Insight Search

Sort by:
  • Blogs

    May 20, 2021
    One of the most important lessons healthcare companies learned during the COVID-19 pandemic is that they need to implement and maintain better strategies, processes and procedures to enable resiliency and recovery. As they seek to mature their business continuity plans (BCPs)/continuity of operations plans (COOPs), not only to satisfy recently increased regulatory scrutiny by the Centers for…
  • Blogs

    March 4, 2022
    On the three-dimensional chessboard of business, CFOs are expanding their roles in multiple directions at once. Finance leaders now shape and drive corporate strategy in areas ranging from advanced technology investments to organisational design, and from supply chain resilience to organisational culture. Simply stated, they are positioning themselves as players in the strategic dialogue in the C…
  • Blogs

    April 6, 2023
    DevSecOps is an organisational software engineering culture and practice that aims at unifying software development (Dev), application security (Sec), and operations (Ops). The main characteristic of DevSecOps is to monitor and apply security at all phases of the software lifecycle: Planning, development, integration, delivery, deployment and production. Looking at DevSecOps through an IT…
  • Blogs

    May 19, 2023
    Access to artificial intelligence (AI) and the drive for adoption by organisations is more prevalent now than it’s ever been, yet many companies are struggling with how to manage data and the overall process. As companies open this “pandora’s box” of new capabilities, they must be prepared to manage data inputs and outputs in secure ways or risk allowing their private data to be consumed in…
  • Newsletter

    June 12, 2024
    Acute talent shortages across numerous industries underscore the risks emanating from outdated, reactionary approaches to managing people, succession and culture. The question arises, what is the board’s role in forging a 21st-century approach to managing talent?Changing times have led to fleeting employee loyalty, as talented individuals have more options than ever before with greater…
  • Blogs

    May 17, 2024
    Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in responses. Over the past several years, more and more potential customers are seeking cybersecurity partners whose values in the areas of diversity, equity and inclusion (DEI) correspond with their own. Sometimes, enterprises will…
  • Whitepaper

    April 17, 2024
    Environmental, social and governance (ESG) guidance, stakeholder demands and regulatory mandates are evolving and becoming more specific, and the time of taking a “soft approach” to sustainability reporting has passed. As the need to provide, or prepare to provide, limited and/or reasonable assurance in sustainability reporting grows, internal audit’s role in the reporting process becomes obvious…
  • Podcast

    June 7, 2024
    Supply chain management continues to be a hot topic in countless organisations in light of ongoing geopolitical challenges, evolving impacts of climate change, new tariffs, changing labor markets, and much more. How can supply chain and procurement leaders attack these and other challenges? It starts with building and implementing a strategic sourcing strategy.  Protiviti recently published a…
  • Podcast Transcript

    September 14, 2023
    In this episode, we discuss digital maturity in finance. Or more specifically, how more finance organisations are employing ERP systems, moving to cloud-based systems, transitioning more to analytics, and with that, understanding the talent management and risk management needs that are required with these major changes.Sharing their insights on these issues are two Protiviti experts, Chelsea…
  • Blogs

    May 5, 2023
    Cybersecurity governance should do more than manage cyber risk. Good cybersecurity governance creates efficiencies by clarifying the outcomes expected from its processes and establishing boundaries of responsibility among cybersecurity practitioners, frontline operational areas, senior leaders and board members. Recently, numerous crises have drawn senior leaders and board members down into…
Loading...