Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper May 17, 2023 Long-term incentive plans (LTIPS): Cash vs. Equity This paper explores the differences between cash-based and equity-based Long-Term Incentive Plans (LTIPs) and how to choose between them based on various factors. Cash-based LTIPs offer executives a guaranteed cash reward when certain performance targets are met, while equity-based LTIPs offer stock options or restricted stock units (RSUs) that align executives' interests with those of the… Whitepaper May 23, 2023 Insights into KSA's Personal Data Protection Law The Personal Data Protection (PDP) Law of the Kingdom of Saudi Arabia was implemented on 16 September 2021, supported by Executive Orders, which provide detailed guidelines and standards for companies to achieve compliance with the Law. The document describes the core elements and scope of the PDP Law, its impact on violations and the way forward for companies to comply with the regulations. Whitepaper May 22, 2023 Green Hydrogen–Future of Energy Transition This paper discusses the three categories of hydrogen production. It highlights that energy transition is a process and that green hydrogen is the most viable long-term option for sustainable energy production. Green hydrogen policies need to be created to enable comparison with other energy sources. These should ensure consistency and compatibility with emissions for other commodities and enable… Client Story June 30, 2023 Change management, automation and new digital tools transform finance operations for educational services company A $1 billion educational services holding company that operates in the U.S., Australia and New Zealand needed to transform its finance operations. The organisation, which operates numerous higher-education institutions and provides a workplace educational benefits administration solution, enrolled more than 100,000 students in its universities and served 50,000 workplace learners in 2021, growing… Whitepaper March 24, 2023 Collaboration: The key to better management of cybercrime and financial crime By Carol Beaumier and Bernadine ReeseSharing information and lessons learned has become increasingly critical for the effective management of cybercrime and related financial crime. This need requires financial institutions to rethink how they have historically managed these risks. Whitepaper June 27, 2023 What Role Should Compliance Play in ESG? By Bernadine Reese and Jackie SanzRegulators and many other stakeholders are intently focused on how financial institutions address environmental, social and governance (ESG) matters. Within financial institutions, boards of directors, executive management and much of the C-suite are weighing in on the ESG strategy and approach. Chief compliance officers (CCOs), though, have been remarkedly… Client Story February 16, 2023 Protiviti helps global energy conglomerate complete a complex integration of an E&P target Rising energy prices and the resulting profitability typically generate a flurry of merger and acquisition activity in the oil and gas sector. The deals frequently target organisations that are independent and entrepreneurial in spirit — companies that have amassed a significant but often underdeveloped asset base and whose processes generally have not kept up with the growth of the company. The… Whitepaper February 21, 2023 ISO 27001: 2022 - Key Changes and Approaches to Transition This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organisations can take to implement the changes introduced. There have been significant advancements in technology, as well as an increase in the complexity of security threats since the last iteration of ISO 27001 was published on September 25, 2013. The changes introduced in… Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organization’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Whitepaper June 28, 2023 Navigating State of Data Privacy in the Middle East Independent study to offer perspectives and considerations for GCC organisations embarking on the data privacy journeyData has become a crucial driver for businesses in today's digital age, as organisations can leverage data from various sources, including consumer behavior and operational insights, to make informed decisions, improve efficiency, and drive innovation. However, consumers are… Load More