Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Sort by: Relevance Date Filter Search Sort by RelevanceDate Order AscDesc Whitepaper August 26, 2020 Interpretations of the Updates to China’s Cybersecurity Law All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017. Whitepaper August 26, 2020 China's Cybersecurity Law: Cross-Border Data Transfer As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this fifth installment focuses on the cross-border transfer of data — or data localisation — that is outlined in Article 37. Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Whitepaper August 26, 2020 China’s Cybersecurity Law: Personal Information Protection Law (PIPL) Overview As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection. Whitepaper August 26, 2020 China's Cybersecurity Law: Multi-Level Protection Scheme (MLPS) In part one of our Point of View (POV) series Interpretations of the updates to China’s Cybersecurity Law, we highlighted the updated legal requirements that impact organisations looking to do business in mainland China. Whitepaper August 1, 2022 Protecting the Enterprise: How a Well-Designed Security Analytics Programme Can Help The purpose of security analytics in an organisation Security metrics and the analysis of security information can be challenging concepts even for leading organisations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organisation’s security capabilities. If policies are the… Whitepaper August 1, 2022 Sanctions enforcement: A new era U.S. Deputy Attorney General Lisa Monaco has called sanctions “the new FCPA.” [1] The EU has issued a proposal that would make sanctions evasion an EU crime [2] . The U.K.’s Office of Financial Sanctions Implementation (OFSI) is under pressure from key global partners to step up its enforcement activity [3]. These developments are just a few of the signs that the national… Newsletter May 16, 2022 Three Keys for CEOs: Relevance, Culture and Alignment A recent Protiviti global survey indicates varying views across different executive groups about the overall risk environment. CEOs rate the relative riskiness of the business environment higher for 2022 than anyone else, jumping from the lowest rating in 2021 to the highest rating in 2022. Also, the number of risks that CEOs noted would have a “significant impact on their business”… Survey August 8, 2022 Top Risks for Manufacturing and Distribution Organisations in 2022 and 2031 Supply chain risk is the dominant issue for the Manufacturing and Distribution industry group in 2022 and 2031 – but there’s more Massive disruptions in the global supply chain. Challenges in attracting and retaining talent to address needs all across the enterprise. COVID-19 variants. Cyber attacks and ransomware. Wildfires and flooding. Geopolitical tensions in specific regions and shifts on… Newsletter June 6, 2022 Get Into the Quantum Game: Use Cases Are Emerging A year ago, an issue of Board Perspectives focused on why the board should care about quantum computing — what it is, when it will become a reality and what steps companies should take to stay on top of this evolving technology market. Since then, use cases for quantum computing continue to emerge. One of the most misleading phrases found in articles about quantum computing is… Load More