Insight Search

Sort by:
  • Whitepaper

    December 14, 2020
    Technology, media and telecommunications (TMT) companies are entering the new year with wind in their sails, having weathered the ongoing era of lockdowns, quarantines and remote working better than many other companies. Thanks to a strong demand for digital services, collaboration tools and other technology infrastructure needed to support the shift in working and living habits, TMT companies…
  • Whitepaper

    June 8, 2020
    This article addresses both the challenges CIOs and technology leaders experienced during the COVID-19 pandemic and how companies and their technology functions responded to it. We learned that the organizations and their stakeholders most likely to shape their narratives in a positive direction were those who understood and leveraged the benefits of the new technology labor model that supports a…
  • Podcast Transcript

    May 5, 2023
    Intel is preparing to build its first quantum dot processor. But you don’t have to wait to try your hand at writing code for it. Thanks to the Intel Quantum SDK, you can access the support system and software stack for this future chip via simulators today. Prepare to run algorithms on a bleeding-edge platform in this episode of The Post-Quantum World. I’m your host, Konstantinos Karagiannis. I…
  • Podcast

    March 8, 2022
    ESG reporting is garnering a growing amount of attention today, particularly among board members seeking to understand and possibly comply with specific requirements in their country or their industry. But when it comes to ESG reporting, there are a lot of questions. Who specifically is required to issue these ESG reports? Who is issuing them voluntarily? And more importantly, what do…
  • Podcast Transcript

    March 8, 2022
    ESG reporting is garnering a growing amount of attention today, particularly among board members seeking to understand and possibly comply with specific requirements in their country or their industry. But when it comes to ESG reporting, there are a lot of questions. Who specifically is required to issue these ESG reports? Who is issuing them voluntarily? And more importantly, what do…
  • Podcast Transcript

    April 26, 2021
    As costs for risk functions continue to increase, it is crucial to both reduce manual tasks and innovate processes through technological tools as well as an expanded skillset.In this episode of Protiviti’s Powerful Insight’s “Future of Compliance” podcast series, Protiviti Risk and Compliance Managing Director, Vicki Alexander speaks with Nishant Desai, the Chief Compliance Officer of…
  • Podcast

    March 13, 2024
    In this special edition of the Protiviti Legal Perspectives podcast series, we delve into the complexities of new data protection and cybersecurity government regulations in the defense industry with Alexander W. Major, Partner, McCarter & English and Perry Keating, President of Protiviti Government Services. The Cybersecurity Maturity Model Certification (CMMC) was recently promulgated,…
  • Whitepaper

    November 20, 2020
    The data, automation and enterprise application landscape is significantly changing. It is critical for data-driven enterprises to have single version of truth and a cyclical approach that includes business processes to analyze, automate and act.The Microsoft Power Platform aids this common challenge by providing organizations with an enterprise-grade platform, specifically those utilizing…
  • Client Story

    April 28, 2022
    Web application accessibility is critical to the ongoing success of any digital application. In fact, the Americans with Disabilities Act (ADA) includes digital assets in its definition of “public places of accommodation” that should adhere to accessibility standards. Jamf, a global software company based in Minneapolis, Minn., produces applications to manage Apple devices and services and has a…
  • In Focus

    October 17, 2024
    As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security of its national defense supply chain: The Cybersecurity Maturity Model Certification (CMMC) Program. The new rule, published Oct. 15, marks a significant step towards enhancing cybersecurity across the Defense Industrial Base (DIB).
Loading...