Insight Search

Sort by:
  • Whitepaper

    March 21, 2023
    The Financial Action Task Force (FATF) has long warned that criminals leverage virtual assets not only for predicate or money-laundering offenses but also to evade financial sanctions and raise funds to support terrorism. Even so, the number of recent headlines about criminal activity and sanctions evasion in the crypto industry is alarming. Cryptocurrency-based crime hit an all-time high of $20.…
  • Newsletter

    February 12, 2021
    Like any enterprisewide organisational change, implementing an operational resilience programme across an organisation requires a careful and collaborative effort to be successful. Whether implementation has been in the works for several years or is just beginning, turning the resilience programme from concept to reality is hard work. Except for the most dynamic and change-oriented organisations…
  • Whitepaper

    October 22, 2020
    Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt…
  • Whitepaper

    March 22, 2019
    L’interface applicative n’est que la partie émergée de l’iceberg! Comprendre les défaillances des environnements applicatifs et des infrastructures doit être une priorité pour les intervenants opérationnels ainsi que pour le management. Les applications sont des interfaces d’accès et de traitements des données (métiers, personnelles, …) et ne sont que la partie visible d’un Système d’…
  • Whitepaper

    March 22, 2019
    Let’s explore the Iceberg! Understanding gaps in how your applications and infrastructure protect your data is a priority for both Operations and Executives. Application interface is only the tip of the Iceberg Application are interfaces used to access and process data (business or personal) and are only the visible part of a more complex IT landscape.
  • Client Story

    April 9, 2021
    Data privacy has become a strategic priority as companies adapt to comply with rapidly proliferating data privacy laws. Recent years have seen the adoption of the European Union’s General Data Protection Regulation (GDPR), the more recent California Consumer Protection Act (CCPA), and similar regulations. These safeguards require companies to document the types of protected personal data used in…
  • Whitepaper

    August 1, 2022
    The purpose of security analytics in an organisation Security metrics and the analysis of security information can be challenging concepts even for leading organisations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organisation’s security capabilities. If policies are the…
  • Newsletter

    September 29, 2023
    In our latest issue of Private Equity Insights, we offer Protiviti’s latest thinking on ESG issues – specifically, assessing sustainability through an investment and value creation lens. We offer further thoughts on AI (including generative AI) from the board’s and the CFO’s point of view, and we bring the general counsel into the mix through an informative discussion on building legal operations…
  • Flash Report

    December 14, 2020
    On December 13, 2020, the Cybersecurity & Infrastructure Security Agency (CISA) issued an emergency directive detailing required action for federal agencies to mitigate the threat of the recently discovered compromise involving SolarWinds® Orion® Network Management products that are currently being exploited by malicious actors. (Read the SolarWinds Security Advisory here.) Given the nature…
  • Newsletter

    June 21, 2024
    Can financial institutions manage effectively in a world where issues and breaches are known to regulators before the chief compliance officer or anyone else in the organization even learns about them? Are Compliance departments — and the institutions they serve — prepared to keep pace with the regulators’ efforts to develop data-driven insights? Or will they find themselves continually on the…
Loading...