Insight Search

Sort by:
  • Whitepaper

    August 1, 2022
    The purpose of security analytics in an organisationSecurity metrics and the analysis of security information can be challenging concepts even for leading organisations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organisation’s security capabilities. If policies are the…
  • Podcast Transcript

    June 1, 2022
    Quantum computing via cloud access feels global, but there are reasons to have these machines located in a particular region. Oxford Quantum Circuits released a quantum computer named Lucy on Amazon Braket that not only helps customers with regulatory concerns, but also brings an exciting new type of transmon technology to the industry. Join host Konstantinos Karagiannis for a chat on the coaxmon…
  • Podcast

    June 1, 2022
    Quantum computing via cloud access feels global, but there are reasons to have these machines located in a particular region. Oxford Quantum Circuits released a quantum computer named Lucy on Amazon Braket that not only helps customers with regulatory concerns, but also brings an exciting new type of transmon technology to the industry. Join host Konstantinos Karagiannis for a chat on the coaxmon…
  • Video

    December 21, 2024
    In this episode of Protiviti Legal Perspectives, host Chad Volkert, Global Solutions leader at Protiviti, welcomes Peter Tierney, managing director in Protiviti’s Legal Consulting practice, to discuss the evolving landscape of legal document management. With nearly 30 years of experience in legal consulting, Peter shares insights into the challenges organisations face in managing legacy paper…
  • Whitepaper

    June 20, 2017
    Die Nutzung individueller Datenverarbeitungs-Anwendungen mit Excel, Access, Crystal Reports o.ä. kann negative Auswirkungen auf die Vertraulichkeit, Integrität, Verfügbarkeit sowie Nachvollziehbarkeit wichtiger Daten haben. Wir helfen Ihnen dabei geeignete Maßnahmen und Kontrollmechanismen zu definieren und zu implementieren.
  • Whitepaper

    September 14, 2020
    Was tun Sie, um Ihr Unternehmen vor digitalen Bedrohungen zu schützen? In unserer gemeinsamen Online Roadshow mit der TÜV SÜD Sec-IT gewähren wir Ihnen exklusive Einblicke in gängige Methoden und Top-Themenfelder der Informationssicherheit. Mit innovativen Lösungsansätzen nehmen wir Bezug auf die aktuelle Krisensituation, die Bedrohung durch Cyberangriffe und rechtliche…
  • Client Story

    June 16, 2023
    A leading biotechnology company that develops life-transforming medicines has worked for decades to improve the lives of those who rely on their work. But recently, they found themselves in need of assistance to enhance the security of their AWS environment.
  • Flash Report

    December 18, 2020
    The news of the cyber attacks being experienced by government agencies and an expanding list of organisations continues to grow and change on almost an hourly basis. This is proving to be potentially one of the most significant cyber breaches in recent times. Following up on our December 14, 2020, Flash Report on the CISA advisory, and in response to numerous questions and inquiries we…
  • Flash Report

    December 14, 2020
    On December 13, 2020, the Cybersecurity & Infrastructure Security Agency (CISA) issued an emergency directive detailing required action for federal agencies to mitigate the threat of the recently discovered compromise involving SolarWinds® Orion® Network Management products that are currently being exploited by malicious actors. (Read the SolarWinds Security…
  • Survey

    December 22, 2023
    Seit über 10 Jahren führt Protiviti – in enger Zusammenarbeit mit der ERM-Initiative der NC State University – eine jährliche Umfrage zu den Top-Risiken durch. Die Studie bietet tiefe Einblicke in die globalen Finanzmärkte und liefert fundierte Prognosen darüber, welche Entwicklungen und Herausforderungen das kommende Jahrzehnt prägen könnten.
Loading...