Insight Search

Sort by:
  • Whitepaper

    June 21, 2021
    In as much as COVID-19 has dramatically changed the lives of people, organisations, technologies, processes and workflow for just about every industry, it has been a tremendous boon to criminal enterprises. The disruptions from the unfolding global health emergency have created an unprecedented opportunity for fraudsters to carry out often-sophisticated, technology-enabled illicit schemes…
  • Client Story

    November 8, 2021
    A global insurance company — like so many other businesses — had come to rely on a service provider in India for finance operations support. It had no plan to change that arrangement. Then COVID struck. One week before 2020’s first-quarter closing, the Indian government prohibited workers from leaving their homes. This ruling lasted for 21 days as the nation struggled to limit its COVID…
  • Whitepaper

    June 10, 2022
    Big Tech’s “big” problem How big is Big Tech? There is little doubt that the big five technology companies (i.e., Apple, Microsoft, Google, Amazon and Facebook) are operating in a completely different stratosphere. As one recent New York Times blog described it, “America’s tech titans have formed a separate universe in which they are the sun, and everyone else — billions of humans, other…
  • Infographic

    July 15, 2022
    The global travel and tourism market has been on a bumpy recovery after losing roughly 62 million jobs in 2020, as companies adjust to disruptive government policies, changing consumer behavior and an ever-shifting demand for core products and services. In a survey conducted during a recent webinar, participants from the hospitality and airline industry shared their perspectives on…
  • Infographic

    March 15, 2022
    Restrictive government policies, the talent shortage, third-party outsourcing arrangements, disruptive digital technologies, and, of course, the persisting pandemic are the dominant risk issues being discussed in boardrooms and executive suites across the Technology, Media and Telecommunications (TMT) industry group.These risk issues and more are cited in Protiviti’s latest annual …
  • Survey

    April 1, 2021
    In the annual top risks survey conducted by Protiviti and NC State University’s ERM Initiative, technology, media and telecommunications executives ranked pandemic-related government policies, adoption of digital technologies, data privacy and information security, cyber threats, and diminished economic activity among their top risk issues for 2021 and beyond. The survey results reflect…
  • Whitepaper

    March 28, 2022
    As governments across the globe, including the EU, US, Canada, UK, Japan, Singapore and more, have imposed sanctions on Russia, with promises of additional action if Russia persists with its war on Ukraine, financial institutions and their customers are forced to review their trade and commodities transactions involving Russia to assess their legal and reputation risk. These reviews are…
  • Infographic

    February 23, 2022
    Whether it’s challenges in the supply chain, rising cost of products, raw materials and shipping, disruptive technologies, labor shortages, data breaches, or restrictive government policies, the list of market-changing risks facing the retail and consumer packaged goods industry is long and daunting. These risk issues and more are identified in Protiviti’s latest annual Top Risks…
  • Podcast

    September 18, 2024
    Imagine a mesh network of AI-powered nodes that could validate the security of your organisation’s systems and applications. It’s a clever use of blockchain to add security to real-world devices, and, best of all, it will feature post-quantum cryptography. How soon will this technology simplify security for businesses and governments worldwide? And might this kind of approach even prevent killer…
  • Flash Report

    May 14, 2021
    On May 12, President Joe Biden issued the Executive Order on Improving the Nation’s Cybersecurity. This executive order (EO) is the most recent action by the administration to strengthen U.S. national cyber defenses and address cybersecurity threats and attacks that continue to grow in magnitude, impact and frequency. It is intended to protect networks in the federal, public and private…
Loading...