Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs November 29, 2022 Data Governance Shapes Enterprise Transformation In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s… Blogs June 4, 2021 Control Cloud to Manage Security and Risk Ensuring IT risks are managed, and compliance requirements are met has only intensified with the recent rapid growth in adoption of cloud services. Deployment of production workloads, migration of regulated systems and increasing storage of large volumes of data in the cloud has driven the need for security and controls to be deployed across customer cloud environments. Blogs June 3, 2021 Leverage the Cloud to Modernise Technology and Enable Business Goals In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti… Blogs September 27, 2023 Accelerating digital banking transformation with cloud technology By 2025, core banking workload deployment on cloud is expected to be 14% of total IT spend.Banks are grappling with outdated applications; data is siloed and trapped within legacy systems and not accessible for customer insights and tailored experiences and services.Regulatory changes in Australia, the UK and U.S., in GDPR and APRA standards for data privacy and operational resiliency, are also… Blogs November 3, 2023 Tackling gender bias: Women in cybersecurity Cybersecurity is distinguished not only by a talent shortage but also by having a predominantly male workforce. Women are in the minority on most cybersecurity teams that have women at all, so when they experience gender bias, they’re likely to be isolated. Whitepaper September 2, 2021 Towards an Identity-Centric Security Strategy Cyber attacks are rampant Let’s face it, cyber security professionals are not faring well against the increasing sophistication of attacks by hackers. According to the 2020 Verizon Data Breach Investigations report, the world witnessed a challenging year with a whopping 96% increase in successful data breaches against U.S. companies and government agencies as compared to 2019. Cyber attacks… Podcast January 5, 2021 Podcast - Building an Effective Industrial Control Systems Security Programme In this episode, Kevin Donahue, a senior director with Protiviti speaks with Protiviti's associate director Justin Turner and manager Derek Dunkel-JahanTigh about security for industrial control systems, or operational technology. Blogs July 14, 2023 Smart contracts part 1: What is a smart contract? In recent years, there’s been considerable talk of blockchain and its use cases in the business world. While some of these topics have specific use cases – metaverse, decentralised finance, etc – there is one topic that underpins everything in the blockchain and decentralised space: smart contracts. Smart contracts are behind-the-scenes applications that route data, track changes and settle… Blogs July 14, 2023 Cybersecurity risk assessments vs. gap assessments: Why both matter This blog post was authored by Rob Woltering - Associate Director, Security and Privacy on the technology insights blog. As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s operations, cybersecurity risks remain top of mind for many organisations. To this end, organisations are continuously… Flash Report July 31, 2023 SEC Cybersecurity Disclosure Enhancements: Efforts to Boost Investor Confidence On 26 July 2023, the U.S. Securities and Exchange Commission (SEC) adopted amendments1 to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing risk to public companies, investors and market… Load More