Insight Search

Sort by:
  • Client Story

    July 24, 2022
    Smaller firms can’t afford to be heavily dependent on technical consultants or bound to a portfolio of siloed applications that don’t provide the ability to track data. Recently, the visionary leader of a healthcare professional association freed her business from these dilemmas. But the flexibility and strength her small team stood to gain from their digital transformation initiative were…
  • Client Story

    February 8, 2023
    A global health services company needed to execute on its corporate promise to deliver affordability and convenience to its patients. However, the company discovered that there was a disconnect between that promise and intended delivery. Further investigating that disconnect revealed that the organisation's procedures for tracking and delivering rebate payments were hampered by complex, time-…
  • Whitepaper

    March 16, 2023
    Data has become the life blood of businesses and properly managing that data to gain the most value is becoming ever more important as businesses seek to remain competitive. This Insights paper will address the importance of investing in the processes, practices, and technologies to maximise the value of data in an enterprise.
  • Blogs

    June 19, 2023
    Penetration testing and red teaming are essential cybersecurity practices that bolster an organization’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed.
  • Podcast Transcript

    February 6, 2023
    We’ve talked about how quantum computers are enabling extraordinary use cases now, long before the machines will threaten cryptography. Some of these applications can even help companies protect against immediate security threats and vulnerabilities. We explore one such exciting experiment: Using quantum to stop kill chains that allow network exploitation and the Chinese paper causing all the…
  • Podcast

    January 11, 2023
    We’ve talked about how quantum computers are enabling extraordinary use cases now, long before the machines will threaten cryptography. Some of these applications can even help companies protect against immediate security threats and vulnerabilities. We explore one such exciting experiment: Using quantum to stop kill chains that allow network exploitation and the Chinese paper causing all the…
  • Whitepaper

    October 16, 2023
    Can financial institutions manage effectively in a world where issues and breaches are known to regulators before the chief compliance officer or anyone else in the organisation even learns about them?
  • Whitepaper

    February 20, 2023
    On February 24, 2022, Russia invaded Ukraine. The global condemnation of the invasion has included an unprecedented number of sanctions against Russia that began being issued almost immediately and has continued as the war goes on, bringing with it large-scale economic disruption and untold human tragedy. For the financial services industry and the issuing nations, there are lessons to be learned…
  • Newsletter

    November 29, 2023
    Compared to prior years, our suggested 2024 audit committee agenda has taken a bit of a turn due to ongoing and recent market and regulatory developments.A complex business environment: The 2024 audit committee agenda includes important enterprise, governance, process, technology, and financial reporting and disclosure issues that merit consideration by the audit committee beyond its ongoing…
  • Newsletter

    August 23, 2023
    The big picture: So much has been written about generative AI (GenAI), it seems like a constant buzz inspiring both wonder and fear. But the value proposition is alluring. After witnessing OpenAI’s ChatGPT in action, Bill Gates said, “I knew I had just seen the most important advance in technology since the graphical user interface.”Between the lines: The opportunities for using GenAI to enhance…
Loading...