Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Podcast December 7, 2021 Podcast | Preparing for the Quantum Threat to Cryptography and Cryptocurrency Cybersecurity continues to be a critical area of concern for organizations and virtually any leader you ask – board members, CIOs, CFOs, and many more. But as elevated as those risks are today, the real threat may be just around the corner, particularly concerning cryptocurrency. Crypto has been viewed as highly secure, but the rapid emergence of quantum computing, which is set to deliver… Survey June 9, 2022 SOX Compliance Amid Rising Costs, Labor Shortages and Other Post-Pandemic Challenges Assessing SOX internal costs, hours, controls and other trends in the results of Protiviti’s 2022 Sarbanes-Oxley Compliance Survey Two-plus years into contending with a global pandemic, business leaders recognize that Sarbanes-Oxley compliance activities are not immune to a broad range of market disruptions. Inflation, a rising interest rate environment, ongoing supply chain volatility, a… Survey January 2, 2024 2024 Top Risks in the Government Services Industry Explore the 2024 Top Risks in Government Services: Navigate economic challenges, escalating cyber threats, and talent management concerns with strategic insights. Whitepaper July 22, 2022 Data Governance Combined with Analytics P O W E R F U L I N S I G H T S Issue Less than a decade ago, large enterprises held significant advantages over small businesses in the same industry, due to their scale, resources and organizational might. This is no longer the case, as drives toward digital innovation and globalization, coupled with the data explosion brought about by increased mobility, technological advancements and… Flash Report March 9, 2023 New White House Cybersecurity Strategy Creates Additional Concerns for Businesses The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well as private businesses. The Biden-Harris Administration has been percolating a comprehensive cybersecurity strategy for some time and in early March released the aptly named “National Cybersecurity Strategy.” The 35-page document was created to help… Whitepaper October 1, 2022 Guide to business continuity & resilience Instill your organization with the advantage to endure company disruptions and consistently meet business goals with reduced financial, operational, cybersecurity, and efficiency losses. Assess your areas of risk and develop, enhance, as well as maintain plans to enable resilience, regardless of the circumstance. Whitepaper August 11, 2023 Navigating sanctions compliance through the transition to ISO 20022 The International Organization for Standardization’s (ISO) new global messaging standard, ISO 20022, is set to be adopted by payment processing organizations globally by 2025. Whitepaper April 7, 2021 Operational Resilience: Considerations For Boards, The C-Suite and Enterprisewide Implementation Since the beginning of 2020, organizations have been working tirelessly to address the range of complex issues accentuated by the COVID-19 pandemic. While this work continues for many organizations, forward-thinking business leaders are also looking beyond the crisis to operationalize new strategies that will help them build resilient enterprises for many decades to come. Resilience is not about… Survey February 15, 2024 2024 Top Risks for Chief Financial Officers Chief financial officers (CFOs) have a unique vantage point regarding talent management, one that explains why the ability to attract, develop and retain top talent represents their top risk concern in both 2024 and 2034. Whitepaper June 1, 2022 How can an enterprise use access management to establish a Zero Trust environment? A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management program is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based… Load More