Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Podcast January 20, 2020 Journey to the Cloud: Debunking Myths and the Role of Artificial Intelligence in Cloud Security Welcome to the new edition of Powerful Insights and our series on Cybersecurity Awareness. Protiviti has a series of webinars on cybersecurity awareness that, along with these accompanying podcasts, are intended to highlight ways organisations can be proactive in addressing these critical security challenges today. We explore how leaders can dynamically build cyber resilience while maximising… Whitepaper April 21, 2022 PCI Security Standards Council publishes updated data security standard DSS 4.0 addresses rapidly evolving threat environment and provides flexibility for how organisations can achieve compliance On March 31, 2022, the PCI Security Standards Council (PCI SSC) released a new version of the PCI Data Security Standard (DSS). PCI DSS 4.0 is the first revision to the DSS in almost four years. It represents a major update to the standard as the payments industry faces an… Blogs April 6, 2023 3 Steps to Understanding IAM Challenges in Securing the DevSecOps Ecosystem This blog post was authored by Siobhan Moran - Director, Senthil Kumar Kothandaraman - Associate Director, Security and Privacy on The Technology Insights Blog. DevSecOps is an organisational software engineering culture and practice that aims at unifying software development (Dev), application security (Sec), and operations (Ops). The main characteristic of DevSecOps is to monitor and apply… Podcast September 20, 2022 Risky Women Podcast | Risk & Compliance at the Speed of Modern Business: Lynn Haaland Christine Halvorsen, Protiviti's U.S. Risk and Compliance lead, talks with Lynn Haaland, Chief Compliance, Ethics & Privacy Officer at Zoom Video Communications about the Risk and Compliance at the speed of modern business. Halvorsen and Haaland discuss how to establish a successful framework for managing privacy and compliance in a technology company and how to balance top privacy issues at… Whitepaper October 13, 2021 Security, Data, Analytics and ESG Top 2021 Priorities for TMT Finance Leaders Corporate finance teams in technology, media and telecommunications (TMT) are embracing new operating models, strategies and technologies in response to the escalated business risk and regulatory environment, as well as shifting expectations of both internal and external customers. Across the industry, teams continue to increase their focus on top priorities identified at the height of the… Blogs June 4, 2021 Control Cloud to Manage Security and Risk Ensuring IT risks are managed, and compliance requirements are met has only intensified with the recent rapid growth in adoption of cloud services. Deployment of production workloads, migration of regulated systems and increasing storage of large volumes of data in the cloud has driven the need for security and controls to be deployed across customer cloud environments. Podcast May 29, 2024 Podcast ǀ Legal Perspectives: Top Risks Trends for 2024 and 2034 In this special edition of Protiviti Legal Perspectives, our panelists—Jamy J. Sullivan, JD, Executive Director of Robert Half Legal Talent Solutions; Nicholas You, Associate Director of Legal Consulting at Protiviti; and Mark Carson, Managing Director at Protiviti—join Protiviti podcast host Chad Volkert to delve into the most pressing legal risks for in-house legal departments. This discussion… Newsletter September 28, 2022 Identifying and managing the critical risks of third-party providers “Outsourcing and other third-party relationships can bring multiple benefits to FIs, including: enhanced operational resilience; faster and more tailored financial products and services; cost reduction; greater innovation; and improved internal processes. However, outsourcing and third-party relationships can give rise to new or different risks to FIs and potentially to financial stability that… Whitepaper July 28, 2022 Maximising OT Security and Resiliency Through a Risk-Based Framework The past 18 months have seen a significant increase in threats targeting critical infrastructure and operational technology (OT) networks. These environments are prime targets due to their age, complexity and importance to organisations. OT is the driver behind the largest corporations in the world – whether it is mixing the secret recipe for Coca-Cola, generating power for millions of customers… Whitepaper February 21, 2023 ISO 27001: 2022 - Key Changes and Approaches to Transition This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organizations can take to implement the changes introduced. There have been significant advancements in technology, as well as an increase in the complexity of security threats since the last iteration of ISO 27001 was published on September 25, 2013. The changes introduced in… Load More