Blog library

A collection of Protiviti blogs. 

Blogs

June 19, 2024

Leveraging AI in finance – Move from theory to practice

Finance leaders are actively prioritising practical AI use cases that deliver near- and long-term value. And the reason is simple: the benefits of deploying AI to strengthen specific activities are proving to be well worth the investment.
Enforcing real-world laws in virtual worlds is complex as it raises issues regarding jurisdiction, sovereignty, and the application of laws to virtual spaces. Roblox recently brought an action against a content creator, alleging the individual had been engaging in harassing behavior in violation of the Roblox terms of service.
Business and IT leaders can articulate business cases for modernisation efforts by linking them to key value drivers that modernisation efforts are known to deliver. The strongest business cases cite multiple benefits, and it isn’t unusual for application modernisation projects to add value in three or more related categories of benefit. The modernisation drivers listed below are synergistic: it isn’t unusual —it’s…
This blog post was authored by Justin Turner - Director, Security and Privacy on the technology insights blog. Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll Tide vs. War Eagle, The…
The big picture: Aligned assurance can create multiple benefits, including: Giving stakeholders a common view of risks and issues across the organisation Reducing repetitive, manual testing, which allows more focus on high-value activities By the numbers: In a recent Protiviti webinar on aligned assurance, only 14% of the audience members reported that collaboration across the three lines is “highly integrated” (…
When leaders consider how technology has enabled transformation of business models over the past several years, few would disagree that the world has changed dramatically. Retail, entertainment, music and banking have largely moved online. It’s a familiar story: Netflix beat Blockbuster; Amazon beat Borders. More recently, Tesla has transformed the experience of buying, owning and driving a car.
We’ve all heard the saying, “what gets measured gets done,” meaning that regular measurement and reporting helps to keep organisations focused on the information that matters. But with so many data points available to measure security, it is difficult to know where to begin. Security practitioners must constantly question what data they collect and why. Only by providing relevant measures can we understand how…
The big picture: Finance transformation reimagines how skills, processes and technology can be leveraged to drive long-term value. By the numbers: CFOs and other finance executives view the implementation of advanced automation with more urgency than do other finance managers and professionals. Math and magic: Achieving success starts with establishing a compelling finance transformation story via a combination of…
Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed.
What’s it like to change professions and gain a variety of experience? Amie Pinder, director of technology resilience risk at the London Stock Exchange Group, started her career in audit, but realised the world of technology was waiting for her. She speaks to Simran Sadhra and Rhianne Williams from Protiviti’s iGROWW network about her journey.
Access to artificial intelligence (AI) and the drive for adoption by organisations is more prevalent now than it’s ever been, yet many companies are struggling with how to manage data and the overall process. As companies open this “pandora’s box” of new capabilities, they must be prepared to manage data inputs and outputs in secure ways or risk allowing their private data to be consumed in public AI models. Through…
Loading...