Insight Search

Sort by:
  • Podcast

    October 31, 2022
    Supply-chain issues are plaguing the world right now, across all industries, from manufacturing, technology, healthcare, and more. Can quantum computing offer a way to ease the burden and provide real customer advantage? Evidence seems to suggest so. Join host Konstantinos Karagiannis for a chat about this use case, and other innovative ones you may not have heard of, with Alex Khan from ZebraKet…
  • Podcast

    May 4, 2022
    The fear of a quantum cryptographic apocalypse has been with us since the 90s and has launched quite a few careers and companies. Post-Quantum, no relation to this show, has been developing end-to-end solutions for quantum-secure communications since 2009, and they recently participated in a year-long proof of concept with NATO. Join host Konstantinos Karagiannis for a chat on practical solutions…
  • Podcast Transcript

    September 14, 2023
    In this episode, we discuss digital maturity in finance. Or more specifically, how more finance organisations are employing ERP systems, moving to cloud-based systems, transitioning more to analytics, and with that, understanding the talent management and risk management needs that are required with these major changes.Sharing their insights on these issues are two Protiviti experts, Chelsea…
  • Podcast

    September 14, 2023
    In this episode, we discuss digital maturity in finance. Or more specifically, how more finance organisations are employing ERP systems, moving to cloud-based systems, transitioning more to analytics, and with that, understanding the talent management and risk management needs that are required with these major changes.  Sharing their insights on these issues are two Protiviti experts,…
  • Flash Report

    January 21, 2021
    A United States Perspective With Joe Biden’s inauguration as the 46th president of the United States and a Democrat-controlled Congress with a razor-thin majority in both the House and the Senate, what can we expect in the new administration’s first 100 days and the next two years? What sectors face the greatest impacts from the change in leadership inside the Beltway from a Biden presidency and…
  • Client Story

    March 27, 2020
    For one global biopharmaceutical company, the ability to access vital data when and where it’s needed can affect more than just performance — it can impact the ability to save lives. This industry leader develops, manufactures and distributes breakthrough medical therapies to treat patients with serious and life-threatening medical conditions. The company conducts clinical trials to better…
  • Podcast Transcript

    November 22, 2023
    In the VISION by Protiviti podcast, Susan Yang, General Manager, International Payments and Network Management at the Commonwealth Bank of Australia, sits down with a pair of Protiviti payments experts to discuss how she and her team are leading the ISO 20022 program and the digital international money transfer (IMT) strategy execution for CBA. 
  • Podcast

    November 22, 2023
    In the VISION by Protiviti podcast, Susan Yang, General Manager, International Payments and Network Management at the Commonwealth Bank of Australia, sits down with a pair of Protiviti payments experts to discuss how she and her team are leading the ISO 20022 program and the digital international money transfer (IMT) strategy execution for CBA. 
  • Blogs

    June 30, 2023
    This blog post was authored by Justin Turner - Director, Security and Privacy on the technology insights blog. Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll…
  • Whitepaper

    January 29, 2018
    On June 1, 2017, China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Long before the Cybersecurity Law took effect, China had already made some efforts to strengthen information security. For example, a white paper titled The Internet in China, published in 2010, served as an early guide to China’s policy…
Loading...