Results for

  • Blog
    January 31, 2022
    In December 2021, in my role as president of the ISSA Delaware Valley Chapter, I had the honor of hosting a panel with five Chief Information Security Officers (CISOs), representing five different industries, each facing unique challenges presented by the global COVID-19 pandemic. The panelists included: Robert Younce - CISO of Mannington Mills, one of the world's leading manufacturers of fine…
  • Blog
    January 10, 2022
    Do your homework. The age-old mandate has newfound relevance for CISOs, given the intense pace of mergers and acquisitions (M&A) and escalating cybersecurity risks. Global business consolidation activity is strong. The number of deals (and the combined value of those transactions) through the first three quarters of 2021 surpassed the number of deals (and the combined value of those…
  • Leadership
    John Harrison leads Protiviti's Enterprise Application Solution practice, specialising in helping companies optimise their investment and performance in business applications.  This includes delivery of implementation best practices, automation, and governance of business applications such as ERP and other cloud solutions. He has been involved in various capacities in many ERP…
  • Leadership
    Based in our Chicago office, Scott is a founding Managing Director and serves as the Global Leader for the Protiviti Software Services segment area within our Technology Consulting service line, which includes the Custom Business Applications, Microsoft Cloud Applications, Salesforce Solutions, Website Design & Solutions, Workflow Automation, and Managed Support Services practice areas.…
  • Blog
    January 26, 2022
    What is Log4Shell? On December 10, 2021, a vulnerability known as Log4Shell (CVE-2021-44228) was disclosed, related to a popular Java logging library (log4j). Log4Shell gained a lot of attention due to how simple it is to exploit, how pervasive Log4j is, and the potential level of access it can provide. Within a few days of being released, many companies discovered vulnerabilities in their…
  • Blog
    January 18, 2022
    Throughout my career as both a CISO and a consultant serving CISOs in companies around the globe, I’ve learned that Chief Information Security Officers, regardless of their current title, reporting structure or how they got to the role, share many things in common; one of which being, they love to talk about their experiences. Recently, we gathered three of the most experienced CISOs I know to…
  • Chris is a Managing Director in New York, leads Protiviti's global Finance Transformation and Transaction Services solutions, oversees Protiviti’s Supply Chain, Operations, People and Change practices, and serves on our global ESG steering committee. He is the firm-wide Managing Director of our Business Performance Improvement solution.He has over thirty-five years of experience serving clients…
  • Blog
    February 16, 2022
    Take a moment to consider your favorite relationship. What makes it special? Most likely, one of the first qualities that comes to mind is that a strong level of trust has been built. Just like in interpersonal relationships, trust is also a critical component for consumers when deciding how and with which businesses they will interact. This is especially prevalent when it comes to their digital…
  • Leadership
    Sameer Ansari is a Managing Director and leader of Protiviti’s Security and Privacy Practice. Sameer brings more than 20 years of experience developing and delivering complex privacy solutions to the Financial Industry, and privacy consulting and implementation experience in the TMT and Consumer Products industries, in many locations throughout the globe. Prior to joining Protiviti, Sameer…
  • Blog
    February 17, 2022
    For years, we've known that Internet of Things (IoT) devices can come under attack as quickly as within five minutes of being connected to the internet. These events predominantly include large-scale scanning techniques to exploit IoT devices that are vulnerable to basic attacks such as default credentials. Historically, hackers have used these attacks to create a network of devices to perform a…
Loading...