Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Video December 17, 2018 Video - Vulnerability Assessment and Penetration Testing Vulnerability Assessment and Penetration Testing are the first steps to mitigate the risk of cybercrime. Protiviti helps organizations with a full range of security and privacy services. Our experts attempt to gain access to sensitive target data using common hacking techniques, spearfishing and specialized malware. How do you know whether your organization is protected and your customer data is… Podcast Transcript February 21, 2021 Transcript - ESG and Financial Reporting Trends In this podcast, Protiviti Senior Managing Director Bob Hirth and Managing Director Chris Wright share their thoughts and insights about a number of ESG topics. Podcast March 28, 2023 Future of Crypto Innovation and Regulation Over the past year, as one crypto organisation after another has been beset by fraud or declared bankruptcy, countless headlines have surfaced warning of the death of the crypto industry. Yet the damage has been largely contained.The developments have raised many questions about digital assets, cryptocurrency and blockchain technology as well as regulation and other factors that may help the… Newsletter December 15, 2022 Sustainability and the Board’s Governance Role Global research indicates that companies in North America are less committed to environmental, social and governance (ESG) engagement than those in Europe and Asia-Pacific. What steps should boards seeking to improve their ESG engagement take? Podcast June 27, 2022 Podcast | Building Technology and Data Enabled Capabilities Innovation, transformation and the introduction of more advanced technologies are on the agendas of most groups in an organisation today. The same certainly holds true for internal audit functions – but perhaps not at the same levels of engagement as departments such as finance and IT. In fact, the results of the latest Next-Generation Internal Audit Survey from Protiviti show that overall… Newsletter September 10, 2021 Ransomware: Analysing Risk and Protecting Critical Assets Ransomware is a current threat many people are struggling to understand and manage. Amid the headlines and uncertainty, how can the board respond strategically? Reputation damage, hefty ransoms and business continuity are all concerns with ransomware. But the core of the conversation is about the potential loss of intellectual property and customer information and the specter of unpleasant… Research Guide May 2, 2022 The Guide to Technology Modernisation and Transformation Helping Leaders with their Technology Journey Key Considerations for Technology Modernisation and Transformation CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. This guide contains informative insights and practical tips that CIOs, CISOs, and other technology and C-suite… Podcast April 13, 2022 Podcast | Building Sustainable Operations and Supply Chains It should come as no surprise that, according to research from Protiviti, ESG metrics and measurement are among the top priorities for CFOs and finance teams to address, and a majority are substantially increasing the focus on and frequency of their ESG reporting. A key part of these efforts must be building sustainable operations and supply chains.But this only scratches the surface. Board… Podcast September 1, 2021 Podcast – Today’s Challenges and Trends for Utilities Like organisations in virtually every industry today, utilities are addressing a number of critical challenges and trends in the market, from infrastructure demands, to calls to improve the customer experience, to talent demands, and much more.How will the future for utilities evolve? In this informative podcast, Peter Tumminello and Claire Gotham offer a number of interesting insights into these… Blogs June 4, 2021 Control Cloud to Manage Security and Risk Ensuring IT risks are managed, and compliance requirements are met has only intensified with the recent rapid growth in adoption of cloud services. Deployment of production workloads, migration of regulated systems and increasing storage of large volumes of data in the cloud has driven the need for security and controls to be deployed across customer cloud environments. Load More