Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Client Story January 10, 2024 Achieving New Heights with Transformative Inventory Management Solutions The client wanted to improve inventory management practices at a facility in its commercial HVAC division, which was seeing significant production disruptions and inventory losses. Inventory was handled by several third-party logistics companies, leading to missing material and inventory inaccuracies. Client Story March 6, 2024 Global Payments Leader Improves Contract Lifecycle Management Processes Protiviti helped our client select and implement a lifecycle management system including PMO activities, process design contract and business requirements documentation, legacy contract data extraction, super user training and UAT. Whitepaper April 18, 2022 Data Analytics Drive Real-Time Capital Project Management Collaborating with internal audit to minimize cost overruns and maximize valueIntroductionData analytics has proven to create significant benefits across most industries and organizational functions, including internal audit. In fact, nearly two-thirds of internal audit functions now use data analytics as part of the audit process, according to Protiviti’s 2017 Internal Audit Capabilities and… Whitepaper July 13, 2021 How to implement an effective identity management strategy Identity management doesn’t happen overnight; there’s no “Easy” button to press, or magic snap-of-the-fingers instant fix. In fact, identity management has transformed into something far more complex than password authentication and simple security measures. It’s important to understand that jumping into a new technology instantaneously isn’t necessarily the right first step to ensuring a… Podcast April 18, 2022 Podcast | The Promise of Blockchain in Supply Chain Management In this 14-minute podcast, Protiviti Managing Directors Bernie Donachie and Ed Page discuss the applications and promise of blockchain in managing supply chains. Whitepaper August 3, 2022 Prospering in the New World of Supply Chain Risk Management Introduction Corporate boards and executive leaders are waking up to a new world with the disconcerting realisation that they don’t know what they don’t know about their supply chains. This lack of transparency marks a pivotal and pervasive challenge to the board’s strategic oversight and governance of supply chain risks, and it comes with a heavy price tag. A slew of major supply chain… Client Story September 26, 2022 U.S. energy leader undertakes a successful divestiture through a strong program management office A leading Fortune 500 energy company with nine million utility customers sought to divest a long-held subsidiary to another leading energy provider. Solving the complex transition of technology, data and customer service from one provider to another required a comprehensive understanding of both the security environment and the timing of regulatory approvals. Utilising a team of experienced… Podcast December 20, 2023 Commentary by Robert Giacobbe | 2024 Top Risks Survey — Supply Chain Management Managing Director Robert Giacobbe provides commentary on current and emerging trends in supply chain management.Read 2024 Top Risks Manufacturing and Distribution Results Flash Report June 8, 2023 U.S. Banking Regulators Finalise (Finally) Revised Third-Party Risk Management Guidance On Tuesday, June 6, 2023, the Office of the Comptroller of the Currency (OCC), the Board of Governors of the Federal Reserve System, and the Federal Deposit Insurance Corporation (collectively, the agencies) issued the “Interagency Guidance on Third-Party Relationships: Risk Management.”[1] This marks the long-awaited finalisation of the proposed guidance that was initially issued on July 19,… Whitepaper June 1, 2022 How can an enterprise use access management to establish a Zero Trust environment? A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management program is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based… Load More