Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Podcast February 8, 2023 Podcast | The Real Date of the Quantum Computing Apocalypse and What the White House Says We’ll Do About It Will quantum computers be able to crack RSA this decade? Maybe. But figuring out that exact date is not what you and your organisation should be worried about. A memorandum issued by the White House reveals when the quantum computing apocalypse will begin as far as information security boots on the ground are concerned. Join Host Konstantinos Karagiannis for a deep dive into the NSM-10 memo and… Podcast Transcript February 8, 2023 Transcript | The Real Date of the Quantum Computing Apocalypse and What the White House Says We’ll Do About It Will quantum computers be able to crack RSA this decade? Maybe. But figuring out that exact date is not what you and your organisation should be worried about. A memorandum issued by the White House reveals when the quantum computing apocalypse will begin as far as information security boots on the ground are concerned. Join Host Konstantinos Karagiannis for a deep dive into the NSM-10 memo and… Whitepaper July 19, 2021 Resilience Practices Can Help Firms Mitigate Supply Chain and Third-Party Provider Risks - Top of Mind Compliance Issues for 2021 Customers are major drivers of change in the marketplace. In times of stress, how well companies manage customer experience and expectation can determine whether they succeed. At the height of the COVID-19 pandemic, amid demand spikes and panic buying of household items like groceries and cleaning products, companies that successfully addressed customers’ demands (e.g., restocked alternative… Client Story April 22, 2020 Protiviti helps healthcare non-profit implement Microsoft Power BI solution to give its global members access to quick, current and valuable information Globalisation and the internet in recent history have generated any number of benefits for corporations, professionals and job seekers by allowing them to seek collaboration and expansion opportunities in new markets. But this virtual free flow of commerce and cooperation can abruptly hit a dead end at the door of regulators with purview over certain countries or jurisdictions, halting businesses… Client Story January 2, 2020 Inclusion, diversity and shared values: How Protiviti helped Goodwill build an award-winning Microsoft intranet to advance its mission to those with diverse needs According to the 2018 Census Bureau, 12.8% of the U.S. population has some type of disability. Included in that statistic are those who have impairments that impact accessibility of online websites, applications and documents.These impairments include:Difficulty lifting or grasping, which can impact use of a mouse or keyboardCognitive, mental or emotional impairmentVision impairment (… Blogs April 21, 2023 Enhancing cyber capabilities using a threat-driven strategy Senior leaders focused on cybersecurity recognise there is considerable guidance, best practices, frameworks, regulations and varied opinions on how programmes should design defensive capabilities. In addition, depending on the day, the various pressures in the organisation’s macro-environment may be greater or lesser and invite different priorities for time, team and budget. Despite… Blogs January 13, 2023 The Evolution of Attacker Behavior: 3 Case Studies This blog post was authored by Mike Ortlieb, Director, Security and Privacy and Chris Porter, Associate Director, Security and Privacy on The Technology Insights Blog. Threat actors are an ever-evolving species. Portrayed in popular advertising as guys dressed in black, probably sporting a ski mask, the harsh reality is that these bad actors are everywhere and are getting more creative… Blogs February 23, 2024 The importance of dark web monitoring In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of the most challenging and often overlooked threats is the dark web, an intentionally hidden part of the internet where threat actors can operate with a greater sense of anonymity. To adequately protect assets, companies need to do more than merely… Infographic June 3, 2024 Infographic | SIFMA’s Quantum Dawn VII Quantum Dawn VII is the latest iteration of SIFMA's biannual cybersecurity exercise focused on the outage of a critical third-party service provider (CTP). The simulation and concluding survey found many financial institutions are already experienced with the loss of CTPs, with protocols established for managing the outage. With such outages increasingly commonplace and regulators holding firms… Whitepaper May 9, 2024 SIFMA’s Quantum Dawn VII After-Action Report The latest iteration of SIFMA’s biannual cybersecurity exercise focused on the outage of a critical third-party service provider. The simulation and concluding survey found many financial institutions are already experienced with the loss of a critical third-party, with protocols established for managing the outage. In this after-action report, we look at the lessons learned from the Quantum Dawn… Load More