Cybersecurity Collection Cyber-Resilienz ist die Fähigkeit einer Organisation, Störungen der Cybersicherheit zu erkennen, zu verhindern, darauf zu reagieren, Cybersicherheit wiederherzustellen und daraus zu lernen. Unsere Cybersecurity-Sammlung thematisiert häufige Fälle, Trends sowie die Maßnahmen, die Unternehmen ergreifen müssen, um proaktive und reaktive Lösungen zu entwickeln und ihre Vermögenswerte zu schützen. Insights paper October 8, 2024 Best Practices for Building a Sustainable PCI DSS Compliance Programme Creating and maintaining a sustainable PCI DSS compliance programme is a crucial and complex task for organisations to protect payment card transactions and uphold consumer trust. However, despite the PCI DSS standard being around for almost 20 years, many organisations still struggle to achieve and validate compliance with it.In April 2016, the PCI Security Standards... Read more Featured Insights WHITEPAPER October 22, 2024 Establishing a scalable AI governance framework Establishing an AI governance structure paves the way for effective management and measurement of AI solutions, fostering innovation while mitigating... SURVEY October 1, 2024 CFOs Address a Data Security and Privacy Triple Threat CFOs prioritise addressing the trifecta of data security and privacy threats due to rising cyber warfare, extortion risks, and stringent regulatory... SURVEY September 26, 2024 From AI to Cyber - Deconstructing a Complex Technology Risk Landscape Protiviti’s global internal audit survey 2024 highlights the challenges and technology risk trends faced by internal auditors worldwide. Download the... BLOG September 17, 2024 Energy and Utility OT and IT Convergence Efforts Bring Opportunity Amid Challenges and Risk Like companies in other industries, energy and utilities (E&U) organizations want to more efficiently leverage data generated in the field by... Button Button WHITEPAPER October 22, 2024 Establishing a scalable AI governance framework Establishing an AI governance structure paves the way for effective management and measurement of AI solutions, fostering innovation while mitigating... SURVEY October 1, 2024 CFOs Address a Data Security and Privacy Triple Threat CFOs prioritise addressing the trifecta of data security and privacy threats due to rising cyber warfare, extortion risks, and stringent regulatory... SURVEY September 26, 2024 From AI to Cyber - Deconstructing a Complex Technology Risk Landscape Protiviti’s global internal audit survey 2024 highlights the challenges and technology risk trends faced by internal auditors worldwide. Download the... BLOG September 17, 2024 Energy and Utility OT and IT Convergence Efforts Bring Opportunity Amid Challenges and Risk Like companies in other industries, energy and utilities (E&U) organizations want to more efficiently leverage data generated in the field by... Data Privacy & Protection CLIENT STORY October 21, 2024 Enhancing Consent Management with OneTrust Protiviti and OneTrust helped a global software and IT solutions provider enhance its consent management processes, ensuring regulatory compliance.... VISION October 18, 2024 Did China break encryption? Protiviti’s quantum director sets the record straight “Let’s say the claims are true. Let’s pretend it’s not some nation-state psy-op to try and freak out the West of something. Even if the claims are 100... VISION September 30, 2024 Future of Privacy Forum CEO Jules Polonetsky on “exciting but risky” road ahead “For better or worse, the dam burst and everyone, from the most conservative organization to the wildest startup, is rolling out [AI] stuff that comes... INSIGHTS PAPER March 20, 2024 Mastering Data Dilemmas: Navigating Privacy, Localisation and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape... Button Button CLIENT STORY October 21, 2024 Enhancing Consent Management with OneTrust Protiviti and OneTrust helped a global software and IT solutions provider enhance its consent management processes, ensuring regulatory compliance.... VISION October 18, 2024 Did China break encryption? Protiviti’s quantum director sets the record straight “Let’s say the claims are true. Let’s pretend it’s not some nation-state psy-op to try and freak out the West of something. Even if the claims are 100... VISION September 30, 2024 Future of Privacy Forum CEO Jules Polonetsky on “exciting but risky” road ahead “For better or worse, the dam burst and everyone, from the most conservative organization to the wildest startup, is rolling out [AI] stuff that comes... INSIGHTS PAPER March 20, 2024 Mastering Data Dilemmas: Navigating Privacy, Localisation and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape... Digital Identity FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... BLOG February 7, 2024 IAM in Operational Technology: How and Where to Make it Work By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now... BLOG April 5, 2024 New SEC Cybersecurity Disclosure Rules: Key Takeaways From Companies’ Responses While the ink is still drying on many 2023 Form 10-Ks, Protiviti has reviewed a subset of the filings to gauge how firms are responding to the U.S.... BLOG October 3, 2023 Emerging Trends in IAM Part 4: Going Passwordless with the FIDO Use Case The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their... Button Button FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... BLOG February 7, 2024 IAM in Operational Technology: How and Where to Make it Work By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now... BLOG April 5, 2024 New SEC Cybersecurity Disclosure Rules: Key Takeaways From Companies’ Responses While the ink is still drying on many 2023 Form 10-Ks, Protiviti has reviewed a subset of the filings to gauge how firms are responding to the U.S.... BLOG October 3, 2023 Emerging Trends in IAM Part 4: Going Passwordless with the FIDO Use Case The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their... Security Strategy & Architecture BLOG October 7, 2024 Low-Code Applications Yield High Value, Big Change in Less Time The big picture: Deploying enterprise technology systems and tools often is cumbersome and hampered by complex configurations, lengthy implementations... VISION September 24, 2024 Protecting data and minimizing threats with Microsoft’s Sarah Armstrong-Smith “When we're talking about cyber-attacks, data breaches, intellectual property theft, whichever way you want to look at it, ultimately it'll come down... VISION September 18, 2024 Former CISO on what boards are getting wrong about data protection and privacy “We had two well-known CISOs with two very public companies charged with felonies through the SEC, which led to the cybersecurity disclosure rule... VISION September 10, 2024 CPO or no? Protiviti’s Tom Moore on the evolution of the privacy role and its uncertain future When Google, a company estimated to hold between 10 and 15 exabytes of data — or the storage power of about 30 million PCs — makes a potentially game... Button Button BLOG October 7, 2024 Low-Code Applications Yield High Value, Big Change in Less Time The big picture: Deploying enterprise technology systems and tools often is cumbersome and hampered by complex configurations, lengthy implementations... VISION September 24, 2024 Protecting data and minimizing threats with Microsoft’s Sarah Armstrong-Smith “When we're talking about cyber-attacks, data breaches, intellectual property theft, whichever way you want to look at it, ultimately it'll come down... VISION September 18, 2024 Former CISO on what boards are getting wrong about data protection and privacy “We had two well-known CISOs with two very public companies charged with felonies through the SEC, which led to the cybersecurity disclosure rule... VISION September 10, 2024 CPO or no? Protiviti’s Tom Moore on the evolution of the privacy role and its uncertain future When Google, a company estimated to hold between 10 and 15 exabytes of data — or the storage power of about 30 million PCs — makes a potentially game... Security Resilience BLOG October 9, 2024 Digital Twins: Adopting a Data-Centric Approach to Mature Resilience Operational resilience – the ability for firms to prevent, adapt, respond to, recover and learn from operational disruptions – is a common concern for... BLOG September 26, 2024 The Strategic Imperative of Enterprise Resilience In a volatile business environment, the concept of resilience has emerged as a cornerstone of strategic management. More than just a trendy concept,... CLIENT STORY September 24, 2024 Enhancing Cyber Resilience Strategies in Global Manufacturing with the FAIR Methodology Protiviti helps a global manufacturer enhance cyber resilience strategies with a Factor Analysis of Information Risk (FAIR) quantification programme. WHITEPAPER May 28, 2024 DORA Compliance: Untangling Key Hurdles to Implementation The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final... Button Button BLOG October 9, 2024 Digital Twins: Adopting a Data-Centric Approach to Mature Resilience Operational resilience – the ability for firms to prevent, adapt, respond to, recover and learn from operational disruptions – is a common concern for... BLOG September 26, 2024 The Strategic Imperative of Enterprise Resilience In a volatile business environment, the concept of resilience has emerged as a cornerstone of strategic management. More than just a trendy concept,... CLIENT STORY September 24, 2024 Enhancing Cyber Resilience Strategies in Global Manufacturing with the FAIR Methodology Protiviti helps a global manufacturer enhance cyber resilience strategies with a Factor Analysis of Information Risk (FAIR) quantification programme. WHITEPAPER May 28, 2024 DORA Compliance: Untangling Key Hurdles to Implementation The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final... Content Collections Technology Industry Collection Eine kuratierte Sammlung aus Themen, Trends und Erkenntnissen, die Unternehmen der Technologie-, Medien- und Telekommunikationsbranche (TMT) bei der Bewältigung der aktuellen Herausforderungen und Chancen unterstützen. In jeder kritischen Phase Ihres Unternehmenswachstums helfen Ihnen Protivitis Erkenntnisse und Lösungen.Unser… Mehr erfahren Board and C-Suite Leadership Collection Die neuesten Trends, Risiken und Herausforderungen für Vorstände und CEOs weltweit. Diese Thought Leadership Sammlung bietet praktische Einblicke und Orientierung für neue und erfahrene Vorstandsmitglieder zu Themen wie Daten / Künstliche Intelligenz, Technologie-Modernisierung, Nachfolgeplanung, disruptive Innovation,… Mehr erfahren Audit & Risk Management Collection Protiviti-Führungskräfte und Subject-Matter-Experten aus der ganzen Welt bieten Einblicke in die wichtigsten Themen, mit denen Unternehmen in unserem dynamischen, herausfordernden und wettbewerbsorientierten globalen Geschäftsklima konfrontiert sind. Unsere erstklassige Erfahrung in den Bereichen Interne Revision und… Mehr erfahren