Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper December 21, 2022 Software Company CFOs Discuss Risks, Budgeting and Talent Issues Chief financial officers (CFOs) of high-growth software organisations met virtually to discuss topics of mutual interest, including top risks, leading industry practices and trends. The agenda for this small-group meeting, conducted under Chatham House Rule, was created through a series of pre-interviews. Protiviti managing directors Scot Glover and Noah Kessler, hosted the exchange. Comments… Survey September 26, 2024 From AI to Cyber - Deconstructing a Complex Technology Risk Landscape Protiviti’s global internal audit survey 2024 highlights the challenges and technology risk trends faced by internal auditors worldwide. Download the report. Insights paper March 20, 2024 Mastering Data Dilemmas: Navigating Privacy, Localisation and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape surrounding data protection, organisations must adapt swiftly to ensure compliance and maintain trust with their customers and stakeholders. However, both data sovereignty and localisation play an important role in privacy, as discussed in a previous post… Whitepaper March 13, 2024 An Open Letter to CEOs and Board Members: In Support of the Compliance Function We’ve all heard it said: “Tone at the top” is critical to the success of a compliance function, and financial institution regulators expect CEOs and boards of directors to foster a “culture of compliance” in the institutions they oversee. We’d expect most CEOs and boards, when questioned, to say this is their goal. But what happens when the CEO and the board — intentionally or unintentionally —… Whitepaper March 24, 2023 Collaboration: The key to better management of cybercrime and financial crime By Carol Beaumier and Bernadine ReeseSharing information and lessons learned has become increasingly critical for the effective management of cybercrime and related financial crime. This need requires financial institutions to rethink how they have historically managed these risks. Insights paper January 8, 2024 How data sovereignty and data localisation impact your privacy programmes The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad strokes of various privacy laws may be consistent across jurisdictions, governments will dictate the collection, storage and interpretation of their citizens’ data through constantly evolving privacy regulations.The legislative bodies that write… Podcast October 5, 2022 Podcast | Financial Index Tracking via Quantum Computing— with Multiverse Using cardinality constraints for portfolio optimization opens the doors to new applications for creating innovative portfolios and exchange-traded-funds (ETFs). All while providing better returns with less market risk. Host Konstantinos Karagiannis recently co-authored a paper on portfolio optimization with Sam Palmer from Multiverse Computing. Find out how the team was able to outperform… June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organization’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Whitepaper December 27, 2023 Cybersecurity in solutions A Whitepaper on how solutions by stc transformed its Cybersecurity program for a sustainable digital future in partnership with Protiviti Member Firm for the Middle East Region. Flash Report July 31, 2023 SEC Cybersecurity Disclosure Enhancements: Efforts to Boost Investor Confidence On 26 July 2023, the U.S. Securities and Exchange Commission (SEC) adopted amendments1 to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing risk to public companies, investors and market… Load More