Results for

  • Blog
    January 10, 2022
    Do your homework. The age-old mandate has newfound relevance for CISOs, given the intense pace of mergers and acquisitions (M&A) and escalating cybersecurity risks. Global business consolidation activity is strong. The number of deals (and the combined value of those transactions) through the first three quarters of 2021 surpassed the number of deals (and the combined value of those…
  • Blog
    January 26, 2022
    What is Log4Shell? On December 10, 2021, a vulnerability known as Log4Shell (CVE-2021-44228) was disclosed, related to a popular Java logging library (log4j). Log4Shell gained a lot of attention due to how simple it is to exploit, how pervasive Log4j is, and the potential level of access it can provide. Within a few days of being released, many companies discovered vulnerabilities in their…
  • Blog
    January 18, 2022
    Throughout my career as both a CISO and a consultant serving CISOs in companies around the globe, I’ve learned that Chief Information Security Officers, regardless of their current title, reporting structure or how they got to the role, share many things in common; one of which being, they love to talk about their experiences. Recently, we gathered three of the most experienced CISOs I know to…
  • Chris is a Managing Director in New York, leads Protiviti's global Finance Transformation and Transaction Services solutions and serves on our global ESG steering committee.  These practices guide clients through complex reporting, transaction and transformation events. His work in Finance Remediation & Reporting Compliance has also involved a significant commitment to public speaking…
  • Blog
    February 16, 2022
    Take a moment to consider your favorite relationship. What makes it special? Most likely, one of the first qualities that comes to mind is that a strong level of trust has been built. Just like in interpersonal relationships, trust is also a critical component for consumers when deciding how and with which businesses they will interact. This is especially prevalent when it comes to their digital…
  • Blog
    February 17, 2022
    For years, we've known that Internet of Things (IoT) devices can come under attack as quickly as within five minutes of being connected to the internet. These events predominantly include large-scale scanning techniques to exploit IoT devices that are vulnerable to basic attacks such as default credentials. Historically, hackers have used these attacks to create a network of devices to perform a…
  • Blog
    December 14, 2021
    As the number of ransomware attacks rise, the failure of businesses to properly invest in cybersecurity tools, technologies and trained resources continues to become more prevalent. Not only do the ransom demands continue to increase but the average cost of ransomware recovery continues to skyrocket. Sophos research revealed that the average ransomware recovery costs are $1.85 million compared to…
  • Blog
    December 13, 2021
    Every day, clients come to us with questions about ransomware and how to best prepare their organizations against potential attacks. This is perhaps one of the most vexing challenges in cybersecurity as ransomware attack methods, motivation and barriers to entry are constantly evolving. We’ve collated three key questions that concisely explain ransomware: How do these attackers target my…
  • Leadership
    Mark Highton serves as Protiviti’s global Financial Crime Compliance leader with 20 years of industry experience and 10 years of consulting experience. Mark is responsible for the development of innovative solutions, pursuit and delivery of large-scale engagements, and optimisation of Financial Crime Compliance operating and delivery capabilities. Mark has successfully led many complex, global…
  • Blog
    December 1, 2021
    The COVID-19 pandemic has forced most organizations to revisit their digital transformation roadmaps to continue to both grow market share and provide exceptional customer service. Companies had to rethink their digital transformation objectives as most customers have changed their levels of engagement with products and services. Today’s consumers are looking for agility, flexibility and…
Loading...