Insight Search

Sort by:
  • Flash Report

    December 13, 2023
    On December 8th, after two and a half years of negotiation, the Council of the EU and the EU Parliament finally reached a provisional agreement on the EU AI Act, which was first proposed by the European Commission in 2021. The agreement creates legislation that introduces harmonised rules and definitions for those using AI systems and putting those systems into service and bans certain types of…
  • Blogs

    May 17, 2024
    An SAP S/4HANA transformation project has many risks that need to be managed and often, it is difficult for the project team operating day to day on detailed tasks to “see the forest for the trees.” The PMO has intimate knowledge of the key processes and risks associated with the project and, as such, is in an ideal position to develop mitigation strategies in collaboration with the system…
  • Blogs

    July 31, 2023
    For security teams looking to implement and design smart contracts, there are many intricacies and nuances that can be overwhelming. Using established standards for the secure development of smart contracts/decentralised applications (dApps) is instrumental to effectively launch smart contracts. In an earlier blog, I introduced the basics of smart contracts; today, I’m diving into existing…
  • Client Story

    April 18, 2024
    This company is a leader in the supply of after-sale services to the world’s engine and compressor markets and is trusted by nuclear power plants, the U.S. military and both public and private electricity generators around the globe. With the EPA’s recently announced Good Neighbor Plan in mind, the client needed a quick, reliable air pollution reduction strategy. However, the company had to sift…
  • Flash Report

    June 3, 2022
    Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and…
  • Blogs

    May 17, 2024
    Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in responses. Over the past several years, more and more potential customers are seeking cybersecurity partners whose values in the areas of diversity, equity and inclusion (DEI) correspond with their own. Sometimes, enterprises will…
  • Whitepaper

    May 10, 2024
    Any predictions made before 2020 about the future of work have changed with COVID-19, inflation and social movements of the past two years. The workforce of 2030 looks very different than once expected. Prior to 2020, the U.S. labor force included five generations working side by side for the first time in history. Attracting, engaging and retaining a multigenerational workforce was a top…
  • Blogs

    February 23, 2024
    In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of the most challenging and often overlooked threats is the dark web, an intentionally hidden part of the internet where threat actors can operate with a greater sense of anonymity. To adequately protect assets, companies need to do more than merely…
  • Blogs

    January 31, 2024
    Segregation of duties (SoD) is a well-known term among auditors and anyone who has ever been audited. SoD is the understanding that no user should have access to two conflicting business functions that would allow a user to commit fraud or error (e.g., the ability to create a vendor record, then process a payment to that vendor). The idea can be intimidating and overwhelming to those who do not…
  • Client Story

    September 14, 2023
    Protiviti partnered with leading technology company to assess, redesign, and standardise procurement, accounting, and finance functions. The company’s overall goal was to eliminate manual and disparate back-office processes to create capacity for strategic and growth objectives.
Loading...