Results for

  • Newsletter
    September 13, 2022
    By Fran Maxwell, Managing Director People Advisory and Organizational Change Global Leader Today’s challenging business climate demands that boards of directors and executive leaders view the organization’s talent strategy in coordination and lockstep with their strategic business objectives. High-performing organizations are deploying a new talent game plan, led by their chief human resources…
  • Blog
    June 19, 2018
    It seems that everywhere one looks today, another organization is going through a digital transformation. And that is, in fact, true. According to a recent global Gartner survey of over 3,000 chief information officers (CIOs), 95 percent of respondents can feel the effects of digitalization – and expect their job to change because of it. The underpinning factors of digitalization (…
  • Blog
    May 2, 2019
    As legislative sessions came to a close around the United States late last month, a number of proposed state laws around privacy currently in flight failed to move out of their house of origination in Nevada, New York, New Mexico and Hawaii. This effectively ends their entry into the 2019 legislative session, with just a miniscule chance for being reintroduced by mechanical measures such as a…
  • Blog
    May 20, 2019
    It’s no secret that Oracle Cloud is quickly making its mark on the cloud application landscape. Over the last several years, Oracle’s cloud footprint has expanded tremendously.  In doing so, more and more companies are beginning to understand the complexities of Oracle Cloud application security and how it can either help or hinder compliance goals. For many organizations, risks related to…
  • Blog
    November 30, 2018
    With enterprises focusing on big data, mobility and cloud while managing cybersecurity risks that could exploit internal vulnerabilities that allow access to sensitive data, organizations have been on high alert about how to manage this risk effectively. Protiviti  recently held a webinar highlighting new features in SAP’s latest governance module, GRC 12, and Cloud Identity Access…
  • Blog
    January 14, 2019
    "Major cyber security breaches have become routine as organizations rely increasingly on vulnerable technologies and third-party providers" – Protiviti’s 2018 Security Threat Report Organizations always ask us the same three things: Can we really prevent a breach? Can we detect a breach? Are we currently breached?  Staying ahead of each of these three scenarios requires an organization to…
  • Blog
    January 17, 2019
    Like many new technologies, robotic process automation (RPA) is disrupting traditional solutions and introducing different risks related to its use. Bots act differently from other traditional software and services because they leverage the same interfaces as a human user, but they are inherently not human. A bot’s access needs to be managed and there are several factors to consider. Bots bring…
  • Blog
    February 12, 2019
    The implementation of the European Union’s General Data Protection Regulation (GDPR) in 2018 drove a ripple effect around the world as organizations were forced to take a close look at their processes to protect personal data of their global customers. Of course, obtaining an individual’s consent to use their personal data has always been important, but the GDPR requirements tightened the…
  • Blog
    February 14, 2019
    In January each year, many of us (myself included) typically take time to reflect on the year that was, and the things we want to improve upon in the coming 12 months. Like many, I made some 2019 resolutions that will help me in both my personal and professional life. I’ve often wondered, if we can make personal and professional resolutions to improve ourselves, can we also make resolutions to…
  • Blog
    February 25, 2019
    This is the first in a series of blogs about security in the SAP BI Platform. The SAP BI Platform comes with a set of five default access levels: View Schedule View on Demand Full Control (owner) Full Control However, there are many situations where these either give too much access or not enough for a given situation. While it is possible to use an access level to assign security…
Loading...