Insight Search

Sort by:
  • Whitepaper

    June 1, 2022
    A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management program is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based conditional…
  • Client Story

    March 10, 2023
    United Way of Greater Toronto (UWGT), with an overriding mission to eradicate poverty, has successfully mobilised volunteers and financial resources to care for the needy in its communities since 1973. Today it’s the largest non-governmental supporter of social services in the region with a network of 300 agencies that meet urgent human needs and improve social conditions for more than two…
  • Podcast

    April 19, 2023
    Data management is a critical component of an organisation’s reporting and required disclosures, whether they are for regulatory authorities or stakeholders. The needs are no different when it comes to environmental, social and governance (ESG) – an area of growing global importance for organisations worldwide. In this podcast, Protiviti Associate Director Alyse Mauro Mason interviews Protiviti…
  • Podcast Transcript

    June 16, 2023
    Data management is a critical component of an organisation’s reporting and required disclosures, whether they are for regulatory authorities or stakeholders. The needs are no different when it comes to environmental, social and governance (ESG) – an area of growing global importance for organisations worldwide. In this podcast, Protiviti Associate Director Alyse Mauro Mason interviews Protiviti…
  • Client Story

    June 4, 2024
    Protiviti conducted a complete source-to-pay assessment, from spend analysis and contract management to procurement function governance; implemented a spend analytics platform to conduct analysis to create a sourcing wave plan; implemented a category management function and led sourcing events to drive savings.
  • Whitepaper

    October 6, 2021
    Cloud is on the rise in financial services and regulators are taking note. The widespread use of cloud service providers (CSPs) in the financial services industry continues to grow. According to a recent study by the Cloud Security Alliance (CSA), 91% of financial services organisations are actively using cloud services today or plan to employ them within six to nine months. That is double the…
  • Flash Report

    July 20, 2021
    On July 13, 2021, the Federal Reserve Board (FRB), the Office of the Comptroller of the Currency (OCC) and the Federal Deposit Insurance Corporation (FDIC) released a joint request for comment to their Proposed Interagency Guidance on Third-Party Relationships: Risk Management. The agencies have issued this proposed guidance in response to industry feedback requesting alignment among the agencies…
  • Client Story

    May 19, 2023
    A joint team of quantum computing engineers and financial analysts at this industry leader in digital financial services, led by a forward-thinking CIO, knew they wanted to take advantage of quantum computing to solve unique challenges that could not be handled with classical computing alone.   This company sees value in preparing to be “at the ready” when quantum computing machines become more…
  • Podcast

    November 27, 2023
    Kimberly Dickerson, Executive Vice President - Global Head of Operations and Technology at Protiviti, speaks with Star McDade, Senior Vice President, Audit Services - Staff Agencies, Analytics & Insurance (SA&I) at USAA, about confronting stereotypes by demonstrating the positive influence of risk and assurance professionals, overcoming the challenges in the transformation of auditing…
  • Flash Report

    November 16, 2023
    The results from the recent ASIC cyber security survey, ‘REP 776 Spotlight on cyber: Findings and insights from the cyber pulse survey 2023,’ released on 13 November 2023, have once again highlighted the security posture of corporate Australia’s management of cyber security. While there were some encouraging trends in specific security capabilities around identity and access management,…
Loading...