Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs October 14, 2024 The Hidden Costs of an ERP Transformation As a leader about to undertake an ERP transformation, it is important to remember that these projects rarely go as planned. Like a house remodel, there will be hidden costs to be addressed throughout the implementation. Whether it be that design tastes (requirements) change, the costs unexpectedly increase or an unexpected labor shortage that increases the timeline, it is important to learn… Blogs January 31, 2024 Navigating the GenAI course with Microsoft Copilot Generative artificial intelligence (GenAI) is a hot topic these days, and not just in the IT world. The statistics indicate off-the-charts interest in GenAI’s capabilities, with AI spending predicted to more than double to $300 billion by 2026. Organisations are gearing up, determining how to best incorporate GenAI to significantly enhance their customer relations, revenue growth, cost… Blogs September 4, 2024 Microsoft D365 Security Design Implementation Considerations When approaching an ERP implementation, the topic of security is going to be broached and the question then becomes, “now or later?” Before discussing the considerations for implementing security before or after an ERP implementation, it is important to review the purpose of creating a custom security model. For most companies, creating compliant custom security is a requirement. Blogs December 5, 2024 The ESG Controller—A “Job Of The Future” That’s Actually Here Now As the stakes increase for ensuring the integrity of sustainability reports, CFOs across all industries should not only consider adding the ESG controller role in the finance function but also determine where it sits in the organisational structure and how a newly appointed ESG controller can be positioned to succeed. Podcast May 14, 2025 Podcast | Moving Companies to PQC VPN — with American Binary Post-quantum cryptography is rapidly moving from the realm of NIST standards to running in production. The threat of quantum computing advances and coming regulations are driving this acceleration. One major component on the PQC migration plan for companies is VPN. In this episode we look at the Ambit corporate VPN client, which uses a standardised NIST PQC cipher: ML-KEM. Did you know there are… Podcast Transcript May 24, 2021 Transcript | Risky Women - Regulatory Change Transformation Diane Minunni Callan In this episode of our Transformation Series on Risky Women Radio, Protiviti talks with Diane Minunni Callan, Head of Compliance – Enterprise Corporate Office, Regulatory Change & Academy of TD Bank about their ongoing development and enhancement of compliance programs and regulatory change management processes - from ESG to AI. Podcast April 27, 2022 Podcast | Risky Women - Regulatory Change Transformation: Diane Minunni Callan In this episode of our Transformation Series on Risky Women Radio, Protiviti talks with Diane Minunni Callan, Head of Compliance – Enterprise Corporate Office, Regulatory Change & Academy of TD Bank about their ongoing development and enhancement of compliance programmes and regulatory change management processes - from ESG to AI. Newsletter July 29, 2020 Compliance Insights - July 2020 In your monthly compliance news roundup, you will read about: Implications of Class Action Suit Alleging Misleading Autopay Options Recapping Regulatory Responses to COVID-19 DOJ Updates Guidance on Evaluating Corporate Compliance Programmes Regulators Aim to Provide Financial Institutions Clear Guidance and Improve Compliance Video June 2, 2020 Video - How is Protiviti transforming finance? Protiviti helps finance organisations navigate changing expectations. We help finance organisations enhance core reporting activities and then we help them automate those activities which helps them devote their time towards their corporate importance by responding to the needs of customers. Protiviti not only helps them with the decision making but also with the design and implementation. Blogs April 21, 2023 Enhancing cyber capabilities using a threat-driven strategy Senior leaders focused on cybersecurity recognise there is considerable guidance, best practices, frameworks, regulations and varied opinions on how programmes should design defensive capabilities. In addition, depending on the day, the various pressures in the organisation’s macro-environment may be greater or lesser and invite different priorities for time, team and budget. Despite… Load More