Insight Search

Sort by:
  • Blogs

    July 10, 2023
    Enforcing real-world laws in virtual worlds is complex as it raises issues regarding jurisdiction, sovereignty, and the application of laws to virtual spaces. Roblox recently brought an action against a content creator, alleging the individual had been engaging in harassing behavior in violation of the Roblox terms of service.
  • Infographic

    November 18, 2022
    Whether migrating to cloud-based applications or enhancing data security and privacy or managing workforce disruptions, chief financial officers at technology, media and telecommunications (TMT) organisations are resetting priorities and reimagining their long-term roles. Below are some of the key takeaways from the TMT results of Protiviti's latest Global Finance Trends Survey. Read full survey…
  • Blogs

    June 4, 2021
    Ensuring IT risks are managed, and compliance requirements are met has only intensified with the recent rapid growth in adoption of cloud services. Deployment of production workloads, migration of regulated systems and increasing storage of large volumes of data in the cloud has driven the need for security and controls to be deployed across customer cloud environments.
  • Video

    October 14, 2021
    Healthcare Provider Internal Audit Plan Priorities Funding, privacy, security and IT system changes dominate priorities for healthcare internal auditors. In this sessions learn about key findings from the latest survey conducted by Protiviti and AHIA on Healthcare Provider Organisation Internal Audit Plan Priorities. Speakers: Richard Williams, Managing Director Alex Robison, Managing Director…
  • Whitepaper

    February 21, 2023
    This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organizations can take to implement the changes introduced. There have been significant advancements in technology, as well as an increase in the complexity of security threats since the last iteration of ISO 27001 was published on September 25, 2013. The changes introduced in…
  • Whitepaper

    July 28, 2022
    The past 18 months have seen a significant increase in threats targeting critical infrastructure and operational technology (OT) networks. These environments are prime targets due to their age, complexity and importance to organisations. OT is the driver behind the largest corporations in the world – whether it is mixing the secret recipe for Coca-Cola, generating power for millions of customers…
Loading...