Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper December 27, 2023 Cybersecurity in solutions A Whitepaper on how solutions by stc transformed its Cybersecurity program for a sustainable digital future in partnership with Protiviti Member Firm for the Middle East Region. Insights paper March 20, 2024 Mastering Data Dilemmas: Navigating Privacy, Localisation and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape surrounding data protection, organisations must adapt swiftly to ensure compliance and maintain trust with their customers and stakeholders. However, both data sovereignty and localisation play an important role in privacy, as discussed in a previous post… Newsletter February 21, 2023 Talent Strategies Demand a New Normal People and culture sit atop the list of key risk concerns of board members and executives worldwide looking out over the next 12 months as well as into 2032, according to the latest Top Risks Survey from Protiviti and NC State University’s ERM Initiative. Even amid an uncertain economy, inflationary conditions and fears of a possible recession, people, talent and culture issues stand out as… Survey February 28, 2023 Infographic | Consumer Products and Retail Executive Perspectives on Top Risks 2023 Across many retail and consumer goods categories, companies are contending with talent shortages that have increased labor costs, product availability challenges, difficulty sustaining customer loyalty and retention, and pressure to implement sustainability practices. According to results from the latest Protiviti-NC State global top risk survey, these are among the key issues being discussed in… Whitepaper March 24, 2023 Collaboration: The key to better management of cybercrime and financial crime By Carol Beaumier and Bernadine ReeseSharing information and lessons learned has become increasingly critical for the effective management of cybercrime and related financial crime. This need requires financial institutions to rethink how they have historically managed these risks. Insights paper January 8, 2024 How data sovereignty and data localisation impact your privacy programmes The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad strokes of various privacy laws may be consistent across jurisdictions, governments will dictate the collection, storage and interpretation of their citizens’ data through constantly evolving privacy regulations.The legislative bodies that write… Survey March 9, 2023 Achieving Audit Relevance As internal audit functions face a continuing talent crunch and demands to support the organisation’s strategic moves in response to external events, chief audit executives (CAEs) are focused on growing internal audit’s relevance with the board, senior executives and other stakeholders. For internal audit functions, elevating their relevance requires ongoing evolution and a committed focus on… Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organization’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Survey December 9, 2021 2022 AND 2031 EXECUTIVE PERSPECTIVES ON TOP RISKS Key issues being discussed around the globe in the boardroom and C-suite Massive disruptions in the global supply chain. Challenges in attracting and retaining talent to address needs all across the enterprise. The Delta and Omicron variants. Cyber attacks and ransomware. Geopolitical tensions in specific regions and shifts on issues related to climate change. Long-overdue shifts in expectations… Podcast Transcript February 7, 2023 Transcript | Quantum Networking with memQ Quantum computing requires quantum networking to reach its full potential. But there are engineering challenges to overcome. Learn about how repeaters that extend entanglement between qubits are really just application-specific quantum computers of their own. Also, learn how connecting these devices will pave the way for interconnect and other advances. Join host Konstantinos Karagiannis for a… Load More