Insight Search

Sort by:
  • Newsletter

    September 28, 2022
    “Outsourcing and other third-party relationships can bring multiple benefits to FIs, including: enhanced operational resilience; faster and more tailored financial products and services; cost reduction; greater innovation; and improved internal processes. However, outsourcing and third-party relationships can give rise to new or different risks to FIs and potentially to financial stability that…
  • Client Story

    February 8, 2023
    A global health services company needed to execute on its corporate promise to deliver affordability and convenience to its patients. However, the company discovered that there was a disconnect between that promise and intended delivery. Further investigating that disconnect revealed that the organisation's procedures for tracking and delivering rebate payments were hampered by complex, time-…
  • Survey

    December 12, 2023
    TMT executives were asked to identify the biggest threats they anticipate over the next 12 months and a decade ahead. Many of the risks cited correlate in many ways and can be categorised under two broad themes: foundational risks, which are essentially challenges that leaders must address to keep their business thriving, and risks that are essential for continued growth and expansion.
  • Whitepaper

    March 16, 2023
    Data has become the life blood of businesses and properly managing that data to gain the most value is becoming ever more important as businesses seek to remain competitive. This Insights paper will address the importance of investing in the processes, practices, and technologies to maximise the value of data in an enterprise.
  • Insights paper

    January 8, 2024
    The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad strokes of various privacy laws may be consistent across jurisdictions, governments will dictate the collection, storage and interpretation of their citizens’ data through constantly evolving privacy regulations.The legislative bodies that write…
  • Whitepaper

    March 24, 2023
    By Carol Beaumier and Bernadine ReeseSharing information and lessons learned has become increasingly critical for the effective management of cybercrime and related financial crime. This need requires financial institutions to rethink how they have historically managed these risks.
  • Blogs

    June 19, 2023
    Penetration testing and red teaming are essential cybersecurity practices that bolster an organization’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed.
  • Podcast Transcript

    September 14, 2023
    In this episode, we discuss digital maturity in finance. Or more specifically, how more finance organisations are employing ERP systems, moving to cloud-based systems, transitioning more to analytics, and with that, understanding the talent management and risk management needs that are required with these major changes.Sharing their insights on these issues are two Protiviti experts, Chelsea…
  • Podcast

    September 14, 2023
    In this episode, we discuss digital maturity in finance. Or more specifically, how more finance organisations are employing ERP systems, moving to cloud-based systems, transitioning more to analytics, and with that, understanding the talent management and risk management needs that are required with these major changes.  Sharing their insights on these issues are two Protiviti experts,…
  • Survey

    March 10, 2023
    The level of uncertainty in today’s global marketplace and the velocity of change continue to produce a multitude of potential risks that can disrupt an organisation’s business model and strategy on very short notice. Unfolding events in Eastern Europe, changes in government leadership in several countries around the globe, escalating inflation, rising interest rates, ever-present cyber threats,…
Loading...