Cybersecurity Collection Cyber resilience is an organization’s ability to detect, prevent, respond, recover and learn from cybersecurity disruptions. Our cybersecurity collection explores common issues, trends and what organizations must do to prepare proactive and reactive solutions to and keep your assets safe. Whitepaper November 26, 2024 Network and information security directive 2 (NIS2) The European Commission has revised the NIS Directive, expanding its scope to include numerous new sectors. This revision aims to enhance cybersecurity across the entire European region by unifying national laws with common minimum requirements. For many companies located within European Union (EU) Member States, as well as non-EU organisations that provide services... Read more Featured Insights INSIGHTS PAPER November 8, 2024 Understanding the Impact of the EU AI Act: A Primer for Financial Institutions Navigate the EU AI Act's impact on finance with our strategic guide to compliance and ethical AI use. BLOG September 17, 2024 Energy and Utility OT and IT Convergence Efforts Bring Opportunity Amid Challenges and Risk Like companies in other industries, energy and utilities (E&U) organizations want to more efficiently leverage data generated in the field by... IN FOCUS August 28, 2024 NIST unveils post-quantum cryptography standards. What does it mean? Earlier this month, the National Institute of Standards and Technology (NIST) approved three post-quantum cryptography (PQC) standards that constitute... BLOG July 9, 2024 The SEC’s Cyber Disclosure Rules: Lessons Learned So Far In Year One What qualifies as a material cybersecurity incident? Can we estimate our potential losses and the effects of business disruption? What were our... Button Button INSIGHTS PAPER November 8, 2024 Understanding the Impact of the EU AI Act: A Primer for Financial Institutions Navigate the EU AI Act's impact on finance with our strategic guide to compliance and ethical AI use. BLOG September 17, 2024 Energy and Utility OT and IT Convergence Efforts Bring Opportunity Amid Challenges and Risk Like companies in other industries, energy and utilities (E&U) organizations want to more efficiently leverage data generated in the field by... IN FOCUS August 28, 2024 NIST unveils post-quantum cryptography standards. What does it mean? Earlier this month, the National Institute of Standards and Technology (NIST) approved three post-quantum cryptography (PQC) standards that constitute... BLOG July 9, 2024 The SEC’s Cyber Disclosure Rules: Lessons Learned So Far In Year One What qualifies as a material cybersecurity incident? Can we estimate our potential losses and the effects of business disruption? What were our... Digital Identity CLIENT STORY April 19, 2024 Rural Lifestyle Retailer Builds Customer Loyalty With Enhanced CIAM Strategy Protiviti partnered with a rural lifestyle retailer client to assess its Customer Identity and Access Management (CIAM) program and architecture. ... FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... BLOG February 7, 2024 IAM in Operational Technology: How and Where to Make it Work By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now... BLOG October 3, 2023 Emerging Trends in IAM Part 4: Going Passwordless with the FIDO Use Case The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their... Button Button CLIENT STORY April 19, 2024 Rural Lifestyle Retailer Builds Customer Loyalty With Enhanced CIAM Strategy Protiviti partnered with a rural lifestyle retailer client to assess its Customer Identity and Access Management (CIAM) program and architecture. ... FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... BLOG February 7, 2024 IAM in Operational Technology: How and Where to Make it Work By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now... BLOG October 3, 2023 Emerging Trends in IAM Part 4: Going Passwordless with the FIDO Use Case The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their... Data Privacy & Protection VISION October 18, 2024 Did China break encryption? Protiviti’s quantum director sets the record straight “Let’s say the claims are true. Let’s pretend it’s not some nation-state psy-op to try and freak out the West of something. Even if the claims are 100... INSIGHTS PAPER October 8, 2024 Best Practices for Building a Sustainable PCI DSS Compliance Program Creating and maintaining a sustainable PCI DSS compliance program is a crucial and complex task for organisations to protect payment card transactions... VISION September 30, 2024 Future of Privacy Forum CEO Jules Polonetsky on “exciting but risky” road ahead “For better or worse, the dam burst and everyone, from the most conservative organization to the wildest startup, is rolling out [AI] stuff that comes... BLOG July 16, 2024 Put Privacy First To Build Trust and Elevate the Customer Experience This blog was originally posted on Forbes.com. Kim Bozzella is a member of the Forbes Technology Council. Here's a problem I often see: Most... Button Button VISION October 18, 2024 Did China break encryption? Protiviti’s quantum director sets the record straight “Let’s say the claims are true. Let’s pretend it’s not some nation-state psy-op to try and freak out the West of something. Even if the claims are 100... INSIGHTS PAPER October 8, 2024 Best Practices for Building a Sustainable PCI DSS Compliance Program Creating and maintaining a sustainable PCI DSS compliance program is a crucial and complex task for organisations to protect payment card transactions... VISION September 30, 2024 Future of Privacy Forum CEO Jules Polonetsky on “exciting but risky” road ahead “For better or worse, the dam burst and everyone, from the most conservative organization to the wildest startup, is rolling out [AI] stuff that comes... BLOG July 16, 2024 Put Privacy First To Build Trust and Elevate the Customer Experience This blog was originally posted on Forbes.com. Kim Bozzella is a member of the Forbes Technology Council. Here's a problem I often see: Most... Security Resilience BLOG October 9, 2024 Digital Twins: Adopting a Data-Centric Approach to Mature Resilience Operational resilience – the ability for firms to prevent, adapt, respond to, recover and learn from operational disruptions – is a common concern for... BLOG September 26, 2024 The Strategic Imperative of Enterprise Resilience In a volatile business environment, the concept of resilience has emerged as a cornerstone of strategic management. More than just a trendy concept,... IN FOCUS July 19, 2024 SEC rebuked in SolarWinds decision. What does it mean? U.S. District Judge Paul Engelmayer has dismissed most of the charges made by the U.S. Securities and Exchange Commission (SEC) against software... WHITEPAPER May 28, 2024 DORA Compliance: Untangling Key Hurdles to Implementation The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final... Button Button BLOG October 9, 2024 Digital Twins: Adopting a Data-Centric Approach to Mature Resilience Operational resilience – the ability for firms to prevent, adapt, respond to, recover and learn from operational disruptions – is a common concern for... BLOG September 26, 2024 The Strategic Imperative of Enterprise Resilience In a volatile business environment, the concept of resilience has emerged as a cornerstone of strategic management. More than just a trendy concept,... IN FOCUS July 19, 2024 SEC rebuked in SolarWinds decision. What does it mean? U.S. District Judge Paul Engelmayer has dismissed most of the charges made by the U.S. Securities and Exchange Commission (SEC) against software... WHITEPAPER May 28, 2024 DORA Compliance: Untangling Key Hurdles to Implementation The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final... Security Strategy & Architecture IN FOCUS October 17, 2024 The DoD unveils the Cybersecurity Maturity Model Certification Program: A primer for defense contractors As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security... BLOG October 7, 2024 Low-Code Applications Yield High Value, Big Change in Less Time The big picture: Deploying enterprise technology systems and tools often is cumbersome and hampered by complex configurations, lengthy implementations... VISION September 24, 2024 Protecting data and minimizing threats with Microsoft’s Sarah Armstrong-Smith “When we're talking about cyber-attacks, data breaches, intellectual property theft, whichever way you want to look at it, ultimately it'll come down... VISION September 10, 2024 CPO or no? Protiviti’s Tom Moore on the evolution of the privacy role and its uncertain future When Google, a company estimated to hold between 10 and 15 exabytes of data — or the storage power of about 30 million PCs — makes a potentially game... Button Button IN FOCUS October 17, 2024 The DoD unveils the Cybersecurity Maturity Model Certification Program: A primer for defense contractors As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security... BLOG October 7, 2024 Low-Code Applications Yield High Value, Big Change in Less Time The big picture: Deploying enterprise technology systems and tools often is cumbersome and hampered by complex configurations, lengthy implementations... VISION September 24, 2024 Protecting data and minimizing threats with Microsoft’s Sarah Armstrong-Smith “When we're talking about cyber-attacks, data breaches, intellectual property theft, whichever way you want to look at it, ultimately it'll come down... VISION September 10, 2024 CPO or no? Protiviti’s Tom Moore on the evolution of the privacy role and its uncertain future When Google, a company estimated to hold between 10 and 15 exabytes of data — or the storage power of about 30 million PCs — makes a potentially game... Content Collections Technology Industry Collection A curated collection of topics, trends and insights to help technology, media and telecom (TMT) industry organisations face today's challenges and opportunities. For any critical point in a company's growth, explore Protiviti's insights and solutions. Our team will enable your business with a comprehensive approach to… Read More Board and C-Suite Leadership Collection Sharing the latest trends, risks, and challenges for board directors and CEOs around the globe. This collection of thought leadership provides practical insights and guidance for new and experienced board members alike on such topics as data/artificial intelligence, technology modernisation, succession planning, disruptive… Learn More Audit & Risk Management Collection Protiviti leaders and subject-matter experts from around the world provide insights on key issues facing organisations in our dynamic, challenging and competitive global business climate. Our world-class internal audit and risk assessment experience provides a wealth of information and data to help you meet future challenges. Read More