Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs April 6, 2023 Migrating Security from Microsoft Dynamics 365 Finance and Supply Chain Management This blog post was authored by Julia Artzi - Consultant, Sarah Guthrie - Senior Consultant, Enterprise Application Solutions on The Technology Insights Blog. Microsoft Dynamics 365 Finance and Supply Chain Management (D365 F&SCM) publishes security changes with new code releases. These changes are automatically applied to out-of-the-box security roles, duties and privileges when the code is… Podcast September 12, 2023 Podcast | The Evolution of SOX: Tech Adoption and Cost Focus Amid Business Changes, Cyber and ESG Mandates In this episode, we dive into SOX compliance – specifically, the findings of and key takeaways from Protiviti’s latest Sarbanes-Oxley Compliance Survey. The results of our research are featured in our just-released report, The Evolution of SOX: Tech Adoption and Cost Focus Amid Business Changes, Cyber and ESG Mandates.Offering their insights and perspectives are Protiviti Managing Directors… Blogs June 30, 2023 How to implement an aligned assurance model to build a collective view of risk The big picture: Aligned assurance can create multiple benefits, including:Giving stakeholders a common view of risks and issues across the organisationReducing repetitive, manual testing, which allows more focus on high-value activitiesBy the numbers: In a recent Protiviti webinar on aligned assurance, only 14% of the audience members reported that collaboration across the three lines is “highly… Blogs November 22, 2023 Thinking beyond the 7Rs of cloud migration In a recent blog, we introduced the drivers for cloud migration, the strategies and the most common types of cloud migrations available to organisations. Today, we take a closer look at what drives a successful cloud migration and think beyond the 7Rs of migration to embrace a transformative approach to modern cloud migrations. Blogs July 14, 2023 A fresh take on cloud transformation Cloud transformation is a process of moving applications, data and infrastructure to the cloud. Such simple definitions lack any sense of the business drivers or anticipated benefits that transformation strategies ought to encompass. After undertaking a “transformation” according to these simpler definitions, businesses are left operating in the same old way, making use of the same applications… Podcast Transcript March 28, 2023 Transcript | Future of Crypto Innovation and Regulation Over the past year, as one crypto organisation after another has been beset by fraud or declared bankruptcy, countless headlines have surfaced warning of the death of the crypto industry. Yet the damage has been largely contained. The developments have raised many questions about digital assets, cryptocurrency and blockchain technology as well as regulation and other factors that may help the… Blogs July 14, 2023 Smart contracts part 1: What is a smart contract? In recent years, there’s been considerable talk of blockchain and its use cases in the business world. While some of these topics have specific use cases – metaverse, decentralised finance, etc – there is one topic that underpins everything in the blockchain and decentralised space: smart contracts. Smart contracts are behind-the-scenes applications that route data, track changes and settle… Blogs April 6, 2023 Why Data Governance Programmes Are Easy to Envision, Difficult to Sustain I am often asked, with all the investments in data management and infrastructure over the last 50 years, why are we still not great with governing data? To put it simply and directly – it’s hard! Data governance programmes are easy to envision conceptually, difficult to implement, and without proper care, impossible to sustain. Often data governance investments have a long ‘time to value’ ROI,… Blogs January 11, 2023 For $62.59, the 8 Character Password is Still Dead Five years ago, we wrote a post called “The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight-character passwords do not adequately protect organisations. In that analysis, we broke down the math and how quickly hardware purchased for under $5,000 could make an eight-character length irrelevant. Unfortunately, in just five years’ time, the… Blogs April 21, 2023 Enhancing cyber capabilities using a threat-driven strategy Senior leaders focused on cybersecurity recognise there is considerable guidance, best practices, frameworks, regulations and varied opinions on how programmes should design defensive capabilities. In addition, depending on the day, the various pressures in the organisation’s macro-environment may be greater or lesser and invite different priorities for time, team and budget. Despite these… Load More