Insight Search

Sort by:
  • Podcast Transcript

    October 31, 2023
    It’s the 11th hour as we approach 2024 and the release of NIST’s post-quantum cryptography standards. Is it possible for your business to start protecting some critical assets today from tomorrow's cryptanalytically relevant quantum computing? Find out how a few applications already do so. Join Host Konstantinos Karagiannis for a chat with Denis Mandich from Qrypt.Guest: Denis Mandich from Qrypt
  • Blogs

    July 14, 2023
    In recent years, there’s been considerable talk of blockchain and its use cases in the business world. While some of these topics have specific use cases – metaverse, decentralised finance, etc – there is one topic that underpins everything in the blockchain and decentralised space: smart contracts. Smart contracts are behind-the-scenes applications that route data, track changes and settle…
  • Client Story

    April 28, 2022
    Web application accessibility is critical to the ongoing success of any digital application. In fact, the Americans with Disabilities Act (ADA) includes digital assets in its definition of “public places of accommodation” that should adhere to accessibility standards. Jamf, a global software company based in Minneapolis, Minn., produces applications to manage Apple devices and services and has a…
  • Podcast

    July 20, 2023
    VISION by Protiviti interviews Dr. Ian Oppermann, the New South Wales Government’s Chief Data Scientist working within the Department of Customer Service and expert on the future impact of technology on society, about how we’ll use the metaverse in the future. Dr. Oppermann is also an Industry Professor at the University of Technology Sydney and served as CEO of the New South Wales Data…
  • Flash Report

    April 28, 2022
    Cybersecurity threats are growing exponentially as companies introduce an increasing number of Internet of Things (IoT) devices into operations and collect and store an ever- escalating amount of data. This technology and data sprawl is providing bad actors with more entry points into networks and systems. Too often, organisations have failed to make commensurate investments in data protection,…
  • Blogs

    April 21, 2023
    Senior leaders focused on cybersecurity recognise there is considerable guidance, best practices, frameworks, regulations and varied opinions on how programmes should design defensive capabilities. In addition, depending on the day, the various pressures in the organisation’s macro-environment may be greater or lesser and invite different priorities for time, team and budget. Despite these…
  • Infographic

    February 21, 2024
    Recognizing the interplay of near-term and future risks is essential for comprehensive enterprise-wide risk management. Such reflection and evaluation offer CAEs valuable insights into how these intertwined risks can impact an organization's strategic success and long-term viability.
  • Survey

    February 15, 2024
    Chief financial officers (CFOs) have a unique vantage point regarding talent management, one that explains why the ability to attract, develop and retain top talent represents their top risk concern in both 2024 and 2034.
  • Flash Report

    June 3, 2022
    Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and…
  • Flash Report

    July 31, 2023
    On 26 July 2023, the U.S. Securities and Exchange Commission (SEC) adopted amendments1 to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing risk to public companies, investors and market…
Loading...