Data Security Protect your data with confidence A “check-the-box” approach to compliance will not protect your reputation. Proactive programmes, measures and policies will.Protiviti helps you confidently maintain and protect your data, wherever it may reside. We help you understand the impacts of data security and respond to data breach.Protiviti determines the impacts of data security regulatory and contractual requirements, ensures you are compliant with Data Protection Law Australia and The Privacy Act 1988 (Privacy Act), General Data Protection Regulation (GDPR), assesses your alignment and capability to meet those expectations, remediates key processes and technologies, and helps implement changes to achieve and maintain compliance—all while improving your data security posture.Our approach focuses on three core concepts: identifying and securing your most valuable assets; continuous monitoring; and a structured, fast response to a breach. Regardless of where your data resides, Protiviti helps you maintain and protect it, and to understand the impacts Our Data Security services Pro Briefcase Data Identification and Security Organisations want to know what data matters most. Protiviti’s data protection methodology identifies critical data, implements measures to protect it, and establishes a programme to sustain and maintain data security as data evolves. Pro Building office Data Security Compliance No matter the compliance framework (Essential 8, PCI DSS compliance, HITRUST, HIPAA, SOC 2, SWIFT, ISO, NYDFS, FedRAMP, FISMA, CMMC) we scope your environment, address compliance gaps, and implement policies, procedures and technical solutions to meet any regulatory and contractual obligations. Pro Document Files Secure Architecture Securely maintaining technologies, systems, and networks is a challenge most companies face. Whether aligning with compliance requirements or adopting zero trust architecture, we bring skilled expertise to the design and implementation of your security. Pro Document Stack Cyber Defence and Response No matter how much you invest in security, incidents happen. Protiviti offers full-service incident response teams that optimise your environment to address dynamic data threats. Pro Legal Briefcase Cyber Resilience Ensure your data is available when you need it. Knowing where vulnerabilities lie will help you recover more quickly and minimise customer harm. Protiviti helps you detect, prevent, respond to, recover and learn from operational disruptions. Pro Document Consent Privacy Impact Assessment (PIA) Identify and assess privacy and data security risks through a Privacy Impact Assessment (PIA) and take timely actions to mitigate risk. SWIFT Security Attestation Is your organisation equipped to meet this year’s compliance deadline? Learn more The Protiviti advantage Protiviti provides expert-level data security consulting solutions to 70 % of FORTUNE 1000® companies,35% of FORTUNE Global 500® companies, and 75% of the top 20 ASX listed companies. We provide our clients with data security expertise that spans numerous regulations across all industries.Helping organisations comply with data security requirements is part of our DNA.PCI: Protiviti is one of the largest and most experienced PCI QSA firms (since 2002) and a four-time member of the PCI SSC’s Global Executive Assessor Roundtable. We frequently present at the Council’s community meetings and partner with global merchants and service providers to aid our clients on their journeys to achieve and maintain PCI certification.CMMC: Protiviti Government Services is a CMMC-AB Registered Provider Organisation™ (RPO) providing accredited consulting services around the Cybersecurity Maturity Model Certification (CMMC) programme.HITRUST and SWIFT: We are a HITRUST CSF Assessor and SWIFT CSP and partner with clients seeking to certify compliance. Featured insights and client stories SURVEY CFOs Address a Data Security and Privacy Triple Threat CFOs prioritise addressing the trifecta of data security and privacy threats due to rising cyber warfare, extortion risks, and stringent regulatory requirements. CLIENT STORY Enhancing Consent Management with OneTrust Protiviti and OneTrust helped a global software and IT solutions provider enhance its consent management processes, ensuring regulatory compliance. INSIGHTS PAPER Best Practices for Building a Sustainable PCI DSS Compliance Programme Creating and maintaining a sustainable PCI DSS compliance programme is a crucial and complex task for organisations to protect payment card transactions and uphold consumer trust. However, despite the PCI DSS standard being around for almost 20 years... BLOGS Manage, Govern AI Assets with Microsoft Purview’s New AI Hub From personal digital assistants to autonomous vehicles, artificial intelligence (AI) is revolutionising how we interact with technology and each other. Amidst this landscape, Microsoft Copilot and Open AI’s ChatGPT stand at the forefront, harnessing... BLOGS 5 Tips to Navigate Security in Agile Development In today’s fast-paced digital landscape, DevOps practices have revolutionised software development and deployment, allowing organisations to achieve greater efficiency and agility. As DevOps teams embrace cloud-based infrastructures like Amazon Web... BLOGS Prioritise privacy to build trust and elevate customer experience Most businesses recognise the significance of data privacy and identity management in safeguarding information, yet many overlook the relationship between privacy, identity management and customer experience. This connection is becoming increasingly... BLOGS Developing a security function during a CISO’s first 100 days These turbulent times of evolving threats and rising personal responsibility considerations for cybersecurity leaders make the CISO role a challenging but rewarding position. The CISO must contend with an increasing sophistication of attacks,... INSIGHTS PAPER Mastering Data Dilemmas: Navigating Privacy, Localisation and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape surrounding data protection, organisations must adapt swiftly to ensure compliance and maintain trust with... INSIGHTS PAPER How data sovereignty and data localisation impact your privacy programmes The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad strokes of various privacy laws may be consistent across jurisdictions, governments will dictate... BLOGS Metrics’ role in cyber transformation We’ve all heard the saying, “what gets measured gets done,” meaning that regular measurement and reporting helps to keep organisations focused on the information that matters. But with so many data points available to measure security, it is... BLOGS Enhancing cyber capabilities using a threat-driven strategy Senior leaders focused on cybersecurity recognise there is considerable guidance, best practices, frameworks, regulations and varied opinions on how programmes should design defensive capabilities. In addition, depending on the day, the various... BLOGS The Evolution of Attacker Behavior: 3 Case Studies This blog post was authored by Mike Ortlieb, Director, Security and Privacy andChris Porter, Associate Director, Security and Privacy onThe Technology Insights Blog. Threat actors are an ever-evolving species. Portrayed in popular... Button Button Leadership Leslie Howatt Leslie is a managing director, and Protiviti’s technology consulting solution lead. She specialises in digital and technology strategy as well as transformational change with over 25 years’ experience across consulting, industry, and government sectors. She has ... Learn More Krishnan Venkatraman Krishnan is a director with over 14 years’ experience in professional services. He has specific expertise in technology risk consulting and has been advising clients both in the public and private sector in designing and implementing information security controls.Major ... Learn More Cyber Risk Quantification Empowers Multichannel Retail Giant to Improve Risk Management Protiviti utilised cyber risk quantification to enhance the risk management process of a top 10 North American multichannel retailer. Get Involved Case Studies Protiviti conducts vendor assessments for global Fortune 100 healthcare organisation Situation: This highly-decentralised client had disparate vendor security assessments and governance policies, which led to repeated assessments and a lack of a common view of vendor risk. Value: Protiviti enabled the client to properly modify a COTS application in six months and build a strong foundation for an employee training module. Protiviti leads division of Fortune 50 pharmaceutical corporation to HITRUST certification Situation: The diagnostic device division of this company needed a third-party partner to conduct a HITRUST certification controls assessment to identify and remediate control gaps. Value: Protiviti assisted in developing a plan and timeline for HITRUST certification. Major payment card brand recruits Protiviti for PCI compliance support Situation: This global brand needed assistance with its payment card industry (PCI) compliance program. Value: Protiviti’s experience with acquiring banks and merchant compliance initiatives assisted in the development and rollout of this client’s compliance program for key stakeholders. Bank drafts Protiviti to improve data privacy and information security Situation: This client needed to update policies and procedures, with organisational alignment between the first, second, and third lines of defense. Value: Protiviti updated the client’s governance and policies to improve risk assessments, increase visibility into the risk profile of critical systems and infrastructure, and challenge existing data security practices to enhance enterprise regulatory compliance.