Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper June 1, 2022 How can an enterprise use access management to establish a Zero Trust environment? A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management programme is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based… Blogs February 10, 2022 CFOs: Let’s Have an Honest Conversation About Supply Chain ESG Organisations have been feeling pressure from investors, consumers and other stakeholders to embrace sustainable business practices and focus on environmental, social and governance (ESG) issues for some time. And although ESG issues are not yet a reporting requirement, there are signs that this is changing. In February this year, the Securities and Exchange Commission (SEC) in the U.S. appointed… Survey January 7, 2022 Three Conversation Starters That Advance CISO/CFO Collaboration The quality and, in some cases, the existence of the CISO/CFO relationship varies by company. In organisations where the CISO role is positioned and promoted as a source of value, CISOs and CFOs tend to collaborate more often and more meaningfully than in companies that treat information security as a cost center (and typically struggle with cybersecurity as a result). Protiviti’s 2021… Newsletter June 12, 2024 21st-Century Board Oversight of Talent Acute talent shortages across numerous industries underscore the risks emanating from outdated, reactionary approaches to managing people, succession and culture. The question arises, what is the board’s role in forging a 21st-century approach to managing talent?Changing times have led to fleeting employee loyalty, as talented individuals have more options than ever before with greater… Newsletter May 13, 2021 Quantum Computing: Why The Board Should Care There is a growing interest across the world in the feasibility of quantum computing and when it will finally become a reality in business. And that’s for good reason. Quantum would enable problem-solving capabilities to address simulations and complicated optimisation questions involving a formidable number of variables and potential outcomes at amazing speeds not attainable with conventional… Newsletter November 17, 2022 Is ESG Receiving Sufficient Attention in North America? Worldwide, there is awareness that environmental, social and governance (ESG) considerations will prove to be essential drivers and components of profitability and sustainable business over the next 10 years. The reality is, however, that the level of engagement with ESG — as an integral component of business strategy — is significantly higher outside of North America than within it, and to an… Blogs October 17, 2022 For Telecoms, Cultivating Loyal Customers Requires Better Customer Data Management By Rupesh Mahto, Senior Director, Technology Consulting, Protiviti Australia Understanding and mapping the customer journey is the starting point from which to identify the key opportunity moments where access to the right customer data can help anticipate a service need, resolve an issue without asking, or offer a customised product — in other words, make the difference between cultivating… Whitepaper April 23, 2020 Reemergence Planning – A Sound Strategy After a Crisis In September 2001, Wired magazine reviewed science writer Steven Johnson's then-new book, Emergence: The Connected Lives of Ants, Brains, Cities and Software. Johnson’s premise: Brilliant adaptations arise out of interconnections and cooperation among individual components of complex systems. He optimistically predicted that we would develop technology tools that have humans “collaborating on a… Blogs January 13, 2023 The Evolution of Attacker Behavior: 3 Case Studies This blog post was authored by Mike Ortlieb, Director, Security and Privacy and Chris Porter, Associate Director, Security and Privacy on The Technology Insights Blog. Threat actors are an ever-evolving species. Portrayed in popular advertising as guys dressed in black, probably sporting a ski mask, the harsh reality is that these bad actors are everywhere and are getting more creative… Survey November 17, 2021 Guide to U.S. Anti-Money Laundering Requirements, Frequently Asked Questions Protiviti’s Guide to U.S. Anti-Money Laundering Requirements, Frequently Asked Questions provides responses to nearly 3,000 questions aggregated from our clients, attorneys, regulators, members of law enforcement, academics and others interested in the requirements and challenges that companies face in addressing the complex and dynamic topics of anti-money laundering/combatting financial… Load More