Insight Search

Sort by:
  • Podcast

    September 14, 2023
    In this episode, we discuss digital maturity in finance. Or more specifically, how more finance organisations are employing ERP systems, moving to cloud-based systems, transitioning more to analytics, and with that, understanding the talent management and risk management needs that are required with these major changes.  Sharing their insights on these issues are two Protiviti experts,…
  • Whitepaper

    July 13, 2021
    Identity management doesn’t happen overnight; there’s no “Easy” button to press, or magic snap-of-the-fingers instant fix. In fact, identity management has transformed into something far more complex than password authentication and simple security measures. It’s important to understand that jumping into a new technology instantaneously isn’t necessarily the right first step to ensuring a…
  • Survey

    May 9, 2023
    Organisations today spend an average of 30% of their IT budgets and invest a fifth of their IT human resources on technical debt management. This research, based on a global survey of more than 1,000 CIOs, CTOs and other technology leaders, underscores the burden created by technical debt and likely is an eye-opener for the CFO.[1] As organisations strive to increase their focus, and time and…
  • Podcast Transcript

    May 24, 2023
    Top-performing internal audit groups share similar traits: They focus more on streamlined, tailored, impactful communications and reporting. They evolve and adapt routinely, and they push themselves to find and build talent and resources from both within and outside their organisations. But guess what? Fewer than six in 10 internal audit functions have access to the talent they need across any of…
  • Blogs

    April 26, 2024
    The role of a cyber incident responder is more critical than ever as these professionals are tasked with protecting organisations from cyber threats, mitigating risks and minimising the impact of security incidents. As cyber threats continue to proliferate, targeting organisations of all sizes and sectors, it is imperative for cyber incident response (CIR) teams to be well prepared at mitigating…
  • Blogs

    May 5, 2023
    Cybersecurity governance should do more than manage cyber risk. Good cybersecurity governance creates efficiencies by clarifying the outcomes expected from its processes and establishing boundaries of responsibility among cybersecurity practitioners, frontline operational areas, senior leaders and board members. Recently, numerous crises have drawn senior leaders and board members down…
  • Blogs

    November 3, 2023
    Cybersecurity is distinguished not only by a talent shortage but also by having a predominantly male workforce. Women are in the minority on most cybersecurity teams that have women at all, so when they experience gender bias, they’re likely to be isolated.
  • Blogs

    July 19, 2023
    In today’s fast-paced business landscape, organisations rely heavily on robust enterprise resource planning (ERP) systems like Microsoft Dynamics 365 Finance and Supply Chain Management to streamline operations and drive growth. However, granting unrestricted access to sensitive financial and operational data can pose security risks and compromise data integrity. That’s where read-only roles come…
  • Podcast Transcript

    June 25, 2021
    Next in our Transformation series, guest host Lucy Pearman talks with Jo Ann Barefoot about RegTech innovation from how regulators are using technology to how financial services need to urgently expand their experimentation and adoption rates. Jo Ann Barefoot is CEO & Cofounder of AIR – the Alliance for Innovative Regulation – and host of the global podcast show Barefoot Innovation. A noted…
  • Blogs

    November 17, 2021
    Businesses are experiencing increased agility and reliability – and cost reductions – through cloud transformation but adopting cloud solutions can result in new risks. Sometimes, they impede enterprise vision and regulatory compliance. Applying an appropriate framework to help manage the risk of cloud adoption can mitigate or even eliminate these hazards. In an earlier blog, we introduced…
Loading...