Insight Search

Sort by:
  • Video

    December 11, 2020
    We often get asked, what is the difference between business continuity management (BCM) and operational resilience? Rather than look at the differences, we believe the best way to answer this question is to look at the relationship between these two programmes.
  • Podcast Transcript

    April 26, 2021
    As costs for risk functions continue to increase, it is crucial to both reduce manual tasks and innovate processes through technological tools as well as an expanded skillset. In this episode of Protiviti’s Powerful Insight’s “Future of Compliance” podcast series, Protiviti Risk and Compliance Managing Director, Vicki Alexander speaks with Nishant Desai, the Chief Compliance Officer of…
  • Survey

    December 15, 2022
    PE-owned companies weigh in on their top risks for 2023 and the next decade, from labor and global supply chain issues to resilience and culture When it comes to the risk landscape for 2023 and the next 10 years, people, talent and culture top the list of concerns for organisations worldwide – specifically, succession challenges and the ability to attract and retain top talent, as well as being…
  • Survey

    January 13, 2023
    Global economic uncertainty, inflation and supply chain disruptions are major headwinds facing the consumer products and services industry group, and particularly consumer packaged goods (CPG) and retail companies, heading into the new year. Separately, for airlines and hospitality companies, the potential impact of an unexpected crisis on revenue and resistance to cultural changes are the top…
  • Survey

    January 16, 2023
    2022 has been an exigent year for the technology, media and telecommunications (TMT) industry. Many companies continued transformations accelerated during the COVID-19 pandemic, even as they faced an intensifying regulatory environment, geopolitical turmoil and supply chain disruptions.Heading into the new year, companies again are adjusting for more uncertainty and headwinds. The …
  • Whitepaper

    July 13, 2021
    Identity management doesn’t happen overnight; there’s no “Easy” button to press, or magic snap-of-the-fingers instant fix. In fact, identity management has transformed into something far more complex than password authentication and simple security measures. It’s important to understand that jumping into a new technology instantaneously isn’t necessarily the right first step to ensuring a…
  • Whitepaper

    July 12, 2021
    In spite of over 20 years of experience as an industry, Identity & Access Management (IAM) programmes continue to struggle — and with good reason. There is a lot that can go wrong with an IAM programme. Lack of funding, treating IAM like a project and not a programme, not having business buy-in, and trying to overly customise packaged software are all examples of significant challenges that…
  • Podcast

    November 9, 2023
    As of August 25, 2023, large technology companies providing hosting services, online platforms and search engines, are required to put processes in place to be notified of illegal content and to act on notifications under the European Union’s Digital Services Act (DSA). Tech firms that do not meet a 45-million-user threshold have to comply with many of the DSA’s provisions beginning February 2024…
  • Newsletter

    June 12, 2024
    Acute talent shortages across numerous industries underscore the risks emanating from outdated, reactionary approaches to managing people, succession and culture. The question arises, what is the board’s role in forging a 21st-century approach to managing talent?Changing times have led to fleeting employee loyalty, as talented individuals have more options than ever before with greater…
  • Podcast

    July 24, 2024
    The migration to post-quantum cryptography (PQC) is about to begin and is necessary to protect against the threats of fault-tolerant quantum computing. However, critical assets like those in military, banking, and government environments also require other layers of security and strategies such as zero trust and increased encryption bit sizes. Join host Konstantinos Karagiannis as he discusses a…
Loading...