Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Sort by: Relevance Date Filter Search Sort by RelevanceDate Order AscDesc Blog November 1, 2018 Quantifying Cyber Risk: Takeaways from FAIRCON18 At a time when cyber/information security risk looms large on the minds of directors and executives, quantitative risk assessments are gaining traction as a way to understand and measure that risk. While the need to measure this risk grows, most organizations are still at a low level of maturity regarding the proper use of risk terminology and risk modeling. Getting support and, more importantly… Blog November 6, 2018 Finance Data Priorities: First Get It Right, Then Make It Pretty Baseball great Yogi Berra is fondly remembered for famously miscalculating that, “Baseball is 90 percent mental. The other half is physical.” Unfortunately, making similar miscalculations on data in the business world is neither funny nor fondly remembered – such errors can damage reputations and create conflicts with customers, investors and regulators. As we increase our reliance on data for… Blog November 14, 2018 Why Organizations Should Consider a Cybersecurity Program Office As part of our Cybersecurity Webinar Series for October’s National Cybersecurity Awareness Month, we presented a webinar recently, discussing the value of establishing a program office dedicated to cybersecurity. Cyber crime is now considered one of the top three risks to an enterprise. Many organizations seek to build security by adding tools and processes on top of their established operations… Blog November 16, 2018 Oracle Security in the Cloud As part of our webinar series for October’s National Cybersecurity Awareness Month, we recently offered a webinar on Oracle ERP Cloud, covering implementation and governance of security. Here are some of the key points from our discussion. The benefits of cloud-based applications are many – they are easy to access, requiring only the internet and a browser. Fewer resources are required to… Blog November 21, 2018 Recognizing the People Element in Data Security Implementations Implementing information security technology and creating related policies is relatively easy. Getting the organization to better manage risks through the use of that technology and embrace those policies is quite a bit harder. In a recent survey by ESI ThoughtLab, co-sponsored by Protiviti, untrained staff was seen as the greatest cyber threat by businesses because it can provide a… Blog November 26, 2018 Enhancing Security Strategy for Cloud-Based Technology As part of our Cybersecurity Webinar Series last month, we presented a webinar on enhancing security strategy for cloud-based technology. Here is a summary of the topic discussed. For the full discussion, including questions from the live audience, click on this link to listen to the archived version of the webinar. State of the Industry Digital innovation is a double-edged… Blog November 30, 2018 Securing SAP S/4HANA with GRC 12 and IAG With enterprises focusing on big data, mobility and cloud while managing cybersecurity risks that could exploit internal vulnerabilities that allow access to sensitive data, organizations have been on high alert about how to manage this risk effectively. Protiviti recently held a webinar highlighting new features in SAP’s latest governance module, GRC 12, and Cloud Identity Access… Blog January 14, 2019 Think Purple to Strengthen Security Solutions "Major cyber security breaches have become routine as organizations rely increasingly on vulnerable technologies and third-party providers" – Protiviti’s 2018 Security Threat Report Organizations always ask us the same three things: Can we really prevent a breach? Can we detect a breach? Are we currently breached? Staying ahead of each of these three scenarios requires an organization to… Blog January 17, 2019 Managing Bots: IAM Challenges with RPA Like many new technologies, robotic process automation (RPA) is disrupting traditional solutions and introducing different risks related to its use. Bots act differently from other traditional software and services because they leverage the same interfaces as a human user, but they are inherently not human. A bot’s access needs to be managed and there are several factors to consider. Bots bring… Blog February 12, 2019 Comparing the Canadian Guidelines of Meaningful Consent to GDPR The implementation of the European Union’s General Data Protection Regulation (GDPR) in 2018 drove a ripple effect around the world as organizations were forced to take a close look at their processes to protect personal data of their global customers. Of course, obtaining an individual’s consent to use their personal data has always been important, but the GDPR requirements tightened the… Load More