Blog library

A collection of Protiviti blogs. 
ISSA 5000 | What this means for you

Blogs

March 19, 2025

IAASB’s ISSA 5000 Sets the Global Standard for Sustainability Assurance

The International Standard on Sustainability Assurance, or ISSA 5000, developed by the International Auditing and Assurance Standards Board (IAASB) in late 2024, is widely expected to be the global benchmark for sustainability assurance, influencing the future of sustainability audits. As regulatory mandates for sustainability reporting increase, organisations seeking...
Reflections from 16 years ago as a consultantStepping into the role of a graduate consultant right out of university in 2007 was both an exciting and intimidating experience. Like many newcomers, I found myself grappling with the concept of adding value to projects and clients with limited industry experience. I felt like I needed more years under my belt, more projects to my name, and more technical expertise to…
To effectively manage software development projects, it’s crucial to organise work items efficiently. Proper organisation not only boosts productivity but also enhances collaboration among team members. Microsoft Azure DevOps (ADO) is a powerful platform that allows teams to plan, develop, test and deliver software with efficiency and precision. Whether leveraging ADO for ongoing production support, optimisation and…
Data is the lifeblood of today’s digitally transformed business environment and is growing rapidly as it is estimated that 90 percent of the world’s existing data was created in the last two years alone. With such rapid growth, simply understanding the context of what data is important to keep, classifying that data and organising it into a useful form cannot happen without the support of technology. Organisations…
As organisations increasingly embrace cloud-based technologies to enhance productivity and efficiency, understanding the dynamic relationship between Microsoft Azure and Microsoft 365 becomes crucial for maximising their potential. With the power of Microsoft Azure and Microsoft 365, organisations are gaining agility and driving innovation, but what is the difference between the two? When rolling out Microsoft 365…
Segregation of duties (SoD) is a well-known term among auditors and anyone who has ever been audited. SoD is the understanding that no user should have access to two conflicting business functions that would allow a user to commit fraud or error (e.g., the ability to create a vendor record, then process a payment to that vendor). The idea can be intimidating and overwhelming to those who do not have the proper tools…
Generative artificial intelligence (GenAI) is a hot topic these days, and not just in the IT world. The statistics indicate off-the-charts interest in GenAI’s capabilities, with AI spending predicted to more than double to $300 billion by 2026. Organisations are gearing up, determining how to best incorporate GenAI to significantly enhance their customer relations, revenue growth, cost optimisation, business…
An overwhelming majority of global business leaders—85%—expect their home country to be “cashless” within a decade, and nearly a third expect it will happen within the next five years, according to findings of the Protiviti-Oxford survey, “Executive Outlook on the Future of Money, 2033 and Beyond.”
A two-step indicator-based approach proposed by EU supervisory authorities will be used to assess ICT services providers to determine whether they should be designated as critical and subjected to oversight under the Digital Operational Resilience Act (DORA).
In a recent blog, we introduced the drivers for cloud migration, the strategies and the most common types of cloud migrations available to organisations. Today, we take a closer look at what drives a successful cloud migration and think beyond the 7Rs of migration to embrace a transformative approach to modern cloud migrations.
Cybersecurity is distinguished not only by a talent shortage but also by having a predominantly male workforce. Women are in the minority on most cybersecurity teams that have women at all, so when they experience gender bias, they’re likely to be isolated.
Loading...