Insight Search

Sort by:
  • Whitepaper

    February 8, 2023
    The digital revolution has led to an explosive growth in the amount of data created and collected, driving businesses to seek new ways to manage and discover value in the data they hold. In turn, the growth of stored data has been a longstanding management problem, which if not addressed can lead to potential vulnerabilities, data misuse, and possible data loss.
  • Whitepaper

    May 30, 2023
    Servicers in lending organisations are challenged with navigating economic headwinds that are pushing delinquency- and default-rate projections higher. This task has been complicated by increased global regulatory focus and dynamic customer expectations, which are further providing impetus for servicers to reassess existing strategies and processes from a compliance perspective while continuing…
  • Whitepaper

    March 11, 2024
    Internal audit (IA) functions continue to undergo significant changes ranging from the expanded use of emerging technologies, including robust data analytics and artificial intelligence (AI), and options on where their people work (i.e., remote, hybrid or onsite). IA functions within healthcare organizations have continued to evolve and adapt— some faster than others. Keep the pace by comparing…
  • Whitepaper

    April 2, 2024
    Artificial intelligence (AI) has become increasingly important in the enterprise, thanks in part to the rise of generative AI (GenAI). While not a new technology or concept, AI (including machine learning) holds tremendous promise to transform various business functions and activities worldwide — from accounting and finance to cybersecurity, customer experience and more. In boardrooms and C-suite…
  • Blogs

    June 30, 2023
    We’ve all heard the saying, “what gets measured gets done,” meaning that regular measurement and reporting helps to keep organisations focused on the information that matters. But with so many data points available to measure security, it is difficult to know where to begin. Security practitioners must constantly question what data they collect and why. Only by providing relevant measures can we…
  • Blogs

    May 5, 2023
    Cybersecurity governance should do more than manage cyber risk. Good cybersecurity governance creates efficiencies by clarifying the outcomes expected from its processes and establishing boundaries of responsibility among cybersecurity practitioners, frontline operational areas, senior leaders and board members. Recently, numerous crises have drawn senior leaders and board members down…
  • Blogs

    April 19, 2024
    As senior executives face more pressure to respond to rising costs and eroding profit margins, CFOs can remind their colleagues that they have more cost-optimisation strategies than they might expect.Many business leaders reflexively reach for the headcount-reduction lever. This is understandable given the rising cost of labor and that downsizing and reducing year-end bonuses usually hits the…
  • Blogs

    December 16, 2022
    Protiviti was very pleased to announce its exclusive partnership with Microsoft as the launch of the new Microsoft Supply Chain Platform was unveiled. As a platform that integrates the value chain beyond an enterprise’s four walls, the Microsoft Supply Chain Platform enables collaborations with upstream and downstream partners to deliver transparency and orchestrate the…
  • Blogs

    April 6, 2023
    I am often asked, with all the investments in data management and infrastructure over the last 50 years, why are we still not great with governing data? To put it simply and directly – it’s hard! Data governance programmes are easy to envision conceptually, difficult to implement, and without proper care, impossible to sustain. Often data governance investments have a long ‘time to…
  • Blogs

    July 31, 2023
    Nina Jane Patel, Bloomberg's technology columnist, recently entered the metaverse environment Horizon Venues, a newly launched virtual-reality social platform, to have a look for herself. She found the virtual, extended, augmented and mixed reality, along with other Web 3.0 tools, engaging but also a little too real. She unfortunately experienced some “creepy” encounters that included groping,…
Loading...