Insight Search

Sort by:
  • Flash Report

    July 17, 2020
    July 17, 2020 On Thursday, July 16, the Court of Justice of the European Union (CJEU) implemented a landmark ruling in case C-311/18 - Data Protection Commissioner v Facebook Ireland and Maximillian Schrems (more commonly referred to as “Schrems II”). While it concluded that Standard Contractual Clauses (SCCs) issued by the European Commission for the transfer of personal data to data processors…
  • Podcast

    December 11, 2023
    Jenny Wong, a managing director at Protiviti, engages in a conversation with Debra Au, a managing director and head of legal, compliance and secretariat, Hong Kong and China, at DBS Bank Hong Kong.Watch the video podcast as Jenny and Debra delve into the regulatory compliance challenges confronting financial institutions in the Asia-Pacific (APAC) region. They discuss the adoption of compliance…
  • Survey

    December 22, 2023
    Protiviti and NC State University’s ERM Initiative have been conducting our Top Risks Survey for the past 12 years. This journey began just as financial markets around the world were starting their long, slow recovery from the global financial crisis, and has since covered the worst global pandemic in 100 years as well as near record-low interest rates followed shortly by the fastest rate hiking…
  • Infographic

    May 8, 2023
    The Committee of Sponsoring Organisations of the Treadway Commission (COSO) recently released interpretive guidance for organisations about designing, evaluating and achieving effective internal control over sustainability reporting (ICSR) using COSO’s globally recognised Internal Control — Integrated Framework (ICIF), developed in 2013. The intended outcome is to build trust and confidence in…
  • Whitepaper

    August 26, 2020
    According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction.
  • Podcast

    May 4, 2022
    The fear of a quantum cryptographic apocalypse has been with us since the 90s and has launched quite a few careers and companies. Post-Quantum, no relation to this show, has been developing end-to-end solutions for quantum-secure communications since 2009, and they recently participated in a year-long proof of concept with NATO. Join host Konstantinos Karagiannis for a chat on practical solutions…
  • Newsletter

    June 1, 2020
    As companies emerge from lockdowns marked by unprecedented change and begin to look forward, boards should continue to ask the right questions. As countries across the globe emerge from lockdown, discussions tailored to the evolving marketplace and issues around employee health and safety are needed in the boardroom. While the specifics will vary depending on the circumstances, we pose 10…
  • Flash Report

    January 21, 2021
    A United States Perspective With Joe Biden’s inauguration as the 46th president of the United States and a Democrat-controlled Congress with a razor-thin majority in both the House and the Senate, what can we expect in the new administration’s first 100 days and the next two years? What sectors face the greatest impacts from the change in leadership inside the Beltway from a Biden presidency and…
  • Whitepaper

    September 7, 2021
    China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for…
  • Whitepaper

    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection.
Loading...