Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper September 2, 2021 Towards an Identity-Centric Security Strategy Cyber attacks are rampant Let’s face it, cyber security professionals are not faring well against the increasing sophistication of attacks by hackers. According to the 2020 Verizon Data Breach Investigations report, the world witnessed a challenging year with a whopping 96% increase in successful data breaches against U.S. companies and government agencies as compared to 2019. Cyber attacks… Newsletter May 8, 2024 Sharpening the Board’s Focus on M&A Due Diligence Whether an acquisition is a stand-alone, complementary entity or an integration, the due diligence process is undergoing a paradigm shift due to the higher cost of funding and the impact of failed transactions. Boards should expect a more aggressive focus on due diligence.How has the due diligence process changed in recent years? For sure, the complexity of certain topics, such as environmental… Whitepaper August 1, 2022 Protecting the Enterprise: How a Well-Designed Security Analytics Programme Can Help The purpose of security analytics in an organisation Security metrics and the analysis of security information can be challenging concepts even for leading organisations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organisation’s security capabilities. If policies are the… Blogs July 31, 2023 Simple is secure: Streamlining smart contract design For security teams looking to implement and design smart contracts, there are many intricacies and nuances that can be overwhelming. Using established standards for the secure development of smart contracts/decentralised applications (dApps) is instrumental to effectively launch smart contracts. In an earlier blog, I introduced the basics of smart contracts; today, I’m diving into existing… In Focus April 25, 2025 Navigating the DOJ final rule on bulk sensitive personal data: What does it mean for your business? Multinational organisations must now comply with a sweeping new U.S. Department of Justice rule that restricts the transfer of bulk sensitive personal data to foreign adversaries. The rule, established under Executive Order 14117, went into effect earlier this month and introduces prohibitions and controls on data transactions involving countries of concern such as China, Russia, Iran, North… Blogs July 31, 2023 Cyber risk quantification for chaos management The most important use of any risk assessment tool is that it must contribute to better decision making on how to manage individual risks. Whether that is treating and reducing risk, or accepting that risk exists, risk management activities must ultimately help management make better decisions. Executives and risk management leaders, though, are increasingly faced with risk decisions they have… Video December 21, 2024 Video | Protiviti Legal Perspectives With Managing Director Joel Wuesthoff In the latest episode of the Protiviti Legal Perspectives podcast series, host Chad Volkert, Global Solutions leader at Protiviti, welcomes Joel Wuesthoff, a managing director in Protiviti’s Legal Consulting practice. With over two decades of experience in the legal industry, Joel brings deep expertise in litigation, e-discovery, data management and the evolving domains of data privacy and… Blogs October 11, 2024 5 Tips to Navigate Security in Agile Development In today’s fast-paced digital landscape, DevOps practices have revolutionised software development and deployment, allowing organisations in Hong Kong and globally to achieve greater efficiency and agility. As DevOps teams embrace cloud-based infrastructures like Amazon Web Services (AWS), security must remain a paramount concern. Ensuring the security of a DevOps environment in the AWS cloud… Insights paper June 5, 2025 Protect Your Cloud Environment With CNAPP In 2023, a prominent global technology firm experienced a significant security breach when sensitive production data was inadvertently restored in a development environment. This misconfiguration led to the exposure of credentials and customer data, underscoring the persistent challenges even the most advanced tech companies face in securing cloud environments. Survey February 21, 2024 2024 Top Risks for Chief Audit Executives CAEs see a riskier near- and long-term environment than do most of their colleagues in the executive suite. Of all C-level respondents to our latest Top Risks Survey, internal audit leaders ascribe the highest-magnitude ratings to risks they expect to challenge their organisation’s ability to achieve its performance objectives during the next 12 months. Load More