Insight Search

Sort by:
  • Podcast Transcript

    November 28, 2023
    We’ve done plenty of episodes where there is a piece of software or cloud platform users can try, usually for the purposes of making coding or algorithmic development easier. Coding naturally seems to be the quickest way to get involved in quantum computing, but we’ve never discussed actually building quantum hardware at home! Find out how to start learning the engineering side of quantum…
  • Whitepaper

    April 21, 2022
    DSS 4.0 addresses rapidly evolving threat environment and provides flexibility for how organisations can achieve compliance On March 31, 2022, the PCI Security Standards Council (PCI SSC) released a new version of the PCI Data Security Standard (DSS). PCI DSS 4.0 is the first revision to the DSS in almost four years. It represents a major update to the standard as the payments industry faces an…
  • Whitepaper

    October 22, 2020
    Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt…
  • Newsletter

    March 14, 2024
    Geopolitical risk seems higher than at any point in recent memory. Managing this risk effectively should be a core competency for all businesses — and the board should lead the way.After decades of globalisation shaping the world order, businesses are now forced to accept a new reality. Geopolitical risk is an ever-growing threat with far-reaching potential consequences. This risk arises from a…
  • Blogs

    June 8, 2022
    IssueJust as companies were starting to believe they had a handle on their internal data management and the governance of structured data, a new technology wave in the form of digitisation is sweeping the globe, rendering carefully crafted frameworks obsolete. This digital wave, fueled by massive quantities of unstructured and uncurated data being generated by social media, mobile devices and the…
  • Whitepaper

    September 19, 2022
    Plan for the Unexpected. Build Resiliency.Instill your organisation with the advantage to endure company disruptions and consistently meet business goals with reduced financial, operational, cybersecurity, and efficiency losses. Assess your areas of risk and develop, enhance, as well as maintain plans to enable resilience, regardless of the circumstance. Flashing back to 2020, the world was in…
  • Whitepaper

    December 2, 2018
    Managing Technical Debt Is the Key to Maintaining Momentum Executive Summary It has been three years since Protiviti published The Road to Renewal: Modernising Aging Core Systems at Financial Institutions. Technology and consumer expectations have both evolved considerably since that time. The cloud has matured and gained acceptance as viable infrastructure; architectures supporting…
  • Flash Report

    April 28, 2022
    Cybersecurity threats are growing exponentially as companies introduce an increasing number of Internet of Things (IoT) devices into operations and collect and store an ever- escalating amount of data. This technology and data sprawl is providing bad actors with more entry points into networks and systems. Too often, organisations have failed to make commensurate investments in data protection,…
  • Newsletter

    April 20, 2020
    Your monthly compliance news roundupOCC Reinforces Third-Party Risk Management ExpectationsRegulatory expectations related to third-party relationships have evolved considerably since 2013, when the Federal Reserve Board and Office of the Comptroller of the Currency (OCC) issued prescriptive guidances SR 13-19 and OCC 2013-29, respectively. To account for this evolution, the OCC published OCC…
  • Flash Report

    March 9, 2023
    The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well as private businesses. The Biden-Harris Administration has been percolating a comprehensive cybersecurity strategy for some time and in early March released the aptly named “National Cybersecurity Strategy.” The 35-page document was created to help…
Loading...