Results for

  • Blog
    January 30, 2017
    Regulatory compliance is always top of mind in the financial services industry, and all the more so this year, with the sweeping, and sometimes conflicting, changes that many expect on the American political landscape. So it wasn’t surprising that our annual regulatory recap webinar for members of The IIA’s Financial Services Audit Center, conducted at the end of last year, drew a large and…
  • Blog
    February 1, 2017
    The chief cybersecurity engineer for a major industrial process company advocated not long ago that oil and gas companies hire hackers to improve their cybersecurity defenses. At an annual European-Middle East-Africa user group conference in The Hague last October, Eric Knapp urged attendees to drop their negative perceptions and put hackers to work on their teams. Knapp’s advice followed a…
  • Blog
    February 2, 2017
    On January 3, The Massachusetts Office of Consumer Affairs and Business Regulation announced that it will report all data breaches to a publicly accessible state website. Previously, this information could only be obtained with a public record request. The new site includes summary information of the breach and is organized by year. The breached organization's name, the magnitude of the …
  • Blog
    February 2, 2017
    Protiviti and ISACA, a global business technology professional association for IT audit/assurance, governance, risk and information security professionals, have released the results of our joint annual IT Audit Benchmarking Survey. Key takeaways from this year's study include the following: Cybersecurity is viewed as the top technology challenge. There appears to be more executive-level…
  • Blog
    February 8, 2017
    The phrase “innovate or die” has long been a mantra for businesses in the technology, media and communications (TMC) industry. As Satya Nadella wrote to employees on his first day as CEO of Microsoft, “Our industry does not respect tradition — it only respects innovation.” But the results of a recent survey, Executive Perspectives on Top Risks for 2017, from Protiviti and North Carolina State…
  • Blog
    February 13, 2017
    Last month, the National Institute of Standards and Technology (NIST) published a discussion draft of revisions to the NIST Cybersecurity Framework (CSF Version 1.1). The draft, though still subject to change, provides new details on NIST’s recommendations for cyber supply chain risk management (SCRM), clarifies key terms, and introduces cybersecurity measurement metrics. Although this is a…
  • Blog
    February 14, 2017
    For manufacturing and distribution (M&D) companies, which are already well-conditioned to operating in an uncertain global environment, 2017 promises to continue to keep them on their toes. At the very least, it is likely to present a mixed bag of new challenges and opportunities, and executives will need to ensure that their organizations are nimble enough to pivot quickly when faced with…
  • Blog
    February 21, 2017
    Despite recent improvements in the gaming industry’s efforts to combat money laundering, enforcement actions by U.S. and foreign regulators have put casino operators on notice that their anti-money laundering (AML) programs and related internal controls are being subjected to greater scrutiny. Consequences have escalated, and compliance officers face personal liability for AML violations on…
  • Blog
    February 22, 2017
    Money laundering regulations are proving to be as complicated as the shadowy financial transactions they are trying to prevent. A case in point: The Fourth European Union Anti-Money Laundering Directive (4AMLD), approved in 2015 and scheduled to go into effect June 26, 2017, has already been supplanted by 5AMLD — amended text addressing threats that have emerged in the period between the adoption…
  • Blog
    February 23, 2017
    If improving brand protection isn’t a top-line agenda item in the cybersecurity discussions happening at the highest levels in your organization, it needs to be. In today’s era of lightning-quick social media sharing, brand protection has become even more important — and far more challenging — for technology, media and communications (TMC) companies. Two factors play a role: Expanding use of…
Loading...