Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs July 4, 2023 Top 10 reasons for technology modernisation Business and IT leaders can articulate business cases for modernisation efforts by linking them to key value drivers that modernisation efforts are known to deliver. The strongest business cases cite multiple benefits, and it isn’t unusual for application modernisation projects to add value in three or more related categories of benefit. The modernisation drivers listed below are synergistic: it… Client Story June 7, 2023 Resource backfill, technology and process change drive state procurement improvements Many institutions in the public sector are faced with improving the efficiency and responsiveness of their services and operations to better serve stakeholders and the public. High turnover and lengthy recruiting cycles are creating both a loss of tribal knowledge and an influx of inexperienced resources, leading to significant delays in day-to-day operations. Our client, a state procurement… Blogs September 10, 2021 Ransomware Crisis: 11 Actions to Avoid a Ransomware Attack Why Securing our Critical Infrastructure Matters Operational Technology (OT) remains a key, but vulnerable technology for organisations with critical infrastructure. The Australian Government has defined critical infrastructure as “those physical facilities, supply chains, information technologies and communication networks which, if destroyed, degraded or rendered unavailable for an extended… Blogs January 31, 2024 Cloud synergy: Microsoft Azure and its relationship to Microsoft 365 As organisations increasingly embrace cloud-based technologies to enhance productivity and efficiency, understanding the dynamic relationship between Microsoft Azure and Microsoft 365 becomes crucial for maximising their potential. With the power of Microsoft Azure and Microsoft 365, organisations are gaining agility and driving innovation, but what is the difference between the two? When rolling… Blogs February 9, 2023 Sustainable Cloud Computing Organisations have grown more productive by embracing the scalability and performance of cloud computing. As they’ve become more sensitive to matters of sustainability, however, organisations will place greater focus on the sustainability of cloud computing models from an overall environmental, social and governance (ESG) standpoint. This is true globally, whether ESG goals are driven by… Blogs November 17, 2021 Enable Transformation, Manage Risk with a Cloud Control Framework Businesses are experiencing increased agility and reliability – and cost reductions – through cloud transformation but adopting cloud solutions can result in new risks. Sometimes, they impede enterprise vision and regulatory compliance. Applying an appropriate framework to help manage the risk of cloud adoption can mitigate or even eliminate these hazards. In an earlier blog, we introduced… Survey December 19, 2023 2023 Consumer Packaged Goods and Retail Finance Trends CPG and retail finance leaders cite ESG, inflation and data security as top prioritiesWhether it is dealing with inflation, supply-chain disruptions or workforce challenges, finance leaders in the retail and consumer packaged goods (CPG) industries are leading their organisations’ efforts to navigate today’s uncertain market environment. Increasingly, companies are leaning on finance leaders to… Infographic May 8, 2023 Infographic | COSO ESG Guidance Webinar: Internal Control Over ESG Operations, Compliance & Reporting The Committee of Sponsoring Organisations of the Treadway Commission (COSO) recently released interpretive guidance for organisations about designing, evaluating and achieving effective internal control over sustainability reporting (ICSR) using COSO’s globally recognised Internal Control — Integrated Framework (ICIF), developed in 2013. The intended outcome is to build trust and confidence in… Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Whitepaper April 4, 2021 Is It Time to Regulate the Buy-Now-Pay-Later Industry? Or Will We Delay and Simply “Pay for It Later”? By Mark Burgess, Managing Director, Risk and Compliance, and Layla Shakkour, Manager, Risk and Compliance With increasing attention on the potential negative impacts of buy-now-pay-later (BNPL) services, Australia may soon need to decide at what point BNPL providers will be regarded as credit providers under the law, and effectively regulated as such. Load More