Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs April 19, 2023 Achieving Diversity’s Benefits in Cybersecurity Could any security organisation benefit from greater innovation? Or from responding more effectively to diverse internal customers? How about benefitting by retaining the talent its leaders have so carefully nurtured, by accessing more diverse capabilities, or by improving problem-solving capabilities within the team? Blogs April 27, 2022 A Balancing Act: SAP in the Cloud SAP customers know the cloud can help them innovate and find new opportunities but are also concerned with compliance and risk. Recently, we spoke with SAPinsider’s Chief Research Officer Riz Ahmed about how SAP customers can find a balance whereby they realize cloud’s innovation opportunities while managing cloud’s risks. Here’s a recap of our conversation. Blogs July 13, 2022 Congratulations on Choosing SAP. What Comes Next? Congratulations! Your organisation recently made the decision to move forward with selecting SAP S/4HANA, and you will either be leaving an old ERP or a previous version of SAP ECC behind — a great strategic move but only the first in many more decisions to come on the SAP ERP journey that lies ahead. The SAP solution portfolio includes numerous components that can be deployed in many ways. To… Blogs April 6, 2023 How SAP Central Finance Benefits Manufacturers This blog post was authored by Sheeraz Iqbal, Director, Enterprise Application Solutions on The Sap Insights Blog. Manufacturers often have heterogenous systems to accommodate different processes in a manufacturing cycle. From procurement and inventory management to calculating overhead, these systems carry critical financial data and information that are necessary to determine profitability,… Blogs May 17, 2024 Developing a security function during a CISO’s first 100 days These turbulent times of evolving threats and rising personal responsibility considerations for cybersecurity leaders make the CISO role a challenging but rewarding position. The CISO must contend with an increasing sophistication of attacks, potential geopolitical adversaries and the material impact cybersecurity can have on organisational value. Whether it’s a new CISO or a seasoned… Blogs April 26, 2024 Embrace DEI intersectionality for effective cybersecurity The role of a cyber incident responder is more critical than ever as these professionals are tasked with protecting organisations from cyber threats, mitigating risks and minimising the impact of security incidents. As cyber threats continue to proliferate, targeting organisations of all sizes and sectors, it is imperative for cyber incident response (CIR) teams to be well prepared at mitigating… Blogs February 23, 2024 The importance of dark web monitoring In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of the most challenging and often overlooked threats is the dark web, an intentionally hidden part of the internet where threat actors can operate with a greater sense of anonymity. To adequately protect assets, companies need to do more than merely… Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Blogs May 24, 2022 A CISO’s First 100 Days: Finding Champions and Building Relationships It’s our good fortune to have an abundance of information security expertise at Protiviti, and it’s even better when we assemble these experts to share their experiences. In this first of a three-blog series, we discuss the early days for the CISO’s transition into a new leadership role which include: Establishing crucial relationships with the business, IT and security and privacy teams. the… Blogs June 30, 2023 A house divided: Key differences in cybersecurity implementation for IT and OT Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll Tide vs. War Eagle, The Egg Bowl, Bedlam, The Backyard Brawl, “The Game”). But we’re fundamentally not all that… Load More