Insight Search

Sort by:
  • Client Story

    February 16, 2023
    Rising energy prices and the resulting profitability typically generate a flurry of merger and acquisition activity in the oil and gas sector. The deals frequently target organizations that are independent and entrepreneurial in spirit — companies that have amassed a significant but often underdeveloped asset base and whose processes generally have not kept up with the growth of the company. The…
  • Client Story

    June 25, 2019
    FASB’s new lease accounting guidance (ASC Topic 842), issued on February 25, 2016, requires organisations to recognise lease assets and liabilities on the balance sheet and disclose key information on lease transactions. For most companies with leased assets, the change significantly affects financial reporting. Companies must obtain key information through lease abstraction and populate a data…
  • Flash Report

    November 5, 2020
    U.S. federal bank regulatory agencies have issued a much-anticipated paper on operational resilience, adding their voices to the chorus of global watchdogs calling on firms to enhance their resilience capabilities to wide-scale disruptive events before they significantly affect consumers, other businesses and the economy. The Federal Reserve, the Office of the Comptroller of the Currency and the…
  • Flash Report

    March 16, 2022
    Last month, Protiviti issued two Flash Reports on the crisis in Ukraine. The first[1] addressed Vladimir Putin’s recognition of two Ukrainian regions as “independent people’s republics,” deployment of “peacekeeping forces,” and demands that Ukraine disarm and negotiate the sovereignty of the two separatist regions; the West’s initial wave of sanctions as a proportionate response to Putin’s…
  • Blogs

    July 14, 2023
    As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s operations, cybersecurity risks remain top of mind for many organisations. To this end, organisations are continuously seeking to validate their cybersecurity defenses in protecting their assets and mitigating cybersecurity risks. 
  • Blogs

    March 31, 2022
    ISO 27002 contains details of controls required to be certified under the ISO 27001 standard. With the ever changing security threat landscape and the need to protect information assets, the International Organisation for Standardisation (ISO) has introduced several changes to the 27002 set of controls. These changes have been published in the latest version of the ISO 27002:2022 standard…
  • Podcast

    July 24, 2024
    The migration to post-quantum cryptography (PQC) is about to begin and is necessary to protect against the threats of fault-tolerant quantum computing. However, critical assets like those in military, banking, and government environments also require other layers of security and strategies such as zero trust and increased encryption bit sizes. Join host Konstantinos Karagiannis as he discusses a…
  • Flash Report

    March 9, 2023
    The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well as private businesses. The Biden-Harris Administration has been percolating a comprehensive cybersecurity strategy for some time and in early March released the aptly named “National Cybersecurity Strategy.” The 35-page document was created to help…
  • Newsletter

    April 9, 2021
    On February 26, 2021, the Board of Governors of the Federal Reserve System (FRB) in the United States issued expectations for boards of large financial institutions as a standard for its regulators when they assess board effectiveness. The guidance applies to all domestic bank holding companies and savings and loan holding companies with total consolidated assets of $100 billion or more, with…
  • Podcast

    November 1, 2023
    It’s the 11th hour as we approach 2024 and the release of NIST’s post-quantum cryptography standards. Is it possible for your business to start protecting some critical assets today from tomorrow's cryptanalytically relevant quantum computing? Find out how a few applications already do so. Join Host Konstantinos Karagiannis for a chat with Denis Mandich from Qrypt.Guest: Denis Mandich from Qrypt
Loading...