Results for

Sort by:
  • Blog
    November 1, 2022
    Consider this business colleague: She never studied IT but was great at Excel. Then she discovered macros, which piqued her interest to do even more. Now she’s regularly using data visualizations for decision-making. It’s likely that citizen developers are lurking throughout your organization. They are business users who take advantage of available low-code/no-code business application platforms…
  • Blog
    November 8, 2022
    Understanding and mapping the customer journey is the starting point from which to identify the key opportunity moments where access to the right customer data can help anticipate a service need, resolve an issue without asking, or offer a customized product — in other words, make the difference between cultivating a happy, loyal customer or losing one to the competition. The telecommunications…
  • Blog
    November 10, 2022
    Overview (and a disclaimer) This conversation aims to identify opportunities to incorporate security controls into each phase of the DevSecOps methodology throughout the IoT device product development life cycle. Before proceeding, we should note two minor disclaimers: This post is not meant to define in any way how DevSecOps can or should be implemented for software-only applications. There…
  • Blog
    November 14, 2022
    Commercial surveillance is the practice of collecting and analyzing information about people for profit. Over the past months, the U.S. Federal Trade Commission (FTC) has increased its focus on companies’ harmful commercial surveillance programs and on inadequate data security of personal information practices. Companies have been able to operate these programs with limited repercussions. Primary…
  • Blog
    November 15, 2022
    Protiviti was very pleased to announce its exclusive partnership with Microsoft as the launch of the new Microsoft Supply Chain Platform was unveiled. As a platform that integrates the value chain beyond an enterprise’s four walls, the Microsoft Supply Chain Platform enables collaborations with upstream and downstream partners to deliver transparency and orchestrate the movement of goods to…
  • Blog
    November 16, 2022
    Organizations are continuously working to improve their internal controls environments, increase efficiencies and reduce the cost of compliance activities. Internal controls, compliance and audit professionals are also looking to align organizations’ processes to important risk and industry trends. The Public Company Accounting Oversight Board (PCAOB) releases auditing standards that establish…
  • Blog
    November 28, 2022
    Business leaders have realized that, in today’s world, with factors such as rapid advancements in technology, increasing social media presence, an ever-changing customer desire for product flexibility and eager adoption among Generation Z, technology is a key enabler in driving innovation and efficiency. Technology investments have demonstrated and continue to provide tangible and measurable…
  • Blog
    December 5, 2022
    As more organizations begin to adopt cyber risk quantification (CRQ) techniques to complement their existing risk management functions, renewed attention is being brought to how organizations can invest in CRQ in the most cost-effective ways. The Factor Analysis of Information Risk (FAIR) methodology remains the most widely accepted industry standard for CRQ and organizations continue to seek out…
  • Blog
    September 9, 2021
    Protiviti has identified four key steps that organizations can take to improve their overall control environment and receive the benefits mentioned below. Each of these steps will be a focus in this four-part blog series. In Part 1 and Part 2, we covered Step 1: Analyze SAP configuration and processes and Step 2: Optimize internal control framework. In this post, we will be…
  • Blog
    December 6, 2022
    On October 18, 2022, the Transportation Security Administration (TSA) announced new cybersecurity regulations required for passenger and freight railroad carriers that carry sensitive materials. The Security Directives were announced with the goal to enhance cybersecurity resilience across the railroad industry. Which rail companies are impacted? The Security Directives apply to all United States…
Loading...