Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog May 2, 2019 Update on 2019 Privacy Legislation As legislative sessions came to a close around the United States late last month, a number of proposed state laws around privacy currently in flight failed to move out of their house of origination in Nevada, New York, New Mexico and Hawaii. This effectively ends their entry into the 2019 legislative session, with just a miniscule chance for being reintroduced by mechanical measures such as a… Blog May 20, 2019 Designing Oracle Cloud Job Role Security for Optimization and Compliance It’s no secret that Oracle Cloud is quickly making its mark on the cloud application landscape. Over the last several years, Oracle’s cloud footprint has expanded tremendously. In doing so, more and more companies are beginning to understand the complexities of Oracle Cloud application security and how it can either help or hinder compliance goals. For many organizations, risks related to… Blog November 30, 2018 Securing SAP S/4HANA with GRC 12 and IAG With enterprises focusing on big data, mobility and cloud while managing cybersecurity risks that could exploit internal vulnerabilities that allow access to sensitive data, organizations have been on high alert about how to manage this risk effectively. Protiviti recently held a webinar highlighting new features in SAP’s latest governance module, GRC 12, and Cloud Identity Access… Blog January 14, 2019 Think Purple to Strengthen Security Solutions "Major cyber security breaches have become routine as organizations rely increasingly on vulnerable technologies and third-party providers" – Protiviti’s 2018 Security Threat Report Organizations always ask us the same three things: Can we really prevent a breach? Can we detect a breach? Are we currently breached? Staying ahead of each of these three scenarios requires an organization to… Blog January 17, 2019 Managing Bots: IAM Challenges with RPA Like many new technologies, robotic process automation (RPA) is disrupting traditional solutions and introducing different risks related to its use. Bots act differently from other traditional software and services because they leverage the same interfaces as a human user, but they are inherently not human. A bot’s access needs to be managed and there are several factors to consider. Bots bring… Blog February 12, 2019 Comparing the Canadian Guidelines of Meaningful Consent to GDPR The implementation of the European Union’s General Data Protection Regulation (GDPR) in 2018 drove a ripple effect around the world as organizations were forced to take a close look at their processes to protect personal data of their global customers. Of course, obtaining an individual’s consent to use their personal data has always been important, but the GDPR requirements tightened the… Blog February 14, 2019 Resolved: Develop a Proactive Security Strategy for 2019 and Beyond In January each year, many of us (myself included) typically take time to reflect on the year that was, and the things we want to improve upon in the coming 12 months. Like many, I made some 2019 resolutions that will help me in both my personal and professional life. I’ve often wondered, if we can make personal and professional resolutions to improve ourselves, can we also make resolutions to… Blog February 25, 2019 SAP BI Platform Security Best Practices: Access Rights and Custom Access Levels This is the first in a series of blogs about security in the SAP BI Platform. The SAP BI Platform comes with a set of five default access levels: View Schedule View on Demand Full Control (owner) Full Control However, there are many situations where these either give too much access or not enough for a given situation. While it is possible to use an access level to assign security… Blog February 26, 2019 A Client’s Perspective: Getting the Right Organizational Buy-In to Build a Data-Driven Enterprise Developing an organizational culture that recognizes and respects the value of using data to drive business is a concept most clients hope to embrace. Great in theory but in reality, most companies are spread across the success spectrum, with few finding just the right mix of factors enabling them to accomplish amazing things. National Vision, a long-time Protiviti client, is widely recognized… Blog February 28, 2019 Ring, Ring: Protecting Telephone-Based Payment Card Data Integrated Services Digital Networks (ISDN) and Public Switched Telephone Networks (PSTN) are no longer the primary transmission path for basic voice or telephone signaling. In fact, according to statistics within a 2018 report released by the Federal Communication Commission (FCC), the use of Voice over IP (VoIP) solutions has dominated the US market since 2016. Due to this changing technology… Load More