Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper May 21, 2020 Enterprise & Market Resilience Middle East Forum (Session 5): Unlocking Value from Data - A Financial Services Perspective At Protiviti, we believe there is tremendous value to be gained in collaborating and learning from each other – more so during these challenging times. Hearing new and alternate perspectives can help us challenge our own points of view, enhance resilience and provide us with the much needed assurance as we taken critical decisions. Over 200 business leaders and financial services… Newsletter April 17, 2020 COVID-19: Paradigm Shift in the Boardroom The global COVID-19 pandemic is a different experience from other catastrophic events like the September 11, 2001 attacks and the 2007-2008 global financial crisis. It is spawning new thinking in all quarters, especially in boardrooms. It’s been several weeks since coronavirus disease 2019 (COVID-19) truly captured everyone’s attention across the globe. But with new developments almost hourly,… Podcast Transcript December 7, 2021 Transcript | Preparing for the Quantum Threat to Cryptography and Cryptocurrency Cybersecurity continues to be a critical area of concern for organisations and virtually any leader you ask – board members, CIOs, CFOs, and many more. But as elevated as those risks are today, the real threat may be just around the corner, particularly concerning cryptocurrency. Crypto has been viewed as highly secure, but the rapid emergence of quantum computing, which is set to deliver… Podcast January 11, 2023 Podcast | IT Audit Perspectives on Today’s Top Technology Risks Die größten IT-Audit-Bedenken beziehen sich auf Verstöße gegen die Cybersicherheit und damit verbundene Risiken. Data Governance und Datenintegrität werden auf den Prüfstand gestellt. Der Aufwand für die Einhaltung gesetzlicher Vorschriften und das Risiko nehmen rapide zu. Dies sind einige der wichtigsten Schlussfolgerungen Survey March 10, 2023 Talent, culture, cybersecurity and resiliency represent top risk issues for higher education institutions Der Grad an Unsicherheit auf dem globalen Markt und die Geschwindigkeit des Wandels bringen eine Vielzahl potenzieller Risiken mit sich, die das Geschäftsmodell und die Strategie eines Unternehmens in kürzester Zeit beeinträchtigen können. Newsletter November 29, 2023 Setting the 2024 Audit Committee Agenda Im Vergleich zu den Vorjahren hat sich die von uns für 2024 vorgeschlagene Agenda des Prüfungsausschusses aufgrund der aktuellen und jüngsten Markt- und Regulierungsentwicklungen ein wenig verändert. Newsletter June 12, 2024 21st-Century Board Oversight of Talent Acute talent shortages across numerous industries underscore the risks emanating from outdated, reactionary approaches to managing people, succession and culture. The question arises, what is the board’s role in forging a 21st-century approach to managing talent?Changing times have led to fleeting employee loyalty, as talented individuals have more options than ever before with greater… Whitepaper April 17, 2024 Internal Audit’s Role in Supporting Sustainability Reporting Die ESG-Leitlinien, Forderungen von Stakeholdern und behördliche Auflagen entwickeln sich weiter und werden immer spezifischer. Dabei ist die Rolle des Internal Audits bei der Berichterstattung unerlässlich. Flash Report February 28, 2022 Putin Pulls the Trigger and the West Responds Again: What Happens Now? On February 23, Protiviti issued a Flash Report on Vladimir Putin’s recognition of two Ukrainian regions as “independent people’s republics,” deployment of “peacekeeping forces,” and demands that Ukraine disarm and negotiate the sovereignty of the two separatist regions. The Flash Report also summarised the sanctions that had been imposed by the West in response to Putin’s aggression. Much has… Newsletter May 3, 2022 Ransomware: Preventing an Attack and Responding to and Recovering From an Attack Ransomware attacks have been around for many years. In the past, cyber-threat actors would penetrate a company’s computer and network systems and obtain data with the objective of returning it upon payment. The demanded payments were usually smaller than the ransoms requested in recent incidents. Most of these incidents weren’t financially material, nor were they reported publicly. By contrast,… Load More