Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper March 23, 2021 CFO EXCHANGE EXECUTIVE SUMMARY (MARCH 12) Chief financial officers (CFOs) of high-growth technology industry companies meet virtually in a small-group setting using Chatham House rules to exchange learnings and discuss business challenges and industry trends. Participants of this exclusive CFO peer group create the agenda through a series of pre-interviews. Protiviti is proud to support and host members of this community. The… Whitepaper April 24, 2024 Sanctions Risk Assessment: A Key Risk Management Tool Aufgrund wachsender Komplexität der geopolitischen Landschaft setzen Regierungen Finanzsanktionen zunehmend als außenpolitisches Instrument ein, um so auf Konflikte und menschliche Sklaverei zu reagieren. Whitepaper October 24, 2024 Reframing Regulatory Change: Adapting to Win Regulations continue to expand in number and scope, driven by a variety of sources. As a result, the industry must deal with regulatory change on an ongoing basis. Some companies take an ‘adapting to win’ approach, which benefits not just how they manage regulations (and regulators) but their systems, controls and processes. Podcast August 30, 2021 Podcast - Future of Transaction Monitoring: Chasing The Holy Grail The current and future state of suspicious activity monitoring and reporting is being transformed by technology and the use of data, analytics and robotics. In this episode, Mark Highton – Managing Director leading Protiviti’s Financial Crimes Consulting practice, interviews Vishal Ranjane - Head of Global AML Strategies, Solutions and Transformation at TD Bank, and Seth Twery - VP of Client… Survey November 21, 2023 2023 Technology, Media and Telecommunications Finance Trends TMT finance leaders cite ESG, inflation and data security among top priorities“The more things change, the more they remain the same” aptly describes the current dynamic for finance leaders across the technology, media and telecommunications (TMT) industry group.Inflation, supply chain challenges, consumer demand for sustainable and inclusive practices and reporting, new technologies,… Flash Report July 26, 2023 PCAOB Issues Staff Update and Preview of 2022 Inspection Observations Discover PCAOB's 2022 Inspection Observations & tech-auditing trends. Crucial insights for SEC registrants & audit committees. Read the full report here. Blogs March 25, 2021 The Complexities of Rapidly Evolving Wage Law: Act Now to Mitigate Your Risk Is Your Organisation Underpaying or Overpaying its Employees? No organisation wants to be headline news for underpaying its employees. However, many businesses are being publicly ostracised for violating enterprise agreements (EAs) in Australia. Not only are EAs incredibly complicated, wage law is also evolving rapidly, with Victoria and Queensland passing legislation in 2020. Unfortunately,… Newsletter April 17, 2020 COVID-19: Paradigm Shift in the Boardroom The global COVID-19 pandemic is a different experience from other catastrophic events like the September 11, 2001 attacks and the 2007-2008 global financial crisis. It is spawning new thinking in all quarters, especially in boardrooms. It’s been several weeks since coronavirus disease 2019 (COVID-19) truly captured everyone’s attention across the globe. But with new developments almost hourly,… Whitepaper October 5, 2020 Private Equity and Hedge Funds: Methods of Choice for Money Laundering Threat Actors Private investment funds under management have grown over the past 25 years into a several trillion-dollar industry in the United States. In a leaked Federal Bureau of Investigation (FBI) unclassified but sensitive bulletin, the FBI concludes, with high confidence,[1] that threat actors (both financially motivated criminals and foreign adversaries) are using the private placement of funds,… Newsletter May 3, 2022 Ransomware: Preventing an Attack and Responding to and Recovering From an Attack Ransomware attacks have been around for many years. In the past, cyber-threat actors would penetrate a company’s computer and network systems and obtain data with the objective of returning it upon payment. The demanded payments were usually smaller than the ransoms requested in recent incidents. Most of these incidents weren’t financially material, nor were they reported publicly. By contrast,… Load More