Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Insights paper March 21, 2025 ISO 20022 Compliance Countdown The new global messaging standard ISO 20022 provides a unified language for electronic data interchange between financial institutions. It is intended to result in increased transparency, speed and inoperability. It will also provide valuable enriched data to enhance financial crime compliance efforts. For those institutions yet to adopt the new standard, preparing for migration and dealing with… Survey September 26, 2024 From AI to Cyber - Deconstructing a Complex Technology Risk Landscape Protiviti’s global internal audit survey 2024 highlights the challenges and technology risk trends faced by internal auditors worldwide. Download the report. Podcast February 20, 2025 Privacy, data protection and cybersecurity in the boardroom with Dr. Gregg Li In this VISION by Protiviti interview, Michael Pang, APAC leader for Protiviti’s technology consulting, sits down with Dr. Gregg Li, who has been the chief architect and surgeon for board of directors for over 30 years in Asia and the Pacific Rim. In that time, Li’s strategic focus has been on technology and governance and the transformation of boards. Blogs September 27, 2023 Accelerating digital banking transformation with cloud technology By 2025, core banking workload deployment on cloud is expected to be 14% of total IT spend.Banks are grappling with outdated applications; data is siloed and trapped within legacy systems and not accessible for customer insights and tailored experiences and services.Regulatory changes in Australia, the UK and U.S., in GDPR and APRA standards for data privacy and operational resiliency, are also… Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Blogs July 20, 2021 What Do Thriving Organisations Have in Common? Business Agility The Digital Age is forcing businesses to seek new ways to avoid falling behind and better serve their customers. Business agility enables organisations to respond quickly to market changes and employee or customer demands without compromising quality. Traditional hierarchical siloed methods no longer work in this environment. Companies seeking speed, innovation and greater customer focus have… Blogs June 30, 2023 Metrics’ role in cyber transformation We’ve all heard the saying, “what gets measured gets done,” meaning that regular measurement and reporting helps to keep organisations focused on the information that matters. But with so many data points available to measure security, it is difficult to know where to begin. Security practitioners must constantly question what data they collect and why. Only by providing relevant measures can we… Blogs June 30, 2023 A house divided: Key differences in cybersecurity implementation for IT and OT Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll Tide vs. War Eagle, The Egg Bowl, Bedlam, The Backyard Brawl, “The Game”). But we’re fundamentally not all that… Podcast November 22, 2023 Exploring the future of payments with the Commonwealth Bank of Australia In the VISION by Protiviti podcast, Susan Yang, General Manager, International Payments and Network Management at the Commonwealth Bank of Australia, sits down with a pair of Protiviti payments experts to discuss how she and her team are leading the ISO 20022 program and the digital international money transfer (IMT) strategy execution for CBA. Blogs April 26, 2024 Embrace DEI intersectionality for effective cybersecurity The role of a cyber incident responder is more critical than ever as these professionals are tasked with protecting organisations from cyber threats, mitigating risks and minimising the impact of security incidents. As cyber threats continue to proliferate, targeting organisations of all sizes and sectors, it is imperative for cyber incident response (CIR) teams to be well prepared at mitigating… Load More