Cybersecurity
Collection

Cyber resilience is an organisation’s ability to detect, prevent, respond, recover and learn from cybersecurity disruptions. Our cybersecurity collection explores common issues, trends and what organisations must do to prepare proactive and reactive solutions to and keep your assets safe.

Featured Insights

2025 Report on Top Risks
Read Protiviti's Top Risks Report 2025 covering executives' views on emerging risks related to AI, cyber threats, talent management, and economic...

Understanding the Impact of the EU AI Act: A Primer for Financial Institutions
Navigate the EU AI Act's impact on finance with our strategic guide to compliance and ethical AI use.

Establishing a scalable AI governance framework
Establishing an AI governance structure paves the way for effective management and measurement of AI solutions, fostering innovation while mitigating...

CFOs Address a Data Security and Privacy Triple Threat
CFOs prioritise addressing the trifecta of data security and privacy threats due to rising cyber warfare, extortion risks, and stringent regulatory...
Digital Identity

NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation
On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity...

The importance of dark web monitoring
In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of...

A Guide to pen testing and red teaming: What to know now
Penetration testing and red teaming are essentialcybersecuritypractices that bolster an organisation’s security posture by uncovering...

For $62.59, the 8 Character Password is Still Dead
Five years ago, we wrote a post called “The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight...
Data Privacy & Protection

Enhancing Consent Management with OneTrust
Protiviti and OneTrust helped a global software and IT solutions provider enhance its consent management processes, ensuring regulatory compliance....

Best Practices for Building a Sustainable PCI DSS Compliance Programme
Creating and maintaining a sustainable PCI DSS compliance programme is a crucial and complex task for organisations to protect payment card...

Trusted Partnerships and Collaborative Efforts Drive Success in Data Privacy Initiatives
We partnered with the client in building and maturing a data privacy program, including enhancing the company’s privacy rights process into a...

Mastering Data Dilemmas: Navigating Privacy, Localisation and Sovereignty
In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape...
Security Resilience

Enhancing Cyber Resilience Strategies in Global Manufacturing with the FAIR Methodology
Protiviti helps a global manufacturer enhance cyber resilience strategies with a Factor Analysis of Information Risk (FAIR) quantification programme.

Will CrowdStrike serve as a reboot on tech resiliency?
Global IT systems are still in reboot and recovery after a software update by cybersecurity vendor CrowdStrike caused a massive worldwide outage of...

Infographic | SIFMA’s Quantum Dawn VII
Quantum Dawn VII is the latest iteration of SIFMA's biannual cybersecurity exercise focused on the outage of a critical third-party service provider ...

DORA Compliance: Untangling Key Hurdles to Implementation
The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final...
Security Strategy & Architecture

SIFMA’s Quantum Dawn VII After-Action Report
The latest iteration of SIFMA’s biannual cybersecurity exercise focused on the outage of a critical third-party service provider. The simulation and...

CIOs and CTOs See Skills, Staffing and Talent as Top Risk Concerns
Businesses today face a myriad of challenges as they work to adapt and transform their operational models in order to overcome future obstacles,...

Simple is secure: Streamlining smart contract design
For security teams looking to implement and design smart contracts, there are many intricacies and nuances that can be overwhelming. Using established...

Smart contracts part 1: What is a smart contract?
In recent years, there’s been considerable talk of blockchain and its use cases in the business world. While some of these topics have specific use...