Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs April 26, 2024 Embrace DEI intersectionality for effective cybersecurity The role of a cyber incident responder is more critical than ever as these professionals are tasked with protecting organisations from cyber threats, mitigating risks and minimising the impact of security incidents. As cyber threats continue to proliferate, targeting organisations of all sizes and sectors, it is imperative for cyber incident response (CIR) teams to be well prepared at mitigating… Blogs May 5, 2023 Creating a resilient cybersecurity strategy: The governance lifecycle approach Cybersecurity governance should do more than manage cyber risk. Good cybersecurity governance creates efficiencies by clarifying the outcomes expected from its processes and establishing boundaries of responsibility among cybersecurity practitioners, frontline operational areas, senior leaders and board members. Recently, numerous crises have drawn senior leaders and board members down… Blogs July 14, 2023 Cybersecurity risk assessments vs. gap assessments: Why both matter This blog post was authored by Rob Woltering - Associate Director, Security and Privacy on the technology insights blog. As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s operations, cybersecurity risks remain top of mind for many organisations. To this end, organisations are continuously… Whitepaper February 22, 2021 Four Ways Finance Leaders Strengthen Cybersecurity As CEOs and boards become more informed about the extreme threats that cybersecurity lapses pose, their expectations are growing. CFOs’ expanding contributions to fortifying organisational data security, the highest priority identified in Protiviti’s latest Global Finance Trends Survey, play a pivotal role in satisfying those high expectations. Board members demand coherent, relevant and… Podcast Transcript August 26, 2021 TRANSCRIPT | PRIVACY & CONSENT WITH KATIE STEVENS Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With a combined 30+ years of IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Whitepaper August 26, 2020 Interpretations of the Updates to China’s Cybersecurity Law All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017. Podcast October 8, 2020 Podcast: Cybersecurity Hits Close to Home Welcome you to a new edition of Powerful Insights and our continuing series on cybersecurity awareness. This series is intended to highlight ways organisations can be proactive in addressing these critical security challenges. We explore how leaders can dynamically build cyber resilience while maximising value. In this series, we will be talking to our cybersecurity leaders who are in… Flash Report July 31, 2023 SEC Cybersecurity Disclosure Enhancements: Efforts to Boost Investor Confidence On 26 July 2023, the U.S. Securities and Exchange Commission (SEC) adopted amendments1 to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing risk to public companies, investors and market… Whitepaper May 20, 2021 New Executive Order Aims to Shore Up U.S. Cybersecurity Defenses A Primer for Federal Government Contractors On May 12, 2021, President Joe Biden signed an Executive Order (EO) to improve the United States’ cybersecurity and protect federal networks. Following the SolarWinds breach and, most recently, the Colonial Pipeline ransomware attack, the EO is the most recent action in the Biden administration’s plan to overhaul U.S. cybersecurity… Blogs September 8, 2021 Effective Cybersecurity is Essential as Cyber Threats Expected to Continue Over Next Decade In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s… Load More