Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog April 29, 2021 Upgrading to GRC 12? Time’s Up! On December 31, as the world was saying goodbye (or in many cases, good riddance!) to 2020, SAP Governance, Risk and Compliance (GRC) 10 users were saying a different goodbye as well. When the clock struck midnight, SAP officially ended mainstream support of the GRC 10 application. Any organization that is still running… Partner Multiverse Computing Multiverse Computing provides software for companies from the financial industry wanting to gain an edge with quantum computing. Their expertise includes portfolio optimisation problems, risk analysis, and market simulation. Multiverse Computing applies cutting-edge quantum computing methods to provide customised software for companies to derive value from the quantum-computing revolution.… Partner NICE Actimize NICE Actimize is the largest and broadest provider of financial crime, risk, and compliance solutions for regional and global financial institutions, as well as government regulators. Consistently ranked as number one in the space, NICE Actimize experts apply innovative technology to protect institutions and safeguard consumer and investor assets by identifying financial crime, preventing fraud,… Infographic February 28, 2023 Infographic | Consumer Products and Retail Executive Perspectives on Top Risks 2023 Across many retail and consumer goods categories, companies are contending with talent shortages that have increased labor costs, product availability challenges, difficulty sustaining customer loyalty and retention, and pressure to implement sustainability practices. According to results from the latest Protiviti-NC State global top risk survey, these are among the key issues being discussed in… Blog March 26, 2018 What’s Ahead in Vendor Assessments? Rapidly changing information security threats and regulatory requirements continue to put pressure on vendor risk management programs and capabilities for all organizations globally. We anticipate that the number and comprehensiveness of vendor assessments required of, and conducted by, organizations will continue to substantially increase in 2018 and into 2019 before the requests begin to… Blog April 4, 2018 With GDPR Deadline Looming, the First Step Is Discovery With the new EU General Data Protection Regulation (GDPR) scheduled to take effect on May 25, 2018, organizations with EU employees or customers need to be able to demonstrate compliance. GDPR expands the scope of previous EU regulations to include any data processor or data controller that collects, stores, or processes the personal data of EU residents. It mandates data portability,… Blog October 20, 2022 Six Elements to Strengthen Sustainability Environmental, social and governance issues are wide in their scope and important to address. So, how should firms begin to tackle them? Sustainability is one of the biggest challenges of our time, and one of the greatest opportunities. Solving the world’s environmental and social challenges will take collective action on a scale never seen before; but working towards solutions could lead to a… Blog October 26, 2022 Sustainable Operations: How Facilities Managers Can Achieve ESG Goals Part 1: Energy This blog post is Part 1 of a 3-part series focusing on energy, water and waste optimization in commercial facility management and industrial operations. Subscribe to The Protiviti View to follow the series. With growing interest from stakeholders and regulators, it’s becoming increasingly important for organizations to get their environmental, social and governance (ESG)… Blog October 25, 2022 Automate AWS Digitial Identity and Access Management Review Often, there exists the need to perform one-time and regular reviews of Identity and Access Management (IAM) health to answer some of the basic, yet critical questions security professionals care about: Who is entitled to perform what actions against what resources? Are there orphan identities? Am I granting service access to identities that do not utilize them? Last accessed feature and… Landing Page Consulting reshaped for a transforming world Load More