Insight Search

Sort by:
  • October 20, 2023
    Dramatic reductions in force are happening across industries as economic uncertainty leads companies to reevaluate labor expenditures.Why it matters: RIFs are costly to carry out and they damage morale. Handling RIFs with compassion is the right thing to do.RIF alternatives – furloughs, job sharing and compensation changes – can save money, enable swifter recoveries and reduce hits to morale.…
  • Whitepaper

    March 23, 2021
    Chief financial officers (CFOs) of high-growth technology industry companies meet virtually in a small-group setting using Chatham House rules to exchange learnings and discuss business challenges and industry trends. Participants of this exclusive CFO peer group create the agenda through a series of pre-interviews. Protiviti is proud to support and host members of this community. The…
  • Client Story

    June 11, 2021
    Organisations striving for excellence are increasingly becoming interested in a new vision of what internal audit can be. They are recognising that the internal audit function could be much more than a corporate rule enforcer and could transform into a valuable risk adviser to the business instead.
  • Newsletter

    December 12, 2021
    In prior years, there have been unique enterprise, process and technology risk issues and financial reporting issues for audit committees to consider in addition to the normal ongoing activities articulated within the committee’s charter. These exciting, unprecedented times continue to evolve the committee’s agenda. We discuss the agenda items for 2022 in this issue of The Bulletin and…
  • Whitepaper

    June 9, 2021
    Protiviti is proud to be a gold sponsor of the IIA’s International Conference, which will be held virtually this year. The IIA’s International Conference is the premier training and networking event for internal audit professionals worldwide. The theme for The IIA’s 2021 International Conference, Scaling New Heights, sets the stage to share new and forward-looking information and leading…
  • May 15, 2022
    Microsoft Dynamics 365 Finance & Operations provides a database logging feature that can be used to track insert, update, delete, and rename key operation changes made to tables and fields in the application. Database logging is a valuable feature of Microsoft Dynamics 365 used to provide a chronological record of changes that occur within the application. Each record contains details of the…
  • Flash Report

    February 12, 2021
    According to Harvard Business Review research, 70-90% of M&A deals fail. Poor planning and execution at all stages of the deal (the deal zone, transaction zone, and post-close zone) contribute significantly to this high failure rate. Further, Protiviti research has shown that the most common mistakes an organisation can make during a transaction include improper planning, poor due diligence,…
  • Whitepaper

    March 19, 2021
    Planning and Implementation of a New Approach to the Workplace Organisations have learned much about themselves, their workforce and their business during the COVID-19 Pandemic. For many, there was a forced shift to working from home. While those employees who cared for children or other relatives struggled to some extent, most employees shifted to working from home seamlessly. Nevertheless,…
  • Survey

    January 7, 2022
    The quality and, in some cases, the existence of the CISO/CFO relationship varies by company. In organisations where the CISO role is positioned and promoted as a source of value, CISOs and CFOs tend to collaborate more often and more meaningfully than in companies that treat information security as a cost center (and typically struggle with cybersecurity as a result). Protiviti’s 2021…
  • September 7, 2021
    I’m a professional hacker, or as we are referred to in the security industry, a penetration tester. As a penetration tester, I am hired by organisations to attack their systems, networks, applications, and employees in the same fashion that a malicious attacker would. It is my job to find and exploit weaknesses before malicious attackers can. These weaknesses include application and network-…
Loading...