Insight Search

Sort by:
  • Podcast

    May 18, 2021
    Welcome to our Hong Kong Risk & Compliance podcast where we're catching up with Michael Wassell, head of head of fraud detection for health care in the New York State Attorney General's Office as he discusses transaction monitoring and fraud detection in a post COVID era in both the across industries.
  • Podcast Transcript

    May 18, 2021
    Welcome to our Hong Kong Risk & Compliance podcast where we're catching up with Michael Wassell, head of head of fraud detection for health care in the New York State Attorney General's Office as he discusses transaction monitoring and fraud detection in a post COVID era in both the across industries.
  • Whitepaper

    June 24, 2022
    On April 29, 2022, the PCI Security Standards Council (PCI SSC) released new versions of the PCI DSS Self-Assessment Questionnaires (SAQs) ahead of the anticipated June 2022 release timeline. After the release of the new version of PCI DSS 4.0 a month prior, the new versions of the SAQs have been updated to reflect changes in the standard, as well as to adjust requirements applicable for…
  • Whitepaper

    July 5, 2022
    Review of Microsoft 365 Capabilities for Records Management and the ICA Guidelines and Functional Requirements for Electronic Document and Records Management Systems Leveraging Microsoft 365 and SharePoint Online as an organisation’s primary electronic document and records management system (EDRMS) provides the ability to effectively fulfill compliance and regulatory requirements for information…
  • Podcast

    October 31, 2022
    Supply-chain issues are plaguing the world right now, across all industries, from manufacturing, technology, healthcare, and more. Can quantum computing offer a way to ease the burden and provide real customer advantage? Evidence seems to suggest so. Join host Konstantinos Karagiannis for a chat about this use case, and other innovative ones you may not have heard of, with Alex Khan from ZebraKet…
  • Blogs

    June 19, 2023
    Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed.
  • Blogs

    June 30, 2023
    This blog post was authored by Justin Turner - Director, Security and Privacy on the technology insights blog. Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll…
  • Client Story

    March 13, 2024
    Protiviti leveraged Microsoft Power BI to help this client transform its operational analytics. We built a user interface that generates analytics every 15 minutes and is easy to use with little training required. From staffing and sales targets to customer retention data, managers now have the information they need, at their fingertips, to drive decisions that improve the bottom line.
  • Whitepaper

    April 28, 2022
    Since the beginning of 2020, organisations have been working tirelessly to address the range of complex issues accentuated by the COVID-19 pandemic. While this work continues for many organisations, forward-thinking business leaders are also looking beyond the crisis to operationalise new strategies that will help them build resilient enterprises for many decades to come.Resilience is not about…
  • Whitepaper

    March 24, 2023
    By Carol Beaumier and Bernadine Reese Sharing information and lessons learned has become increasingly critical for the effective management of cybercrime and related financial crime. This need requires financial institutions to rethink how they have historically managed these risks.
Loading...