Results for

  • Podcast Transcript
    February 6, 2023
    Quantum computing is built on the ideas of giants. These so-called quantum foundations contain complicated concepts, including entanglement. In fact, the 2022 Nobel Prize in Physics was awarded to three scientists who expanded our understanding of entanglement. How does this key concept work? What are some other fascinating core ideas behind Quantum Information Science? Join host Konstantinos…
  • Client Story
    February 6, 2023
    In many organisations the procurement function is thought of purely as an administrative function and cost center, but addressing opportunities in this area offers a chance to add significant value to the organisation. Investment and focus on the procurement function can enhance business outcomes, improve the bottom line and help manage risk, especially during periods of rising inflation and…
  • Blog
    August 4, 2021
    Step 1: Analyze SAP configuration and processes Protiviti has identified four key steps that organizations can take to improve their overall control environment and receive the benefits mentioned below. Each of these steps will be a focus in this four-part blog series (See Part 2, Part 3 and Part 4). Too many organizations perform their financial and operational processes using inefficient…
  • Podcast
    January 24, 2023
    In this episode, we focus on ESG from a legal perspective. Alyse Mauro Mason, an Associate Director with the Business Performance Improvement solution and ESG practice at Protiviti, interviews Dennis Kerrigan, Executive Vice President and General Counsel for the Hanover Insurance Group, and Rich Cohen, a Managing Director with the Legal Consulting practice at Protiviti. Dennis and Rich join this…
  • Blog
    August 19, 2021
    Step 2: Optimize Internal Control Framework   Protiviti has identified four key steps that organizations can take to improve their overall control environment and receive the benefits mentioned below. Each of these steps will be a focus in this four-part blog series. Step 1 covered analyzing configuration and processes. In this post, we review optimizing the internal…
  • Blog
    October 27, 2022
    A traditional SAP S/4HANA transformation project has many decision points including strategic ones, such as choosing between a system conversion (brownfield), a new implementation (greenfield) or a hybrid approach and whether to move to the cloud or stay on-premise. There are key decisions related to handling custom developments, business process changes and reporting and analytics needs. These…
  • Blog
    November 1, 2022
    Consider this business colleague: She never studied IT but was great at Excel. Then she discovered macros, which piqued her interest to do even more. Now she’s regularly using data visualizations for decision-making. It’s likely that citizen developers are lurking throughout your organization. They are business users who take advantage of available low-code/no-code business application platforms…
  • Blog
    November 8, 2022
    Understanding and mapping the customer journey is the starting point from which to identify the key opportunity moments where access to the right customer data can help anticipate a service need, resolve an issue without asking, or offer a customized product — in other words, make the difference between cultivating a happy, loyal customer or losing one to the competition. The telecommunications…
  • Blog
    November 10, 2022
    Overview (and a disclaimer) This conversation aims to identify opportunities to incorporate security controls into each phase of the DevSecOps methodology throughout the IoT device product development life cycle. Before proceeding, we should note two minor disclaimers: This post is not meant to define in any way how DevSecOps can or should be implemented for software-only applications. There…
  • Blog
    November 14, 2022
    Commercial surveillance is the practice of collecting and analyzing information about people for profit. Over the past months, the U.S. Federal Trade Commission (FTC) has increased its focus on companies’ harmful commercial surveillance programs and on inadequate data security of personal information practices. Companies have been able to operate these programs with limited repercussions. Primary…
Loading...