Insight Search

Sort by:
  • Newsletter

    September 10, 2021
    Ransomware is a current threat many people are struggling to understand and manage. Amid the headlines and uncertainty, how can the board respond strategically? Reputation damage, hefty ransoms and business continuity are all concerns with ransomware. But the core of the conversation is about the potential loss of intellectual property and customer information and the specter of unpleasant…
  • Whitepaper

    May 11, 2020
    Like all major employers, insurance companies are dealing with operational and workforce disruptions, as millions of their employees – adjusters, actuaries, underwriters, and risk and loss control managers, as well as analysts, as examples – adapt to a remote work environment. The industry’s policyholder surplus, invested funds set aside by insurers to pay claims, is under pressure as asset…
  • Newsletter

    March 15, 2022
    Data proliferation and data privacy regulatory activity across the globe have created the need for focused boardroom discussions. While cybersecurity continues to be an issue for boards, a more targeted focus on data privacy is increasingly necessary to ensure compliance across a rapidly expanding number of privacy regulations. Privacy risk represents a unique challenge driven by the volume and…
  • Blogs

    April 28, 2022
    Several Key Policies Take Effect March 31, 2022 On March 29, 2021, the Bank of England (BoE), the Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA) issued a series of policy statements to both refine and finalise their approach to operational resilience for financial services firms. Almost concurrent with the release of the policy statements, the Basel Committee on…
  • Survey

    March 29, 2023
    Technology leaders are exploring new ways to drive innovation and maximise the value of IT in a changing world driven by disruption and a need for acceleration Executive Summary Innovation is the name of the game in today’s global market. Recognising this new reality, CIOs, CTOs, CISOs and other technology executives and leaders are exploring new ways to fuel innovation throughout their…
  • Whitepaper

    March 22, 2019
    L’interface applicative n’est que la partie émergée de l’iceberg! Comprendre les défaillances des environnements applicatifs et des infrastructures doit être une priorité pour les intervenants opérationnels ainsi que pour le management. Les applications sont des interfaces d’accès et de traitements des données (métiers, personnelles, …) et ne sont que la partie visible d’un Système d’…
  • Whitepaper

    March 22, 2019
    Let’s explore the Iceberg! Understanding gaps in how your applications and infrastructure protect your data is a priority for both Operations and Executives. Application interface is only the tip of the Iceberg Application are interfaces used to access and process data (business or personal) and are only the visible part of a more complex IT landscape.
  • Whitepaper

    March 28, 2022
    Travail à distance, cyber attaque, guerre asymétrique, fuite de données : les enjeux de la cyber sécurité sont de plus en plus importants. Certes, les investissements au sein des entreprises sont réels mais les attentes du management et des parties prenantes internes et externes sont de plus en plus présentes et les réponses attendues pour les actifs clés se doivent d’être relativement binaires,…
  • Client Story

    June 16, 2023
    A leading biotechnology company that develops life-transforming medicines has worked for decades to improve the lives of those who rely on their work. But recently, they found themselves in need of assistance to enhance the security of their AWS environment.
  • Client Story

    June 16, 2023
    A blockchain/web3 startup engaged Protiviti to review their AWS environment. While getting the product to market as fast as possible was a primary goal for the client, security was an afterthought in many scenarios. To address this need and prevent a potential catastrophic security event, the client wanted a quick and consistent way to understand where their security gaps were and how they could…
Loading...