Insight Search

Sort by:
  • Blogs

    April 6, 2023
    This blog post was authored by Siobhan Moran - Director, Senthil Kumar Kothandaraman - Associate Director, Security and Privacy on The Technology Insights Blog. DevSecOps is an organisational software engineering culture and practice that aims at unifying software development (Dev), application security (Sec), and operations (Ops). The main characteristic of DevSecOps is to monitor and…
  • Podcast

    September 20, 2022
    Christine Halvorsen, Protiviti's U.S. Risk and Compliance lead, talks with Lynn Haaland, Chief Compliance, Ethics & Privacy Officer at Zoom Video Communications about the Risk and Compliance at the speed of modern business. Halvorsen and Haaland discuss how to establish a successful framework for managing privacy and compliance in a technology company and how to balance top privacy issues at…
  • Whitepaper

    October 13, 2021
    Corporate finance teams in technology, media and telecommunications (TMT) are embracing new operating models, strategies and technologies in response to the escalated business risk and regulatory environment, as well as shifting expectations of both internal and external customers. Across the industry, teams continue to increase their focus on top priorities identified at the height of the…
  • Newsletter

    September 28, 2022
    “Outsourcing and other third-party relationships can bring multiple benefits to FIs, including: enhanced operational resilience; faster and more tailored financial products and services; cost reduction; greater innovation; and improved internal processes. However, outsourcing and third-party relationships can give rise to new or different risks to FIs and potentially to financial stability that…
  • Blogs

    June 4, 2021
    Ensuring IT risks are managed, and compliance requirements are met has only intensified with the recent rapid growth in adoption of cloud services. Deployment of production workloads, migration of regulated systems and increasing storage of large volumes of data in the cloud has driven the need for security and controls to be deployed across customer cloud environments.
  • Whitepaper

    July 28, 2022
    The past 18 months have seen a significant increase in threats targeting critical infrastructure and operational technology (OT) networks. These environments are prime targets due to their age, complexity and importance to organisations. OT is the driver behind the largest corporations in the world – whether it is mixing the secret recipe for Coca-Cola, generating power for millions of customers…
  • Whitepaper

    February 21, 2023
    This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organizations can take to implement the changes introduced. There have been significant advancements in technology, as well as an increase in the complexity of security threats since the last iteration of ISO 27001 was published on September 25, 2013. The changes introduced in…
  • Flash Report

    November 16, 2023
    The results from the recent ASIC cyber security survey, ‘REP 776 Spotlight on cyber: Findings and insights from the cyber pulse survey 2023,’ released on 13 November 2023, have once again highlighted the security posture of corporate Australia’s management of cyber security. While there were some encouraging trends in specific security capabilities around identity and access management,…
  • Blogs

    June 3, 2021
    In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti…
  • Flash Report

    November 3, 2023
    In this Flash Report, we summarize the SEC’s allegations against SolarWinds and offer nine points for executives and functional leaders with SEC registrants to consider regarding their own accountability and responsibility for public reporting.
Loading...