Insight Search

Sort by:
  • Newsletter

    March 23, 2020
    The discussion below is a more complete coverage, including examples, of the topic addressed in Issue 126 of Board Perspectives: Risk Oversight and on NACD/BoardTalk.In a crisis, clear thinking is needed in the boardroom. The unprecedented nature of the COVID-19 pandemic has set in motion one of the most abrupt disruptions in decades, leaving organisations reeling with uncertainty…
  • Whitepaper

    June 24, 2022
    On April 29, 2022, the PCI Security Standards Council (PCI SSC) released new versions of the PCI DSS Self-Assessment Questionnaires (SAQs) ahead of the anticipated June 2022 release timeline. After the release of the new version of PCI DSS 4.0 a month prior, the new versions of the SAQs have been updated to reflect changes in the standard, as well as to adjust requirements applicable for…
  • Whitepaper

    July 5, 2022
    Review of Microsoft 365 Capabilities for Records Management and the ICA Guidelines and Functional Requirements for Electronic Document and Records Management Systems Leveraging Microsoft 365 and SharePoint Online as an organisation’s primary electronic document and records management system (EDRMS) provides the ability to effectively fulfill compliance and regulatory requirements for information…
  • Blogs

    June 19, 2023
    Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed.
  • Blogs

    June 30, 2023
    This blog post was authored by Justin Turner - Director, Security and Privacy on the technology insights blog. Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll…
  • Whitepaper

    March 24, 2023
    By Carol Beaumier and Bernadine Reese Sharing information and lessons learned has become increasingly critical for the effective management of cybercrime and related financial crime. This need requires financial institutions to rethink how they have historically managed these risks.
  • Podcast

    January 24, 2023
    In this episode, we focus on ESG from a legal perspective. Alyse Mauro Mason, an Associate Director with the Business Performance Improvement solution and ESG practice at Protiviti, interviews Dennis Kerrigan, Executive Vice President and General Counsel for the Hanover Insurance Group, and Rich Cohen, a Managing Director with the Legal Consulting practice at Protiviti. Dennis and Rich join this…
  • Whitepaper

    September 15, 2021
    Issue Suspicious transaction monitoring systems enable financial institutions to monitor their customers’ transaction behavior systematically by providing relevant scenarios/rules that analyse the underlying customer transactions and generate automated alerts of activity that may be unusual and indicative of potential money laundering. These alerts are then reviewed by a team of investigators to…
  • Blogs

    April 6, 2023
    This blog post was authored by Julia Artzi - Consultant, Sarah Guthrie - Senior Consultant, Enterprise Application Solutions on The Technology Insights Blog.Microsoft Dynamics 365 Finance and Supply Chain Management (D365 F&SCM) publishes security changes with new code releases. These changes are automatically applied to out-of-the-box security roles, duties…
  • Podcast Transcript

    February 18, 2023
    In this episode, we focus on ESG from a legal perspective. Alyse Mauro Mason, an Associate Director with the Business Performance Improvement solution and ESG practice at Protiviti, interviews Dennis Kerrigan, Executive Vice President and General Counsel for the Hanover Insurance Group, and Rich Cohen, a Managing Director with the Legal Consulting practice at Protiviti.
Loading...