Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper August 26, 2020 China's Cybersecurity Law: Multi-Level Protection Scheme (MLPS) In part one of our Point of View (POV) series Interpretations of the updates to China’s Cybersecurity Law, we highlighted the updated legal requirements that impact organisations looking to do business in mainland China. Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Whitepaper August 26, 2020 China’s Cybersecurity Law: Personal Information Protection Law (PIPL) Overview As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection. Podcast Transcript October 8, 2020 Transcript- Cybersecurity Hits Close to Home Welcome you to a new edition of Powerful Insights and our continuing series on cybersecurity awareness. This series is intended to highlight ways organisations can be proactive in addressing these critical security challenges. We explore how leaders can dynamically build cyber resilience while maximising value. In this series, we will be talking to our cybersecurity leaders who are in… Newsletter February 12, 2021 Priorities and Risks – For Private Equity, Lingering Effects of COVID-19 Create a Mix of Opportunities and Risks Concern about the impact of government policies and regulations in response to COVID-19 is the No. 1 risk identified by directors and business executives across many industries. This insight is from our most recent top risk survey. Another survey we conducted last year, focused on technology risks, shows a deepening concern over cybersecurity and privacy issues, as well as regulatory compliance… Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Flash Report October 30, 2020 FBI Warns of Ransomware Assault on the Healthcare and Public Health Sector On October 28, 2020, the Federal Bureau of Investigation (FBI), the Department of Health and Human Services (HHS), and the Cybersecurity and Infrastructure Security Agency (CISA) issued a Joint Cybersecurity Advisory regarding credible information of imminent cyber attacks to infect systems in the Healthcare and Public Health (HPH) sector with Ryuk ransomware. Podcast January 20, 2020 Journey to the Cloud: Debunking Myths and the Role of Artificial Intelligence in Cloud Security Welcome to the new edition of Powerful Insights and our series on Cybersecurity Awareness. Protiviti has a series of webinars on cybersecurity awareness that, along with these accompanying podcasts, are intended to highlight ways organisations can be proactive in addressing these critical security challenges today. We explore how leaders can dynamically build cyber resilience while maximising… Podcast September 20, 2022 Risky Women Podcast | Risk & Compliance at the Speed of Modern Business: Lynn Haaland Christine Halvorsen, Protiviti's U.S. Risk and Compliance lead, talks with Lynn Haaland, Chief Compliance, Ethics & Privacy Officer at Zoom Video Communications about the Risk and Compliance at the speed of modern business. Halvorsen and Haaland discuss how to establish a successful framework for managing privacy and compliance in a technology company and how to balance top privacy issues at… Blogs April 6, 2023 3 Steps to Understanding IAM Challenges in Securing the DevSecOps Ecosystem DevSecOps is an organisational software engineering culture and practice that aims at unifying software development (Dev), application security (Sec), and operations (Ops). The main characteristic of DevSecOps is to monitor and apply security at all phases of the software lifecycle: Planning, development, integration, delivery, deployment and production. Looking at DevSecOps through an IT… Load More