolding events in Eastern Europe, changes in government leadership in several countries around the globe, escalating inflation, rising interest rates, ever-present cyber threats,… Client Story June 30, 2023 Change management, automation and new digital tools transform finance operations for educational services company A $1 billion educational services holding company that operates in the U.S., Australia and New Zealand needed to transform its finance operations. The organisation, which operates numerous higher-education institutions and provides a workplace educational benefits administration solution, enrolled more than 100,000 students in its universities and served 50,000 workplace learners in 2021, growing… Flash Report November 1, 2023 White House Issues Executive Order to “Seize the Promise and Manage the Risks” of AI In this Flash Report, we summarise the key directives contained in the executive order, address key takeaways and concerns for organisations to consider, and outline steps businesses can take to prepare for changes in the AI regulatory landscape. Podcast Transcript February 6, 2023 Transcript | Preventing Hacking with Quantum Computing and other InfoSec Topics – with Mark Carney from Quantum Village We’ve talked about how quantum computers are enabling extraordinary use cases now, long before the machines will threaten cryptography. Some of these applications can even help companies protect against immediate security threats and vulnerabilities. We explore one such exciting experiment: Using quantum to stop kill chains that allow network exploitation and the Chinese paper causing all the… Client Story December 19, 2022 Global financial services technology company divests its product suite to improve efficiency and drive business growth Challenge:GBST engaged Protiviti to support the divestiture of part of its product suite. The engagement required the segregation and separation of shared products and infrastructure, including separation and migration of on-premises and AWS cloud-based infrastructure and applications.Solution:Over the discovery phase, Protiviti’s engineers worked with the GBST engineering team to identify the… Podcast January 11, 2023 Podcast | Preventing Hacking with Quantum Computing and other InfoSec Topics – with Mark Carney from Quantum Village We’ve talked about how quantum computers are enabling extraordinary use cases now, long before the machines will threaten cryptography. Some of these applications can even help companies protect against immediate security threats and vulnerabilities. We explore one such exciting experiment: Using quantum to stop kill chains that allow network exploitation and the Chinese paper causing all the… Load More