Insight Search

Sort by:
  • Client Story

    February 8, 2023
    A global health services company needed to execute on its corporate promise to deliver affordability and convenience to its patients. However, the company discovered that there was a disconnect between that promise and intended delivery. Further investigating that disconnect revealed that the organisation's procedures for tracking and delivering rebate payments were hampered by complex, time-…
  • Client Story

    February 7, 2023
    A global hospitality company needed to transition their highly manual process for RFPs to one that was more automated. The need to update their processes was driven by the changes required to address the Covid-19 pandemic, which created a dynamic business environment and market demands to act nimbly. The company recognised it required a solution that could automate and expedite a traditionally…
  • Survey

    February 13, 2023
    Global uncertainty, disruption, talent, culture … these are among the challenges on the minds of CFOs for both the near and long term, according to the results of the latest Top Risks Survey conducted by Protiviti and NC State University’s ERM Initiative. The CFOs’ constellation of responsibilities continues to move farther beyond the boundaries of traditional finance and accounting activities, a…
  • Survey

    February 14, 2023
    Responses to Selected Questions Received During Webinar – January 11, 2023 We received numerous questions during our January webinar on Executive Perspectives on Top Risks for 2023 & 2032. While we responded to some during the webinar, we were unable to cover all of them. We have selected a number of the unanswered questions that we believe to be of general interest and have included…
  • Podcast Transcript

    February 6, 2023
    We’ve talked about how quantum computers are enabling extraordinary use cases now, long before the machines will threaten cryptography. Some of these applications can even help companies protect against immediate security threats and vulnerabilities. We explore one such exciting experiment: Using quantum to stop kill chains that allow network exploitation and the Chinese paper causing all the…
  • Podcast Transcript

    February 7, 2023
    Quantum computing requires quantum networking to reach its full potential. But there are engineering challenges to overcome. Learn about how repeaters that extend entanglement between qubits are really just application-specific quantum computers of their own. Also, learn how connecting these devices will pave the way for interconnect and other advances. Join host Konstantinos Karagiannis for a…
  • Survey

    September 10, 2024
    Explore key findings from our finance survey on CFO transformations and global trends, emphasising tech's role in strategic growth and security.
  • Client Story

    December 19, 2022
    Governmental agencies can be seen as slow to adopt new processes, but when the COVID-19 pandemic hit, this foreign defense agency needed to make a quick shift to remote working for both civilian and non-civilian employees while maintaining a high level of readiness. They urgently rolled out Microsoft 365 to enable remote work and communication for approximately 60,000 of their approximately 150,…
  • Client Story

    February 6, 2023
    In many organisations the procurement function is thought of purely as an administrative function and cost center, but addressing opportunities in this area offers a chance to add significant value to the organisation. Investment and focus on the procurement function can enhance business outcomes, improve the bottom line and help manage risk, especially during periods of rising inflation and…
  • Podcast

    January 11, 2023
    We’ve talked about how quantum computers are enabling extraordinary use cases now, long before the machines will threaten cryptography. Some of these applications can even help companies protect against immediate security threats and vulnerabilities. We explore one such exciting experiment: Using quantum to stop kill chains that allow network exploitation and the Chinese paper causing all the…
Loading...