Results for

  • Blog
    December 11, 2019
    No, we’re not talking about politics or the dance that’s been done at every wedding reception in the last decade. In a traditional software development model, requirements are kept on the left side of the plan while delivery into production and operations are on the right. Shift Left security is simply building security into an organization’s DevOps process or designing security controls earlier…
  • Blog
    December 17, 2019
    The concept of achieving effective data-driven risk management may sound intimidating, but ultimately, it’s about organizations trying to make well-informed business decisions using their available data and subject matter expertise. Unfortunately, many of the ways that organizations measure and execute against risk fail to quantify and frame the risk challenges in a way that decision makers can…
  • Blog
    January 7, 2020
    The following is excerpted from a Protiviti Flash Report issued on January 7, 2020 and is also posted on The Protiviti View. On January 4, 2020, the Department of Homeland Security (DHS) issued a National Terrorism Advisory System (NTAS) bulletin describing current developments and general trends regarding the terrorist threat posed by nation-state cyber warfare programs. According to…
  • Blog
    November 20, 2019
    There is one certainty about the 2018 California Consumer Privacy Act of 2018 (CCPA): Today’s CCPA is not going to be next year’s CCPA. The volume and velocity of changes to the CCPA and the lack of substantial guidance regarding it promise to make for an interesting 2020 as companies begin their implementation of privacy compliance for this new regulation. First, introduced recently into the…
  • Blog
    November 21, 2019
    The California Consumer Privacy Act (CCPA) goes into effect on January 1, 2020. That’s just 40 days from the date we published this blog. Yet we continue to see a considerable number of organizations that are likely to be impacted by this new legislation failing to put together personal data privacy protection programs. That could be a costly mistake. In a recent webinar we held on this topic, a…
  • Blog
    December 2, 2019
    Microsoft Dynamics Finance and Operations (D365F&O) is a powerful cloud-based Enterprise Resource Planning (ERP) system that provides organizations the ability to centralize master data and provide real-time transaction processing and reporting. As organizations begin to transition ERP to the cloud, it requires them to rethink business processes and how they are managing their company. Many…
  • Blog
    February 11, 2020
    It’s no secret that the current skills shortage is especially acute in the area of cybersecurity. A 2018 study by the International Information System Security Certification Consortium, or (ISC)², reported a shortage of nearly 3 million cybersecurity professionals globally, including a gap of roughly 500,000 trained staff in North America alone. And CIO/CTO respondents to Protiviti’s latest…
  • Blog
    February 12, 2020
    What is 5G and what does it mean to consumers?  To be quite clear, the term 5G is simply a marketing term to represent the fifth-generation of wireless technology used in cellular networks. However, the various cellular providers have created a fair bit of confusion about what 5G is, when it is…
  • Blog
    February 14, 2020
    “Data is the new water.” That observation by a chief information officer we met a few months ago really nails the way we think about data security and compliance today. He went on to say, “We have to reserve it. Preserve it. Share it. And make sure it’s clean.” Innovations in cloud, mobile, social media and big data mean the opportunity for increased risk. And that increased risk means that data…
  • Blog
    February 17, 2020
    As security and Segregation of Duties (SoD) risks are becoming more scrutinized by the Public Company Accounting Oversight Board (PCOAB) and external auditors, it is increasingly important to establish a clean and compliant security role design in your Oracle ERP Cloud application. Whether you develop custom roles as part of your implementation or redesign security in your existing environment,…
Loading...