Insight Search

Sort by:
  • Newsletter

    August 15, 2022
    The 2020s are well on their way to earning the ominous label of a troubling, disruptive decade, but there remain viable opportunities amid the challenges. What is the board’s role in preparing the organisation for “show-stopping” and potentially existential risks? The Story: A global board survey conducted by McKinsey of approximately 1,500 corporate directors found that directors “are not…
  • Podcast

    March 13, 2024
    In this special edition of the Protiviti Legal Perspectives podcast series, we delve into the complexities of new data protection and cybersecurity government regulations in the defense industry with Alex Alexander W. Major, Partner, McCarter & English and Perry Keating, President of Protiviti Government Services. The Cybersecurity Maturity Model Certification (CMMC) was recently promulgated…
  • Client Story

    June 25, 2019
    FASB’s new lease accounting guidance (ASC Topic 842), issued on February 25, 2016, requires organisations to recognise lease assets and liabilities on the balance sheet and disclose key information on lease transactions. For most companies with leased assets, the change significantly affects financial reporting. Companies must obtain key information through lease abstraction and populate a data…
  • Newsletter

    April 9, 2021
    On February 26, 2021, the Board of Governors of the Federal Reserve System (FRB) in the United States issued expectations for boards of large financial institutions as a standard for its regulators when they assess board effectiveness. The guidance applies to all domestic bank holding companies and savings and loan holding companies with total consolidated assets of $100 billion or more, with…
  • Whitepaper

    July 12, 2021
    In spite of over 20 years of experience as an industry, Identity & Access Management (IAM) programmes continue to struggle — and with good reason. There is a lot that can go wrong with an IAM programme. Lack of funding, treating IAM like a project and not a programme, not having business buy-in, and trying to overly customise packaged software are all examples of significant challenges that…
  • Blogs

    July 14, 2023
    This blog post was authored by Rob Woltering - Associate Director, Security and Privacy on the technology insights blog. As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s operations, cybersecurity risks remain top of mind for many organisations. To this end, organisations are continuously…
  • Newsletter

    February 12, 2021
    Like any enterprisewide organisational change, implementing an operational resilience programme across an organisation requires a careful and collaborative effort to be successful. Whether implementation has been in the works for several years or is just beginning, turning the resilience programme from concept to reality is hard work. Except for the most dynamic and change-…
  • Whitepaper

    July 14, 2021
    The Microsoft 365 platform transforms how every member of an organisation  chats,  emails,  shares files and performs the essential tasks inherent to all corporate roles. A comprehensive approach to Microsoft 365 deployment planning will ensure the efficiency, cost saving and employee satisfaction that the Microsoft 365 investment has the potential to deliver. Widely available…
  • Blogs

    May 13, 2021
    In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s…
  • Whitepaper

    July 13, 2021
    Identity management doesn’t happen overnight; there’s no “Easy” button to press, or magic snap-of-the-fingers instant fix. In fact, identity management has transformed into something far more complex than password authentication and simple security measures. It’s important to understand that jumping into a new technology instantaneously isn’t necessarily the right first step to ensuring a…
Loading...