Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Sort by: Relevance Date Filter Search Sort by RelevanceDate Order AscDesc Blog October 15, 2020 The Power of Hybrid Analytics As part of a typical business intelligence program, organizations are bound to take advantage of multiple systems. One system may provide exceptional reporting capabilities. Another may provide best-in-class dashboarding. Yet another may provide outstanding predictive abilities. The challenge is understanding where and how to access multiple systems in a business intelligence landscape. This is… Blog October 16, 2020 Podcast: Gone Phishing - Elaborate Scams Are on the Rise. Are You Smart Enough to Recognize Them? During cybersecurity awareness month, we are showcasing several podcasts on security and privacy issues. In this podcast, I share a personal experience with, and an in-depth analysis of, a sophisticated phishing scam. How can companies protect themselves against increasingly elaborate phishing attempts and other malicious actions? Listen to the story here. Blog October 19, 2020 Penetration Testers Tool Kit: A Transition from PowerShell to C# Attackers are continuously evolving their tool sets to keep ahead of defenders. In this blog, we highlight and discuss one major transition occurring in the attack and penetration space: the move from PowerShell to C# as an attack framework. The History PowerShell has been an asset to penetration testers for years. Unrestricted access to… Blog October 20, 2020 As Organizations Transform, the Role of the Project Manager Is Changing Project management as a function is undergoing rapid and profound transformation, and organizations are reconsidering the value project managers (PMs) can bring to their programs and projects. Over the course of a series of blogs, Protiviti will explore the evolution of the project management function from an administrative role to a transformation agent, along with the impacts to organizations… Blog October 21, 2020 Governing SAP Applications with Cloud Identity Access Governance Previously, we wrote about Cloud Identity Access Governance (IAG) based on the latest news coming out of a recent SAPinsider event. In this post, we would like to provide an update on the solution and clarify two editions we think are important to understand. Integrations There has been renewed focus by SAP to continue to innovate and integrate their suite of enterprise applications. Earlier this… Blog October 22, 2020 Upgrading to SAP GRC 12: Down to the Wire We are just weeks away from the SAP GRC application reaching the end of its mainstream maintenance on December 31 of this year (see illustration below). Organizations who are running Access Control, Process Control or Risk Management 10.x should be upgrading to GRC 12 now; otherwise, the consequences for not upgrading could include entering the extended maintenance period or customer-… Blog October 27, 2020 Seven Key Factors to a Successful PMO Transformation Established enterprises and rapidly growing firms continue to adapt to changing business environments driven by competition, acquisitions, emerging technologies and new risks. The same changes that are transforming the project management role and skills, discussed in this previous blog, are also altering the program (or project) management office (PMO). The need for alignment, built-in… Blog October 30, 2020 Flash Report: FBI Warns of Ransomware Assault on the Healthcare and Public Health Sector On October 28, 2020, the Federal Bureau of Investigation (FBI), the Department of Health and Human Services (HHS), and the Cybersecurity and Infrastructure Security Agency (CISA) issued a Joint Cybersecurity Advisory regarding credible information of imminent cyber attacks to infect systems in the Healthcare and Public Health (HPH) sector with Ryuk ransomware. Ransomware campaigns using the… Blog November 4, 2020 Business Continuity Programs: Beware of Complacency Now that many companies have settled into the new normal — with staff working remotely and offices closed completely or operating below capacity due to restrictions from social distancing — the next looming danger is complacency. One of the biggest initial lessons from the COVID-19 pandemic is that businesses cannot afford to let their guard down and must use every opportunity to address any… Blog November 5, 2020 India's Data Protection Bill: What's the Latest? India and other large economies like Japan and the European Union are taking significant steps in enacting comprehensive and progressive privacy laws. Did the General Data Protection Regulation (GDPR) move India’s citizens to demand a right to privacy? Not necessarily. While the GDPR certainly did inspire countries worldwide to rethink data protection, privacy in India… Load More