Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Podcast June 30, 2021 Podcast | Shortcuts to Coding Quantum with Amazon Braket and QCI Qatalyst Quantum computing is easy to access thanks to services like Amazon Braket. But how long does it take to apply one of these systems to a real-world use case? Sometimes months. Amazon partner Quantum Computing, Inc. (QCI) has launched Qatalyst API to shorten development time on some types of quantum coding … to under a week! Listen in to hear how Amazon is preparing for the future of high-… Flash Report December 30, 2020 PPP 2.0 – A Renewed Opportunity (and New Set of Headaches) for Lenders As the old saying goes, the best deals are made when neither side gets exactly what it wants. By that standard, the most recent federal pandemic relief bill that finally passed into law in late December certainly qualifies as a great deal. Democrats who for months had been seeking a bill in excess of $3 trillion were undoubtedly disappointed by the final price tag of slightly more than $900… Newsletter March 23, 2020 COVID-19’s Workplace Disruption: A Test of Board Resiliency (An Expanded Discussion) The discussion below is a more complete coverage, including examples, of the topic addressed in Issue 126 of Board Perspectives: Risk Oversight and on NACD/BoardTalk.In a crisis, clear thinking is needed in the boardroom. The unprecedented nature of the COVID-19 pandemic has set in motion one of the most abrupt disruptions in decades, leaving organisations reeling with uncertainty… Survey January 19, 2022 2022 AND 2031 Technology, Media & Telecommunications (TMT) Perspectives on Top Risks TMT industry leaders view restrictive government policies, economic uncertainty and talent gap among major risk driversRestrictive government policies, the talent shortage, third-party outsourcing arrangements, disruptive digital technologies, and, of course, the persisting pandemic are the dominant risk issues being discussed in boardrooms and executive suites across the Technology, Media and… Whitepaper July 5, 2022 Meet Compliance and Regulatory Requirements for Records Management with Microsoft 365 Review of Microsoft 365 Capabilities for Records Management and the ICA Guidelines and Functional Requirements for Electronic Document and Records Management Systems Leveraging Microsoft 365 and SharePoint Online as an organisation’s primary electronic document and records management system (EDRMS) provides the ability to effectively fulfill compliance and regulatory requirements for information… Whitepaper June 24, 2022 PCI Security Standards Council Publishes New Versions of Self-Assessment Questionnaires On April 29, 2022, the PCI Security Standards Council (PCI SSC) released new versions of the PCI DSS Self-Assessment Questionnaires (SAQs) ahead of the anticipated June 2022 release timeline. After the release of the new version of PCI DSS 4.0 a month prior, the new versions of the SAQs have been updated to reflect changes in the standard, as well as to adjust requirements applicable for… Infographic February 2, 2024 Infographic | 2024 Top Risks in the Technology, Media and Telecommunications Industry TMT leaders cite cyber threats, talent shortage and inflation among top risksIn Protiviti’s latest top risks survey, executives from the technology, media and telecommunications (TMT) industry identified the biggest threats they anticipate over the next 12 months and a decade ahead. Their perspectives, highlighted below, shed light on risks that they must address to keep their business thriving… Podcast September 27, 2023 Regulation, risk and reward with HSBC’s Chief Compliance Officer, Asia Pacific Some of the key things that I see will be around digitalisation, open banking, artificial intelligence and robotics, workforce transformation, cyber security, and as mentioned, sustainable banking as well as regulatory technology. We're also already seeing an increase in regulatory complexity, and banks will need to invest significantly more, in my opinion, around regtech solutions. These… Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Blogs June 30, 2023 A house divided: Key differences in cybersecurity implementation for IT and OT Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll Tide vs. War Eagle, The Egg Bowl, Bedlam, The Backyard Brawl, “The Game”). But we’re fundamentally not all that… Load More