Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Client Story February 8, 2023 Global Health Services Company Modernises Data and Applications with Microsoft A global health services company needed to execute on its corporate promise to deliver affordability and convenience to its patients. However, the company discovered that there was a disconnect between that promise and intended delivery. Further investigating that disconnect revealed that the organisation's procedures for tracking and delivering rebate payments were hampered by complex, time-… Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organization’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Whitepaper March 24, 2023 Collaboration: The key to better management of cybercrime and financial crime By Carol Beaumier and Bernadine ReeseSharing information and lessons learned has become increasingly critical for the effective management of cybercrime and related financial crime. This need requires financial institutions to rethink how they have historically managed these risks. Survey February 28, 2023 Infographic | Consumer Products and Retail Executive Perspectives on Top Risks 2023 Across many retail and consumer goods categories, companies are contending with talent shortages that have increased labor costs, product availability challenges, difficulty sustaining customer loyalty and retention, and pressure to implement sustainability practices. According to results from the latest Protiviti-NC State global top risk survey, these are among the key issues being discussed in… Whitepaper September 8, 2022 Risk Management and Internal Controls Study Report - Roles, Responsibilities & Liabilities of Independent Directors Study findings emphasize the need for Companies to strengthen Internal Control Safeguards to prevent Corporate Frauds Confederation of Indian Industries (CII) and Protiviti Member Firm for India, in association with National Foundation for Corporate Governance (NFCG) has come out with a detailed study emphasizing the need for companies to strengthen Internal Control safeguards to prevent… Survey March 10, 2023 Talent, culture, cybersecurity and resiliency represent top risk issues for higher education institutions The level of uncertainty in today’s global marketplace and the velocity of change continue to produce a multitude of potential risks that can disrupt an organisation’s business model and strategy on very short notice. Unfolding events in Eastern Europe, changes in government leadership in several countries around the globe, escalating inflation, rising interest rates, ever-present cyber threats,… Flash Report November 1, 2023 White House Issues Executive Order to “Seize the Promise and Manage the Risks” of AI In this Flash Report, we summarise the key directives contained in the executive order, address key takeaways and concerns for organisations to consider, and outline steps businesses can take to prepare for changes in the AI regulatory landscape. Podcast Transcript February 6, 2023 Transcript | Preventing Hacking with Quantum Computing and other InfoSec Topics – with Mark Carney from Quantum Village We’ve talked about how quantum computers are enabling extraordinary use cases now, long before the machines will threaten cryptography. Some of these applications can even help companies protect against immediate security threats and vulnerabilities. We explore one such exciting experiment: Using quantum to stop kill chains that allow network exploitation and the Chinese paper causing all the… Client Story December 19, 2022 Global financial services technology company divests its product suite to improve efficiency and drive business growth Challenge:GBST engaged Protiviti to support the divestiture of part of its product suite. The engagement required the segregation and separation of shared products and infrastructure, including separation and migration of on-premises and AWS cloud-based infrastructure and applications.Solution:Over the discovery phase, Protiviti’s engineers worked with the GBST engineering team to identify the… Podcast January 11, 2023 Podcast | Preventing Hacking with Quantum Computing and other InfoSec Topics – with Mark Carney from Quantum Village We’ve talked about how quantum computers are enabling extraordinary use cases now, long before the machines will threaten cryptography. Some of these applications can even help companies protect against immediate security threats and vulnerabilities. We explore one such exciting experiment: Using quantum to stop kill chains that allow network exploitation and the Chinese paper causing all the… Load More