Insight Search

Sort by:
  • Whitepaper

    September 15, 2022
    Haben Sie die Abkürzung „IPE“ schon einmal gehört und kennen Sie die Besonderheiten bei der Prüfung von „Monitoring oder Management-Review Controls“? Wir analysieren gemeinsam mit Ihnen inwieweit Sie die Anforderungen bereits erfüllen und geben Handlungsempfehlungen.
  • Newsletter

    July 29, 2020
    In your monthly compliance news roundup, you will read about: Implications of Class Action Suit Alleging Misleading Autopay Options Recapping Regulatory Responses to COVID-19 DOJ Updates Guidance on Evaluating Corporate Compliance Programmes Regulators Aim to Provide Financial Institutions Clear Guidance and Improve Compliance
  • Video

    October 14, 2021
    Healthcare Provider Internal Audit Plan Priorities Funding, privacy, security and IT system changes dominate priorities for healthcare internal auditors. In this sessions learn about key findings from the latest survey conducted by Protiviti and AHIA on Healthcare Provider Organisation Internal Audit Plan Priorities. Speakers: Richard Williams, Managing Director Alex Robison, Managing Director…
  • Whitepaper

    April 4, 2023
    Chief financial officers (CFOs) in the technology sector met to discuss leading industry practices, trends and other topics of mutual interest in a virtual roundtable conducted under the Chatham House Rule. The agenda for this virtual exchange, hosted by Protiviti Managing Directors Gordon Tucker, Christopher Wright and Fran Maxwell, was created through a series of pre-interviews. Comments from…
  • Podcast Transcript

    September 22, 2021
    Engineering challenges abound in quantum computing. Technologies like interconnect and improved memory for repeaters will enable these machines to accelerate and power connectivity in the future. Q-NEXT is one of five quantum information science research centers funded by the DOE to help develop these technologies in addition to strengthening the nation’s leadership position in the quantum arms…
  • Whitepaper

    November 18, 2020
    Wie Management von Risiken aus einem Guss gelingen kann In den meisten Unternehmen finden sich verschiedene Funktionen, die sich im weitesten Sinne mit Risiken auseinandersetzen – Risikomanagement, Compliance, Information Security, Internes Kontrollsystem oder Interne Revision, um nur einige zu nennen. Oft sind die einzelnen Funktionen in ihren Tätigkeiten personell und methodisch gut…
  • Whitepaper

    February 24, 2021
    What to Expect and When The main headline about the Anti-Money Laundering Act of 2020 (AML Act) has been that the United States finally moved to address a long-standing gap in its anti-money laundering (AML) regime by establishing a national registry of beneficial owners. Not reading beyond that headline, however, would be a mistake because the AML Act includes many other provisions that, taken…
  • Podcast Transcript

    May 5, 2021
    What do you do when you’re working on what could be the world’s most powerful quantum computer … but it’s not quite ready? Well, you give access to other powerful systems via your cloud environment. During this episode we discuss Microsoft Azure Cloud, software development environments and abstracting away complexity, muse on when or if topological computing will arrive (and explain it), and…
  • Whitepaper

    August 12, 2021
    Introduction Most technology companies today understand that ensuring data privacy and protection is an imperative for their business; however, few manage this process well or even invest enough resources in that effort. As governments and consumers around the world continue to raise their expectations of how technology businesses should handle and process private and sensitive data,…
  • Insights paper

    March 20, 2024
    In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape surrounding data protection, organisations must adapt swiftly to ensure compliance and maintain trust with their customers and stakeholders. However, both data sovereignty and localisation play an important role in privacy, as discussed in a previous post…
Loading...