Results for Search Submit Filter by: Advanced Filter All results Solutions Industry People Client Story Insights/Blogs Filter Blog October 31, 2016 Is your refrigerator running? Yes it is, and it’s flooding the Internet! The distributed denial of service (DDOS) attack on October 21 offered a new twist on an old trick that should cause us to pause and pay attention. DDOS attacks are nothing new. They became popular in the late 90s, when all of us security experts were busy trying to figure out how to combat them. At the time, the attackers were taking advantage of outdated and unpatched operating systems of home… Blog November 1, 2016 PCI DSS 3.2 Kicks In Today: Do You Know What the Changes Are? Version 3.2 of the Payment Card Industry Data Security Standard (PCI DSS 3.2), the information security standard that guides how entities process, hold and transmit cardholder data, comes into effect today, Nov. 1, 2016. In a post last month we discussed the details and implications of the new standard. Here, we want to point out one change of the new standard that has gone largely… Blog February 11, 2016 FAST Act Paves the Road for Streamlining IPOs Good news for small companies considering an IPO. On December 4, 2015, President Obama signed the Fixing America's Surface Transportation Act (the FAST Act). Aside from directing transportation spending, this act includes provisions relevant to startup companies and companies seeking to pursue the IPO path. Below, I’ve outlined the major ways in which this act affects so-called “emerging growth… Blog February 22, 2016 2016 Audit Committee Agenda Webinar Q & A (Part 1) Our January 7 webinar, The 2016 Audit Committee Agenda, based on our latest issue of The Bulletin, drew more than 1,500 participants. The audience was diverse and included a large number of directors and executives, so it’s not surprising that a lot of interesting and relevant questions were asked. We promised we would get to as many questions as we could but, due to our time constraints, we… Blog February 24, 2016 2016 Audit Committee Agenda Webinar Q & A (Part 2) We are continuing our Q&A series stemming from our January 7 webinar on the 2016 Audit Committee Agenda. We’ve been exploring audit committee priorities for 2016, based on the findings published in the latest issue of The Bulletin. This four-part Q&A blog series provides our responses to some of the many interesting questions from our 1,500 webinar participants that we were unable to… Blog February 26, 2016 2016 Audit Committee Agenda Webinar Q & A (Part 3) We are picking up our previous discussion of audit committee priorities as we continue to answer your questions from our popular January 7 webinar, The 2016 Audit Committee Agenda. This blog series answers questions we were unable to address during the webinar. In our first installment, we addressed questions regarding the relationship between the audit committee and independent auditors, new… Blog February 29, 2016 2016 Audit Committee Agenda Webinar Q & A (Part 4) We are wrapping up our series of blog posts based on our popular January 7 webinar on the 2016 Audit Committee Agenda. This series answers some of the questions we were unable to address during the webinar. In our first installment, we touched on the relationship between the audit committee and independent auditors, new rules on lease accounting and board-level engagement with cybersecurity… Blog March 2, 2016 Arriving at Internal Audit's Tipping Point Amid Business Transformation Protiviti just released its 2016 Internal Audit Capabilities and Needs Survey, the 10th year we have conducted this insightful study on internal audit priorities and trends. We'll cover many aspects of this study and the results in future blog posts. For now, I invite you to view our video and infographic, and visit our website to learn more and read our report. [wpvideo… Blog March 8, 2016 Procurement Power-up: Building an Internal “Brand” Procurement functions proclaim their value in “millions of dollars saved,” but it’s no secret that such savings are often questioned by internal critics who counter that actual savings were less than advertised, or came at the expense of quality. There’s no doubt that a good procurement team can generate genuine savings throughout the enterprise without sacrificing quality. The self-evident… Blog March 21, 2016 Devices Are Mobile, Is Your Security Policy on Board? With 3.4 billion smartphones worldwide as of 2015 (and 78 percent of U.S. college grads owning smartphones), chances are your employees not only own one, but they’re also bringing them to work and using them to do work when not at their desks. It’s the BYOD – Bring Your Own Device – movement. And while many employees may find this trend convenient – and the applications and cloud services that… Load More