Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper October 24, 2024 Reframing Regulatory Change: Adapting to Win Regulations continue to expand in number and scope, driven by a variety of sources. As a result, the industry must deal with regulatory change on an ongoing basis. Some companies take an ‘adapting to win’ approach, which benefits not just how they manage regulations (and regulators) but their systems, controls and processes. Blogs June 18, 2024 Design Thinking for Technology Modernisation: Driving Value, Reducing Technology Debt In the consumer products and retail sectors, the burdens of legacy systems and manual processes pose significant challenges for organisations across the value chain from store or online purchases to overall operations. Disconnected applications, error-prone tasks, technical debt and a lack of insight and intelligence can hinder efficiency and innovation. To address these pressing issues, a… Whitepaper November 18, 2022 Managing credit risk in a differentiated downturn In this issue of the Credit Pulse, we look at credit risk considering the macroeconomic and geopolitical trends likely to shape the financial services industry over the next six months. First, we focus on critical considerations for loan servicers in the post-pandemic era. Then, we discuss risk management practices for non-financial organizations that extend trade credit and institutions that… Flash Report December 13, 2023 EU Lawmakers Reach Agreement on AI Act, Creating Regulatory Framework Addressing Risks of AI On December 8th, after two and a half years of negotiation, the Council of the EU and the EU Parliament finally reached a provisional agreement on the EU AI Act, which was first proposed by the European Commission in 2021. The agreement creates legislation that introduces harmonised rules and definitions for those using AI systems and putting those systems into service and bans certain types of… Blogs May 17, 2024 Risk management essentials for SAP S/4HANA projects An SAP S/4HANA transformation project has many risks that need to be managed and often, it is difficult for the project team operating day to day on detailed tasks to “see the forest for the trees.” The PMO has intimate knowledge of the key processes and risks associated with the project and, as such, is in an ideal position to develop mitigation strategies in collaboration with the system… Blogs July 31, 2023 Simple is secure: Streamlining smart contract design For security teams looking to implement and design smart contracts, there are many intricacies and nuances that can be overwhelming. Using established standards for the secure development of smart contracts/decentralised applications (dApps) is instrumental to effectively launch smart contracts. In an earlier blog, I introduced the basics of smart contracts; today, I’m diving into existing… Flash Report June 3, 2022 SEC Cybersecurity Disclosure Enhancements: They’re Coming, in One Form or Another Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and… Blogs May 17, 2024 Inclusive culture starts with contract language Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in responses. Over the past several years, more and more potential customers are seeking cybersecurity partners whose values in the areas of diversity, equity and inclusion (DEI) correspond with their own. Sometimes, enterprises will… Blogs February 23, 2024 The importance of dark web monitoring In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of the most challenging and often overlooked threats is the dark web, an intentionally hidden part of the internet where threat actors can operate with a greater sense of anonymity. To adequately protect assets, companies need to do more than merely… Blogs January 31, 2024 Capabilities, limitations of Microsoft’s native SoD tool Segregation of duties (SoD) is a well-known term among auditors and anyone who has ever been audited. SoD is the understanding that no user should have access to two conflicting business functions that would allow a user to commit fraud or error (e.g., the ability to create a vendor record, then process a payment to that vendor). The idea can be intimidating and overwhelming to those who do not… Load More