Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Survey October 1, 2024 CFOs Address a Data Security and Privacy Triple Threat CFOs prioritise addressing the trifecta of data security and privacy threats due to rising cyber warfare, extortion risks, and stringent regulatory requirements. Client Story February 23, 2022 A strategic co-sourcing partnership: Healthcare system chooses Protiviti as its trusted adviser in internal audit and compliance Healthcare organisations are under growing pressure to meet compliance obligations, maintain profit margins, optimise the revenue cycle functions and reduce risk. Most risks in the healthcare industry are exacerbated by provider organisations performing a variety of services and having decentralised operations across multiple states — risks audit and compliance functions must address. Some… Podcast Transcript June 30, 2021 Transcript | Shortcuts to Coding Quantum with Amazon Braket and QCI Qatalyst Quantum computing is easy to access thanks to services like Amazon Braket. But how long does it take to apply one of these systems to a real-world use case? Sometimes months. Amazon partner Quantum Computing, Inc. (QCI) has launched Qatalyst API to shorten development time on some types of quantum coding … to under a week! Listen in to hear how Amazon is preparing for the future of high-… Podcast June 30, 2021 Podcast | Shortcuts to Coding Quantum with Amazon Braket and QCI Qatalyst Quantum computing is easy to access thanks to services like Amazon Braket. But how long does it take to apply one of these systems to a real-world use case? Sometimes months. Amazon partner Quantum Computing, Inc. (QCI) has launched Qatalyst API to shorten development time on some types of quantum coding … to under a week! Listen in to hear how Amazon is preparing for the future of high-… Video June 14, 2022 Video | Finding Equilibrium in an Era of Heightened Regulation According to S&P, the combined current stock market value ($9.3 trillion) of the five tech titans (Apple, Microsoft, Google, Amazon, and Facebook) is more than the value of the next 27 most valuable U.S. companies put together. With growth accelerated by the COVID-19 pandemic and the demand for digital services comes greater power and increased concerns. How do tech companies strike the… Podcast Transcript May 5, 2023 Transcript | A New Quantum Software Development Kit — With Anne Matsuura of Intel Intel is preparing to build its first quantum dot processor. But you don’t have to wait to try your hand at writing code for it. Thanks to the Intel Quantum SDK, you can access the support system and software stack for this future chip via simulators today. Prepare to run algorithms on a bleeding-edge platform in this episode of The Post-Quantum World. I’m your host, Konstantinos Karagiannis. I… Whitepaper June 8, 2020 Gaining Shelter From the Storm – A Technology Labor Model Tailor-Made to Manage Crises This article addresses both the challenges CIOs and technology leaders experienced during the COVID-19 pandemic and how companies and their technology functions responded to it. We learned that the organisations and their stakeholders most likely to shape their narratives in a positive direction were those who understood and leveraged the benefits of the new technology labor model that supports a… Client Story April 28, 2022 Software firm's focus on accessibility improves user experience for all Web application accessibility is critical to the ongoing success of any digital application. In fact, the Americans with Disabilities Act (ADA) includes digital assets in its definition of “public places of accommodation” that should adhere to accessibility standards. Jamf, a global software company based in Minneapolis, Minn., produces applications to manage Apple devices and services and has a… In Focus October 17, 2024 The DoD unveils the Cybersecurity Maturity Model Certification Program: A primer for defense contractors As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security of its national defense supply chain: The Cybersecurity Maturity Model Certification (CMMC) Program. The new rule, published Oct. 15, marks a significant step towards enhancing cybersecurity across the Defense Industrial Base (DIB). Podcast February 11, 2022 Podcast | Understanding the ESG ratings, rankings and metrics landscape Welcome to the inaugural edition of Protiviti’s Board Perspectives podcast series, in which we delve into numerous challenges and areas of interest for boards of directors. In this episode, our focus is on environmental, social and governance (ESG) – specifically, how organisations are judged! One of the most challenging aspects of ESG for board members is understanding what’s become a… Load More