Insight Search

Sort by:
  • Newsletter

    December 10, 2021
    Transparency and consequences can be powerful leadership deterrents. For the board and CEO and their personal brands, the critical question is, what will key decision-makers in their organisation do in situations when no one is watching? When the subject of ethical and responsible business behavior arises, Warren Buffett advises managers to evaluate every action they take — and not just by legal…
  • Whitepaper

    February 17, 2021
    Lingering Effects of Pandemic and Operational Challenges Are Top Concerns for Consumer Products and Services Organisations The continuing global challenges and potential existential threat posed by the ongoing COVID-19 pandemic. Political divisiveness and polarisation. Social and economic unrest. Gridlock. Artificial intelligence (AI), automation and other rapidly developing digital technologies…
  • Podcast

    October 31, 2022
    Supply-chain issues are plaguing the world right now, across all industries, from manufacturing, technology, healthcare, and more. Can quantum computing offer a way to ease the burden and provide real customer advantage? Evidence seems to suggest so. Join host Konstantinos Karagiannis for a chat about this use case, and other innovative ones you may not have heard of, with Alex Khan from ZebraKet…
  • Blogs

    June 19, 2023
    Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed.
  • Blogs

    June 30, 2023
    Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll Tide vs. War Eagle, The Egg Bowl, Bedlam, The Backyard Brawl, “The Game”). But we’re fundamentally not all that…
  • Blogs

    March 8, 2024
    We often hear our clients ask what steps to take to develop a Software as a Service (SaaS) strategy for IT environments. Both the CIO and business owners recognise the benefits of SaaS solutions, which are readily available and often focused on a particular business need. SaaS products are becoming more popular, and usage is expected to grow at a double-digit rate in the coming years, driven by…
  • Client Story

    March 13, 2024
    Protiviti leveraged Microsoft Power BI to help this client transform its operational analytics. We built a user interface that generates analytics every 15 minutes and is easy to use with little training required. From staffing and sales targets to customer retention data, managers now have the information they need, at their fingertips, to drive decisions that improve the bottom line.
  • Whitepaper

    April 28, 2022
    Since the beginning of 2020, organisations have been working tirelessly to address the range of complex issues accentuated by the COVID-19 pandemic. While this work continues for many organisations, forward-thinking business leaders are also looking beyond the crisis to operationalise new strategies that will help them build resilient enterprises for many decades to come.Resilience is not about…
  • Client Story

    May 23, 2024
    We partnered with the client in building and maturing a data privacy program, including enhancing the company’s privacy rights process into a universal, globally scalable webform intake, 10+ custom workflows and an encrypted portal. Leveraged OneTrust autoblocking to establish baseline cookie compliance.
  • Blogs

    April 6, 2023
    This blog post was authored by Julia Artzi - Consultant, Sarah Guthrie - Senior Consultant, Enterprise Application Solutions on The Technology Insights Blog. Microsoft Dynamics 365 Finance and Supply Chain Management (D365 F&SCM) publishes security changes with new code releases. These changes are automatically applied to out-of-the-box security roles, duties and privileges when the code is…
Loading...