Results for

Sort by:
  • Blog
    June 6, 2019
    The California Consumer Privacy Act (CCPA) continues to be a work in progress. For bills to advance, they must go through the full Assembly, the California Senate and the California governor to be enacted as law. As the CCPA works its way through the legislative process, lawmakers in California continue to mull over the proposed amendments to clarify the legislation, limit its scope and…
  • Blog
    June 14, 2019
    More and more financial services firms are saying they are cloud first, but they are really cloud averse and it’s understandable. When we ask firms how they are embracing “digital transformation,” and the impact associated with fundamental digital change, most business owners proclaim they are transforming or evolving into digital. However, there is a disconnect between the business and support…
  • Blog
    July 1, 2019
    The California Consumer Privacy Act (CCPA), as written, allows consumers to have a private right of action when their non-encrypted and nonredacted information is stolen (see Section 1798.150). What is one of the best ways to avoid litigation? Readiness. According to a recent survey from the Carlton Fields Class Action Survey of corporate general counsel and senior legal officers, the next wave…
  • Blog
    August 2, 2022
    Senior executives who oversee IT and technology are facing a conundrum. Resources, already in short supply, are being spent on day-to-day business operations, preventing organizations from making headway on big-picture innovations and long-term projects. How can organizations “think big” while ensuring everything at the top of their agenda gets taken care of? The past two years of economic,…
  • Blog
    August 3, 2022
    Gain an early advantage over competitors by turbocharging the sales cycle! The origination of many sales cycles is the CPQ process – or configure, price, quote. When optimized processes are supported by the right technology, sales teams can provide better customer service and focus on value-added work that leads to more revenue. CPQ systems can improve efficiencies and reduce risk through…
  • Blog
    August 4, 2022
    With organizations transitioning to unlock the full potential of S/4HANA and SAP cloud solutions, GRC functionalities and operations also need to be updated. For example, updating the Segregation of Duties (SoD) ruleset to support S/4HANA transactions including Fiori apps, or to run risk analysis on HANA database users. While an implementation or upgrade project would typically include the…
  • Blog
    August 8, 2022
    Our popular Post-Quantum World podcast series continues to explore the latest in quantum computing trends. Hosted by Konstantinos Karagiannis, Director – Quantum Computing Services, the podcast features conversations with guest quantum experts and business leaders, as they discuss and share insights and actions all organizations should be considering today to prepare for mass adoption of quantum…
  • Blog
    October 24, 2018
    As companies around the world adapt to comply with the EU’s General Data Protection Regulation (GDPR), legislators in the United States are under pressure from constituents to pass even more consumer privacy protection. That pressure increases with every major data privacy breach and has reached a point where the heads of major social media organizations were recently called to testify before the…
  • Blog
    August 9, 2022
    Did you know that, while it takes organizations an average of 287 days to detect and 50 days to contain a breach, it takes just one hour and 42 minutes from the time an end-user clicks on a phishing email for an attacker to breach an environment? Increased spending doesn’t translate into a stronger, more resilient cybersecurity posture. Spend four minutes with Protiviti’s Natalie Fedyuk,…
  • Blog
    August 16, 2022
    Amazon Web Services (AWS) provides several ways for organizations to securely adopt, develop and manage their AWS environments, including the security perspective of the AWS Cloud Adoption Framework (AWS CAF), the security pillar of the AWS Well-Architected Framework and numerous security services provided by AWS. These tools provide many options to implement a secured foundation in their AWS…
Loading...