Insight Search

Sort by:
  • Podcast Transcript

    March 2, 2021
    Welcome to episode one of our Risky Women Transformation series where Lucy Pearman talks change, innovation and what’s next in the world of governance, risk, and compliance. Listen to the episode on the Risky Women website here. Want To Learn More? Risky Women website Risk Transformation services
  • Podcast

    March 2, 2021
    Welcome to episode one of our Risky Women Transformation series where Lucy Pearman talks change, innovation and what’s next in the world of governance, risk, and compliance. Listen to the episode on the Risky Women website here. Want To Learn More? Risky Women website Risk Transformation services
  • Blogs

    December 7, 2023
    This blog post was authored by Karter Klumpyan and Laura Moore, Director Risk and Compliance on The Protiviti View.The big picture: A two-step indicator-based approach proposed by EU supervisory authorities will be used to assess ICT services providers to determine whether they should be designated as critical and subjected to oversight under the Digital Operational Resilience Act (DORA).Why it…
  • Whitepaper

    January 20, 2022
    Una visione olistica e digitale per gestirlo con efficacia Con la pressione sulle supply chain seguita allo shock pandemico e alla successiva ripresa del ciclo economico, il rischio Terze Parti ha assunto un’importanza centrale e imposto una revisione del metodo con il quale è gestito. In questo Insights analizziamo le nuove sfide del Third Party Risk Management (TPRM), illustriamo il Framework…
  • Whitepaper

    November 18, 2022
    In this issue of the Credit Pulse, we look at credit risk considering the macroeconomic and geopolitical trends likely to shape the financial services industry over the next six months. First, we focus on critical considerations for loan servicers in the post-pandemic era. Then, we discuss risk management practices for non-financial organizations that extend trade credit and institutions that…
  • Newsletter

    January 10, 2024
    Conducted in partnership with the NC State ERM Initiative, our global survey of C-level executives and directors highlights the influence of economic headwinds, talent issues, emerging technologies, cyber threats and geopolitical events on the 2024 risk landscape. This issue of Board Perspectives discusses the 10 highest-rated risk themes noted in the survey to provide a context for understanding…
  • Whitepaper

    September 19, 2022
    Survey Shows Elevated Concerns Around Cybersecurity, Privacy and Compliance for the Technology, Media and Telecom IndustryFor the technology, media and telecommunications (TMT) industry, the greatest IT audit concerns in 2022 lie with cybersecurity-related breaches, privacy and regulatory compliance. More than 1,000 IT audit leaders and professionals from the TMT industry provided this assessment…
  • Whitepaper

    October 22, 2020
    Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt…
  • Blogs

    March 25, 2021
    Is Your Organisation Underpaying or Overpaying its Employees? No organisation wants to be headline news for underpaying its employees. However, many businesses are being publicly ostracised for violating enterprise agreements (EAs) in Australia. Not only are EAs incredibly complicated, wage law is also evolving rapidly, with Victoria and Queensland passing legislation in 2020. Unfortunately,…
  • Video

    February 24, 2022
    Alleged criminals have identified the potential for laundering funds through e-commerce. After all, why would a money launderer hassle with the physical transport of ill-gotten gains or risk dealing with financial institutions with savvy detection capabilities when laundering money can be done with a few clicks of a computer in an environment that may not always be vigilant in detecting fraud?…
Loading...