Results for

  • Blog
    October 25, 2019
    The National Institute of Standards and Technology (NIST) and the Office for Civil Rights (OCR) recently hosted another informative conference focused on safeguarding patient information. Representatives from Protiviti’s healthcare/cybersecurity team attended the annual event, which brings together a diverse group from across the healthcare industry, including government, healthcare delivery…
  • Blog
    October 29, 2019
    Cyber crime is growing -- here are six reasons why financial services organizations should build operational resilience now. To learn more about Protiviti's Operational Resilience framework and our 24/7 command center, click here.
  • Blog
    November 5, 2019
    A project must start somewhere. And the best place is right here. Phase Zero, or the very foundational steps an organization would take to begin its journey to a successful implementation of SAP S/4HANA. In this post, we will focus on the processes before implementation and early stage management and governance, looking at the various approaches and key areas that all companies should consider as…
  • Blog
    June 6, 2019
    The California Consumer Privacy Act (CCPA) continues to be a work in progress. For bills to advance, they must go through the full Assembly, the California Senate and the California governor to be enacted as law. As the CCPA works its way through the legislative process, lawmakers in California continue to mull over the proposed amendments to clarify the legislation, limit its scope and…
  • Blog
    June 14, 2019
    More and more financial services firms are saying they are cloud first, but they are really cloud averse and it’s understandable. When we ask firms how they are embracing “digital transformation,” and the impact associated with fundamental digital change, most business owners proclaim they are transforming or evolving into digital. However, there is a disconnect between the business and support…
  • Blog
    September 4, 2019
    Things just aren’t as simple as they used to be. When it comes to managing organizational IT risks associated with confidentiality, integrity and availability (the long held “CIA” triumvirate within security), it doesn’t get any easier. A confusion of terms as well as the merging of traditional security and resiliency processes has contributed to recent noise. As companies address the risk of…
  • Blog
    March 18, 2019
    Security and Risk. Two words that strike fear in the hearts of the unprepared.  No matter what your role is within the organization, these words can keep business leaders awake well into the wee hours. Recently, we worked with a large telecommunications company that was faced with solving significant security issues putting the organization at risk. Generally, this telecom was unable…
  • Blog
    August 2, 2022
    Senior executives who oversee IT and technology are facing a conundrum. Resources, already in short supply, are being spent on day-to-day business operations, preventing organizations from making headway on big-picture innovations and long-term projects. How can organizations “think big” while ensuring everything at the top of their agenda gets taken care of? The past two years of economic,…
  • Blog
    August 3, 2022
    Gain an early advantage over competitors by turbocharging the sales cycle! The origination of many sales cycles is the CPQ process – or configure, price, quote. When optimized processes are supported by the right technology, sales teams can provide better customer service and focus on value-added work that leads to more revenue. CPQ systems can improve efficiencies and reduce risk through…
  • Blog
    August 4, 2022
    With organizations transitioning to unlock the full potential of S/4HANA and SAP cloud solutions, GRC functionalities and operations also need to be updated. For example, updating the Segregation of Duties (SoD) ruleset to support S/4HANA transactions including Fiori apps, or to run risk analysis on HANA database users. While an implementation or upgrade project would typically include the…
Loading...