Insight Search

Sort by:
  • Podcast

    February 8, 2023
    Will quantum computers be able to crack RSA this decade? Maybe. But figuring out that exact date is not what you and your organisation should be worried about. A memorandum issued by the White House reveals when the quantum computing apocalypse will begin as far as information security boots on the ground are concerned. Join Host Konstantinos Karagiannis for a deep dive into the NSM-10 memo and…
  • Podcast Transcript

    February 8, 2023
    Will quantum computers be able to crack RSA this decade? Maybe. But figuring out that exact date is not what you and your organisation should be worried about. A memorandum issued by the White House reveals when the quantum computing apocalypse will begin as far as information security boots on the ground are concerned. Join Host Konstantinos Karagiannis for a deep dive into the NSM-10 memo and…
  • Whitepaper

    July 19, 2021
    Customers are major drivers of change in the marketplace. In times of stress, how well companies manage customer experience and expectation can determine whether they succeed. At the height of the COVID-19 pandemic, amid demand spikes and panic buying of household items like groceries and cleaning products, companies that successfully addressed customers’ demands (e.g., restocked alternative…
  • Client Story

    April 22, 2020
    Globalisation and the internet in recent history have generated any number of benefits for corporations, professionals and job seekers by allowing them to seek collaboration and expansion opportunities in new markets. But this virtual free flow of commerce and cooperation can abruptly hit a dead end at the door of regulators with purview over certain countries or jurisdictions, halting businesses…
  • Client Story

    January 2, 2020
    According to the 2018 Census Bureau, 12.8% of the U.S. population has some type of disability. Included in that statistic are those who have impairments that impact accessibility of online websites, applications and documents. These impairments include: Difficulty lifting or grasping, which can impact use of a mouse or keyboard Cognitive, mental or emotional impairment Vision impairment (…
  • Flash Report

    April 28, 2022
    A major cybersecurity event can dissolve millions of dollars in assets and tarnish even the strongest company's reputation. As cybersecurity concerns grow and evolve, companies need to be prepared for the inevitable cyber attacks with strong defenses to identify breaches and minimise damage. But how does leadership know where to invest in cybersecurity? How much is at risk? What should be…
  • Podcast

    October 9, 2023
    The results from this year's Global Technology Audit Risks Survey, conducted by Protiviti and The Institute of Internal Auditors, reveal a complex and multifaceted landscape of technology risks. Cybersecurity is the top priority and by a wide margin. AI is an emerging risk with gaps in organisational preparedness and audit proficiency. The talent gap in IT is a growing concern and data privacy is…
  • Podcast Transcript

    October 9, 2023
    The results from this year's Global Technology Audit Risks Survey, conducted by Protiviti and The Institute of Internal Auditors, reveal a complex and multifaceted landscape of technology risks. Cybersecurity is the top priority and by a wide margin. AI is an emerging risk with gaps in organisational preparedness and audit proficiency. The talent gap in IT is a growing concern and data privacy is…
  • Infographic

    June 3, 2024
    Quantum Dawn VII is the latest iteration of SIFMA's biannual cybersecurity exercise focused on the outage of a critical third-party service provider (CTP). The simulation and concluding survey found many financial institutions are already experienced with the loss of CTPs, with protocols established for managing the outage. With such outages increasingly commonplace and regulators holding firms…
  • Whitepaper

    July 22, 2021
    The future of organisations will be built on the ability to work securely from anywhere, using any device at any time. This was made clear during the COVID-19 pandemic, which forced millions of workers to work from home using company-owned or personal devices. As the velocity and persistence of cybersecurity attacks increase daily and digital transformation continues to be a priority for…
Loading...