Insight Search

Sort by:
  • Whitepaper

    June 3, 2022
    Chief Financial Officers (CFOs) of high-growth technology companies met virtually to share leading practices, discuss and exchange learnings on challenges, industry trends and topics of mutual interest. The agenda for this small-group meeting, conducted under Chatham House Rule, was created through a series of pre-interviews. Comments from participating CFOs are summarised below.
  • Whitepaper

    April 4, 2023
    Chief financial officers (CFOs) in the technology sector met to discuss leading industry practices, trends and other topics of mutual interest in a virtual roundtable conducted under the Chatham House Rule. The agenda for this virtual exchange, hosted by Protiviti Managing Directors Gordon Tucker, Christopher Wright and Fran Maxwell, was created through a series of pre-interviews. Comments from…
  • Podcast Transcript

    September 22, 2021
    Engineering challenges abound in quantum computing. Technologies like interconnect and improved memory for repeaters will enable these machines to accelerate and power connectivity in the future. Q-NEXT is one of five quantum information science research centers funded by the DOE to help develop these technologies in addition to strengthening the nation’s leadership position in the quantum arms…
  • Client Story

    March 21, 2023
    This Florida-based organisation has grown from a small community back to one of the state’s largest financial institutions. Over time, the bank built its reputation by maintaining the personalised service of a community bank while investing in the talent, technology and financial products customers expect from a large bank – from facilitating inbound investments and empowering small businesses to…
  • Podcast

    March 24, 2021
    Protiviti has produced a series of podcasts on GRC programmes and technologies in which we obtained perspectives from Protiviti leaders and subject-matter experts around the world on GRC drivers, innovations and challenges in their markets. In this episode, we talked with Ivan Torres, a Director with Protiviti’s Technology Consulting group. Ivan, who is based in Mexico City, offers his views on…
  • Podcast

    March 24, 2021
    Protiviti has produced a series of podcasts on GRC programmes and technologies in which we obtained perspectives from Protiviti leaders and subject-matter experts around the world on GRC drivers, innovations and challenges in their markets. In this episode, we talked with Ivan Torres, a Director with Protiviti’s Technology Consulting group. Ivan, who is based in Mexico City, offers his views on…
  • Podcast

    September 22, 2021
    Engineering challenges abound in quantum computing. Technologies like interconnect and improved memory for repeaters will enable these machines to accelerate and power connectivity in the future. Q-NEXT is one of five quantum information science research centers funded by the DOE to help develop these technologies in addition to strengthening the nation’s leadership position in the quantum arms…
  • Video

    August 3, 2023
    In IT, leaders are focused on moving faster and meeting the business where it is, which can be a challenge when it comes to technical debt. The real question for leaders is: how can I innovate and modernise at the same time? Amanda Downs, Managing Director, explains how we can help when it comes to meeting the business's current needs, helping it grow, adopting and scaling through our technology…
  • Podcast Transcript

    March 24, 2021
    Protiviti has produced a series of podcasts on GRC programmes and technologies in which we obtained perspectives from Protiviti leaders and subject-matter experts around the world on GRC drivers, innovations and challenges in their markets. In this episode, we talked with Ivan Torres, a Director with Protiviti’s Technology Consulting group. Ivan, who is based in Mexico City, offers his views on…
  • Blogs

    June 19, 2023
    Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed.
Loading...