Insight Search

Sort by:
  • Client Story

    January 6, 2023
    d2i is a cloud-based healthcare analytics solutions firm that’s on the move. The company provides an unparalleled data analytics application that aggregates, harmonizes and enriches diverse data sources to some of the largest hospital emergency departments (ED) in the United States. The company currently extracts Electronic Health Record (EHR) data into their environment for over 240 hospitals.…
  • Podcast

    August 17, 2023
    Tonya Hummers, Managing Director at Protiviti, speaks with Sarah Olthoff, Senior Vice President and Chief Business Risk Officer at Discover Financial Services.Watch the podcast as Tonya and Sarah discuss resiliency and adaptability as key traits for succeeding in the face of challenges, the evolving nature of work environments and shifts towards hybrid models to support flexible schedules in the…
  • Survey

    June 9, 2022
    Assessing SOX internal costs, hours, controls and other trends in the results of Protiviti’s 2022 Sarbanes-Oxley Compliance SurveyTwo-plus years into contending with a global pandemic, business leaders recognise that Sarbanes-Oxley compliance activities are not immune to a broad range of market disruptions. Inflation, a rising interest rate environment, ongoing supply chain volatility, a bruising…
  • Whitepaper

    August 26, 2020
    According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction.
  • Whitepaper

    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this fifth installment focuses on the cross-border transfer of data — or data localisation — that is outlined in Article 37.
  • Podcast

    June 29, 2022
    In late 2020, physicists in China generated controversy by claiming quantum advantage with a photonic quantum computing system that’s technically not programmable. Other companies have been experimenting with photonic systems, including QuiX Quantum. How do these machines work? Should scientists redefine what quantum advantage means, focusing on practical, usable problems a machine is solving?…
  • Podcast Transcript

    October 5, 2022
    In late 2020, physicists in China generated controversy by claiming quantum advantage with a photonic quantum computing system that’s technically not programmable. Other companies have been experimenting with photonic systems, including QuiX Quantum. How do these machines work? Should scientists redefine what quantum advantage means, focusing on practical, usable problems a machine is solving?…
  • Whitepaper

    February 9, 2023
    End-user developed applications (EUDAs) — applications developed and maintained by an organisation’s users rather than its information technology (IT) department — are a significant source of risk in financial institutions (FIs), as they are increasingly relied on to provide critical data for financial, management and regulatory modelling and reporting. The applications — also known as end-user…
  • Podcast

    December 7, 2021
    Cybersecurity continues to be a critical area of concern for organisations and virtually any leader you ask – board members, CIOs, CFOs, and many more. But as elevated as those risks are today, the real threat may be just around the corner, particularly concerning cryptocurrency. Crypto has been viewed as highly secure, but the rapid emergence of quantum computing, which is set to deliver…
  • Survey

    December 19, 2023
    CPG and retail finance leaders cite ESG, inflation and data security as top prioritiesWhether it is dealing with inflation, supply-chain disruptions or workforce challenges, finance leaders in the retail and consumer packaged goods (CPG) industries are leading their organisations’ efforts to navigate today’s uncertain market environment. Increasingly, companies are leaning on finance leaders to…
Loading...