Results for

  • Blog
    April 1, 2020
    Since the California Attorney General (AG) released proposed regulations back in October, and our comprehensive blog in February, keeping up with the California Consumer Privacy Act (CCPA) can be a challenge.  The proposed regulations have changed twice, with the first proposed modifications in February and the second set about a month later on March 11. Even though enforcement will not…
  • Blog
    April 1, 2020
    This two-part blog is one of a series of posts we’ve published to help organizations adjust to the new realities of work under COVID-19-related guidelines. You may also be interested in reading Leading Remote Teams in Times of Uncertainty, Coronavirus Forces a New Approach to Crisis Management, Securing Your Organization’s Assets in Times of Crisis and Working Remotely? Microsoft Teams Can Help…
  • Blog
    April 2, 2020
    Today, we continue this detailed look at what corporate IT security teams should be doing to prevent cyberattacks when a majority of the workforce is temporarily working remotely. Part I posted yesterday. Create Two-Step User Access for Administrators Remote administration on systems is a particular area of concern, as these tasks tend to require privileged accounts. When it comes to these types…
  • Blog
    December 9, 2019
    There are many key steps in completing a successful SAP S/4HANA® journey, including what many call Phase 4: Prepare and Modernize the environment in preparation for the S/4HANA implementation. There are several aspects that need to be considered, including the SAP ECC system or legacy systems, other third-party applications, governance processes and the various strategies to be put in place to…
  • Blog
    December 10, 2019
    Any SAP S/4HANA program that doesn’t prioritize security, controls and compliance into the overall design is never going to yield the return the investment deserves. In today’s digital age, it’s simply not enough to effectively implement enterprise applications to support business operations. Companies are also expected to address cybersecurity, application security, financial and data privacy…
  • Blog
    December 11, 2019
    No, we’re not talking about politics or the dance that’s been done at every wedding reception in the last decade. In a traditional software development model, requirements are kept on the left side of the plan while delivery into production and operations are on the right. Shift Left security is simply building security into an organization’s DevOps process or designing security controls earlier…
  • Blog
    December 17, 2019
    The concept of achieving effective data-driven risk management may sound intimidating, but ultimately, it’s about organizations trying to make well-informed business decisions using their available data and subject matter expertise. Unfortunately, many of the ways that organizations measure and execute against risk fail to quantify and frame the risk challenges in a way that decision makers can…
  • Blog
    January 7, 2020
    The following is excerpted from a Protiviti Flash Report issued on January 7, 2020 and is also posted on The Protiviti View. On January 4, 2020, the Department of Homeland Security (DHS) issued a National Terrorism Advisory System (NTAS) bulletin describing current developments and general trends regarding the terrorist threat posed by nation-state cyber warfare programs. According to…
  • Blog
    November 20, 2019
    There is one certainty about the 2018 California Consumer Privacy Act of 2018 (CCPA): Today’s CCPA is not going to be next year’s CCPA. The volume and velocity of changes to the CCPA and the lack of substantial guidance regarding it promise to make for an interesting 2020 as companies begin their implementation of privacy compliance for this new regulation. First, introduced recently into the…
  • Blog
    November 21, 2019
    The California Consumer Privacy Act (CCPA) goes into effect on January 1, 2020. That’s just 40 days from the date we published this blog. Yet we continue to see a considerable number of organizations that are likely to be impacted by this new legislation failing to put together personal data privacy protection programs. That could be a costly mistake. In a recent webinar we held on this topic, a…
Loading...