Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog April 11, 2016 The Company You Keep: A Case for Supplier Codes of Conduct Las Vegas tourism promoters used to promise, “What happens in Vegas, stays in Vegas.” It’s much harder to make such a claim these days, when even the most benign shenanigans are only a smartphone video away from global critique. Corporations are being held accountable, as well - not only by regulators, but by citizen journalists, activists, whistleblowers and customers, empowered by social media… Blog April 15, 2016 Guide to Public Company Transformation Answers What You Always Wanted to Know About the IPO and Beyond If you’re preparing to take your company public, you surely know you have a lot of new reporting and legal requirements to meet, and that your organization will require a number of changes. You may also know that you will need help in this process, or at least some good guidance. The latest edition of Protiviti’s Guide to Public Company Transformation: Frequently Asked Questions, released last… Blog April 21, 2016 Ten Cybersecurity Action Items for CAEs and Internal Audit Departments Since the release of our 2016 Internal Audit Capabilities and Needs Survey last month, I’ve been going back and looking at the results, which also include some insightful 10-year trends. We will get back to these in another post; instead, I prefer to focus here on one aspect of the results – the growing need for cybersecurity skills and resources. Cybersecurity risk is a growing concern – not… Blog April 25, 2016 Top Risks 2016 Webinar Follow-Up: Jim DeLoach on Changes in Risk, Technology and Culture Challenges A few weeks ago, Protiviti and North Carolina State University’s Enterprise Risk Management (ERM) Initiative published Executive Perspectives on Top Risks for 2016, the results of an annual survey. Regulatory changes topped the list of executives’ and directors’ concerns for the fourth consecutive year, followed by economic concerns and worries about cyber threats. Operational risks dominated,… Blog April 26, 2016 Internal Audit Reminder: Opportunity to Comment on the New Professional Standards Ends April 30 Thanks, again, to everyone who tuned in to the live stream of our What’s on the Internal Audit Horizon webinar on March 31. For those of you who missed it, we had a packed agenda covering a wide variety of topics. I’ll hit the highlights, but you’re going to need to watch the archived version of the one-hour webinar to get more detailed information, including best practice summaries and our road… Blog May 2, 2016 Internal Audit at a Tipping Point and Ten-Year Trends May is International Internal Audit Awareness Month. We are celebrating with a series of blog posts focused on internal audit topics and the daily challenges and future of the internal audit profession. In the tenth year of our Internal Audit Capabilities and Needs Survey, we believe internal audit has arrived at a tipping point. The issue is no longer whether or not your function is… Blog May 6, 2016 Auditing Technology Risk: It’s Priority 1 Through 10 May is International Internal Audit Awareness Month. We are celebrating with a series of blog posts focused on internal audit topics and the daily challenges and future of the internal audit profession. We issued our IT Audit Benchmarking Survey Report at the end of last year, and we discussed IT audit best practices in a December 9 webinar with our own IT audit practice leader, David… Blog February 9, 2022 Making a Good Thing Better: Migrate SAP BusinessObjects Platform to the Cloud SAP Business Objects, often referred to within the SAP ecosystem as BOBJ, is one of the most evolved and reliable analytics and reporting engines running today. With over 60,000 BOBJ installations, the solution can be found in companies of all sizes in every industry around the world. Founded in 1990 and acquired by SAP in 2007, Business Objects is still primarily located in on-premise servers… Blog February 8, 2022 Vulnerability Management: We’ve Been Doing It All Wrong Vulnerability management is a discipline that many organizations struggle with due to one simple factor: complexity. Today, organizations manage environments with technology that changes at an ever-increasing speed while relying upon legacy systems to support key business processes. In response to this complexity challenge, cybersecurity professionals continue to create new vulnerability… Blog January 31, 2022 CISOs and Year Two of the Pandemic – How Did We Adapt and What Still Must Change? In December 2021, in my role as president of the ISSA Delaware Valley Chapter, I had the honor of hosting a panel with five Chief Information Security Officers (CISOs), representing five different industries, each facing unique challenges presented by the global COVID-19 pandemic. The panelists included: Robert Younce - CISO of Mannington Mills, one of the world's leading manufacturers of fine… Load More