Cybersecurity Collection Cyber resilience is an organization’s ability to detect, prevent, respond, recover and learn from cybersecurity disruptions. Our cybersecurity collection explores common issues, trends and what organizations must do to prepare proactive and reactive solutions to and keep your assets safe. Flash Report April 11, 2024 The American Privacy Rights Act of 2024: Could this framework become the data privacy panacea? On April 8, 2024, U.S. Representative Cathy McMorris Rodgers (R-WA) and U.S. Senator Maria Cantwell (D-WA) announced the American Privacy Rights Act. This act aims to establish a comprehensive set of rules that govern the usage of citizens' data. The bipartisan draft legislation seeks to create a national standard for data privacy and security, addressing the... Read more Featured Insights BLOG May 17, 2024 Survey Finds Internal Audit Leaders See Urgent Need to Confront Skills Gaps in AI and Cybersecurity In today’s turbulent business landscape, boards of directors and senior leaders are looking to internal audit to be a trusted adviser that can help... INSIGHTS PAPER March 20, 2024 Mastering Data Dilemmas: Navigating Privacy, Localisation and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape... FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... INSIGHTS PAPER January 8, 2024 How data sovereignty and data localisation impact your privacy programs The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad... Button Button BLOG May 17, 2024 Survey Finds Internal Audit Leaders See Urgent Need to Confront Skills Gaps in AI and Cybersecurity In today’s turbulent business landscape, boards of directors and senior leaders are looking to internal audit to be a trusted adviser that can help... INSIGHTS PAPER March 20, 2024 Mastering Data Dilemmas: Navigating Privacy, Localisation and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape... FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... INSIGHTS PAPER January 8, 2024 How data sovereignty and data localisation impact your privacy programs The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad... Managed Security Services BLOG April 5, 2024 New SEC Cybersecurity Disclosure Rules: Key Takeaways From Companies’ Responses While the ink is still drying on many 2023 Form 10-Ks, Protiviti has reviewed a subset of the filings to gauge how firms are responding to the U.S.... BLOG August 23, 2023 How Offloading Vulnerability Management Enhances Security The obstacles cybersecurity organizations face may often seem insurmountable. From dealing with a competitive labor market, to the rapid pace at which... BLOG June 7, 2023 A Guide to Pen Testing and Red Teaming: What to Know Now Penetration testing and red teaming are essential cybersecurity practices that bolster an organization's security posture by uncovering... BLOG March 7, 2023 Common Frameworks for Maturing Security Programs Every cybersecurity organization, through its program maturity journey, grapples with the challenge of choosing and aligning with a security framework... Button Button BLOG April 5, 2024 New SEC Cybersecurity Disclosure Rules: Key Takeaways From Companies’ Responses While the ink is still drying on many 2023 Form 10-Ks, Protiviti has reviewed a subset of the filings to gauge how firms are responding to the U.S.... BLOG August 23, 2023 How Offloading Vulnerability Management Enhances Security The obstacles cybersecurity organizations face may often seem insurmountable. From dealing with a competitive labor market, to the rapid pace at which... BLOG June 7, 2023 A Guide to Pen Testing and Red Teaming: What to Know Now Penetration testing and red teaming are essential cybersecurity practices that bolster an organization's security posture by uncovering... BLOG March 7, 2023 Common Frameworks for Maturing Security Programs Every cybersecurity organization, through its program maturity journey, grapples with the challenge of choosing and aligning with a security framework... Data Protection BLOG May 28, 2024 The Impact of New Evidence Requirements for HITRUST Assessments The HITRUST Alliance Common Security Framework (HITRUST CSF) is a cybersecurity framework that helps organizations manage risk and meet regulatory... BLOG April 30, 2024 Building a Better Mousetrap for Telco Fraud Detection Begins with Data Monetization, Strong Analytics Over the last three years, the telecommunications industry has experienced a significant rise in fraud incidents. In recent months, a major wireless... BLOG April 9, 2024 Securing Large Language Models: Unique Challenges and Rethinking Traditional Security Approaches Large Language Models (LLMs) are computational systems that process and generate text by learning from vast datasets. These advanced models, which can... BLOG March 27, 2024 Protecting Controlled Unclassified Information Across Data Ecosystems Companies that work with the Department of Defense (DoD) know that it is critical to store data properly and are constantly on guard against... Button Button BLOG May 28, 2024 The Impact of New Evidence Requirements for HITRUST Assessments The HITRUST Alliance Common Security Framework (HITRUST CSF) is a cybersecurity framework that helps organizations manage risk and meet regulatory... BLOG April 30, 2024 Building a Better Mousetrap for Telco Fraud Detection Begins with Data Monetization, Strong Analytics Over the last three years, the telecommunications industry has experienced a significant rise in fraud incidents. In recent months, a major wireless... BLOG April 9, 2024 Securing Large Language Models: Unique Challenges and Rethinking Traditional Security Approaches Large Language Models (LLMs) are computational systems that process and generate text by learning from vast datasets. These advanced models, which can... BLOG March 27, 2024 Protecting Controlled Unclassified Information Across Data Ecosystems Companies that work with the Department of Defense (DoD) know that it is critical to store data properly and are constantly on guard against... Security Resilience INFOGRAPHIC June 3, 2024 Infographic | SIFMA’s Quantum Dawn VII Quantum Dawn VII is the latest iteration of SIFMA's biannual cybersecurity exercise focused on the outage of a critical third-party service provider ... WHITEPAPER May 28, 2024 DORA Compliance: Untangling Key Hurdles to Implementation The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final... BLOG January 4, 2024 Building Technology Resilience: Aspects and Actions This is the second in a two- part series exploring the benefits of technology resilience , its aspects and the steps involved to implement a... BLOG December 12, 2023 Why Care about Technology Risks and Building Resilience? This is the first post in a two-part series exploring the benefits of technology resilience. It defines technology resilience and describes its value... Button Button INFOGRAPHIC June 3, 2024 Infographic | SIFMA’s Quantum Dawn VII Quantum Dawn VII is the latest iteration of SIFMA's biannual cybersecurity exercise focused on the outage of a critical third-party service provider ... WHITEPAPER May 28, 2024 DORA Compliance: Untangling Key Hurdles to Implementation The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final... BLOG January 4, 2024 Building Technology Resilience: Aspects and Actions This is the second in a two- part series exploring the benefits of technology resilience , its aspects and the steps involved to implement a... BLOG December 12, 2023 Why Care about Technology Risks and Building Resilience? This is the first post in a two-part series exploring the benefits of technology resilience. It defines technology resilience and describes its value... Security Architecture BLOG February 28, 2024 Strengthening Security Against AI-Powered Attacks Generative AI (GenAI) technologies, such as ChatGPT, have demonstrated substantial advantages across multiple industries, including the field of... BLOG February 7, 2024 IAM in Operational Technology: How and Where to Make it Work By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now... BLOG October 3, 2023 Emerging Trends in IAM Part 4: Going Passwordless with the FIDO Use Case The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their... BLOG May 16, 2023 Cybersecurity Risk Assessments vs. Gap Assessments: Why Both Matter As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s... Button Button BLOG February 28, 2024 Strengthening Security Against AI-Powered Attacks Generative AI (GenAI) technologies, such as ChatGPT, have demonstrated substantial advantages across multiple industries, including the field of... BLOG February 7, 2024 IAM in Operational Technology: How and Where to Make it Work By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now... BLOG October 3, 2023 Emerging Trends in IAM Part 4: Going Passwordless with the FIDO Use Case The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their... BLOG May 16, 2023 Cybersecurity Risk Assessments vs. Gap Assessments: Why Both Matter As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s... Content Collections Technology Industry Collection A curated collection of topics, trends and insights to help technology, media and telecom (TMT) industry organisations face today's challenges and opportunities. For any critical point in a company's growth, explore Protiviti's insights and solutions. Our team will enable your business with a comprehensive approach to… Read More Board and C-Suite Leadership Collection Explore challenges and areas of interest for boards of directors around the world. From environmental, social and governance (ESG) matters to fulfilling the board’s vital risk oversight mandate, this collection provides practical insights and guidance for new and experienced board members alike. Learn More Audit & Risk Management Collection Protiviti leaders and subject-matter experts from around the world provide insights on key issues facing organisations in our dynamic, challenging and competitive global business climate. Our world-class internal audit and risk assessment experience provides a wealth of information and data to help you meet future challenges. Read More