Insight Search

Sort by:
  • Whitepaper

    May 1, 2022
    “To put it bluntly, will companies enact courageous ESG policies only when it does not hurt?…This is a moment of truth. Stakeholders have been increasingly mobilised to question the premises of companies’ professed ESG activities. All too frequently, corporations and their executives engage in marketing or obfuscation of what they’re actually doing — what could more accurately be called ‘ESG-…
  • Podcast

    August 30, 2021
    The current and future state of suspicious activity monitoring and reporting is being transformed by technology and the use of data, analytics and robotics.In this episode, Mark Highton – Managing Director leading Protiviti’s Financial Crimes Consulting practice, interviews Vishal Ranjane - Head of Global AML Strategies, Solutions and Transformation at TD Bank, and Seth Twery - VP of Client…
  • Video

    June 14, 2022
    According to S&P, the combined current stock market value ($9.3 trillion) of the five tech titans (Apple, Microsoft, Google, Amazon, and Facebook) is more than the value of the next 27 most valuable U.S. companies put together. With growth accelerated by the COVID-19 pandemic and the demand for digital services comes greater power and increased concerns. How do tech companies strike the…
  • Whitepaper

    November 21, 2022
    We are in unusual economic times. While making predictions may be a fool’s errand, the aggressive posturing among central banks to fight runaway inflation implies that we will soon be — if not already are — in the late stage of the economic cycle. However, considering the past several months of mixed economic data, the outcome of the downturn and the developments that drive it are likely to look…
  • Flash Report

    May 4, 2020
    The Coronavirus Aid, Relief, and Economic Security (CARES) Act that was signed into law on March 27, 2020, offers a lifeline to small businesses and sole proprietors (generally those with 500 or fewer employees) in the form of the Paycheck Protection Programme (PPP) administered by the U.S. Small Business Administration (SBA). This programme initially authorized $349 billion in forgivable loans,…
  • Whitepaper

    June 10, 2022
    Big Tech’s “big” problem How big is Big Tech? There is little doubt that the big five technology companies (i.e., Apple, Microsoft, Google, Amazon and Facebook) are operating in a completely different stratosphere. As one recent New York Times blog described it, “America’s tech titans have formed a separate universe in which they are the sun, and everyone else — billions of humans, other…
  • Blogs

    July 30, 2019
    According to a press release by the Hong Kong government, Hong Kong is set to receive an overall rating of “Compliant” in what will be its Fourth Financial Action Task Force (FATF) Mutual Evaluation. The Mutual Evaluation Report (MER) is scheduled to be released in September 2019. The expected rating represents a significant improvement over the Partially Compliant rating assigned to Hong Kong on…
  • Podcast

    December 4, 2023
    “Technology will help us be better stewards of managing risk by leveraging data to tell a story… It allows businesses to see actual data and say, “Wow, if we partner with legal in a different proactive way, we can avoid some of these costs.” -Mark Smolik, General CounselMark Smolik, Chief Legal Officer for DHL Supply Chain in the Americas, is no stranger to the demands placed on today’s corporate…
  • Blogs

    January 31, 2024
    Data is the lifeblood of today’s digitally transformed business environment and is growing rapidly as it is estimated that 90 percent of the world’s existing data was created in the last two years alone. With such rapid growth, simply understanding the context of what data is important to keep, classifying that data and organising it into a useful form cannot happen without the support of…
  • Whitepaper

    August 1, 2022
    The purpose of security analytics in an organisation Security metrics and the analysis of security information can be challenging concepts even for leading organisations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organisation’s security capabilities. If policies are the…
Loading...