Results for

  • Blog
    May 6, 2016
    May is International Internal Audit Awareness Month. We are celebrating with a series of blog posts focused on internal audit topics and the daily challenges and future of the internal audit profession.   We issued our IT Audit Benchmarking Survey Report at the end of last year, and we discussed IT audit best practices in a December 9 webinar with our own IT audit practice leader, David…
  • Blog
    February 9, 2022
    SAP Business Objects, often referred to within the SAP ecosystem as BOBJ, is one of the most evolved and reliable analytics and reporting engines running today. With over 60,000 BOBJ installations, the solution can be found in companies of all sizes in every industry around the world. Founded in 1990 and acquired by SAP in 2007, Business Objects is still primarily located in on-premise servers…
  • Blog
    February 8, 2022
    Vulnerability management is a discipline that many organizations struggle with due to one simple factor: complexity. Today, organizations manage environments with technology that changes at an ever-increasing speed while relying upon legacy systems to support key business processes. In response to this complexity challenge, cybersecurity professionals continue to create new vulnerability…
  • Leadership
    Kurt serves as a Managing Director at Protiviti, responsible for architecting and planning advanced technology deployments, building out solution centers, governance, risk management, and compliance for data centers (Amazon Web Services, Microsoft Azure). Kurt actively advises C-suite Fortune 500 leaders on critical business transformations and transactions involving cloud adoption in financial…
  • Leadership
    Jeff is currently focused on the implementation and assessment of privacy and security standards in global technology companies, especially those subject to FTC enforcement actions. Jeff also has extensive experience and expertise in Payment Card Security (PCI), HIPAA/HITRUST, GDPR, CCPA, and medical device security.MAJOR PROJECTSProject leader for the independent assessment under the largest FTC…
  • Blog
    January 31, 2022
    In December 2021, in my role as president of the ISSA Delaware Valley Chapter, I had the honor of hosting a panel with five Chief Information Security Officers (CISOs), representing five different industries, each facing unique challenges presented by the global COVID-19 pandemic. The panelists included: Robert Younce - CISO of Mannington Mills, one of the world's leading manufacturers of fine…
  • Blog
    January 10, 2022
    Do your homework. The age-old mandate has newfound relevance for CISOs, given the intense pace of mergers and acquisitions (M&A) and escalating cybersecurity risks. Global business consolidation activity is strong. The number of deals (and the combined value of those transactions) through the first three quarters of 2021 surpassed the number of deals (and the combined value of those…
  • Leadership
    John is a Managing Director and leads Protiviti’s enterprise application solutions, helping companies optimize their investment and performance in business applications. This includes delivery of implementation best practices, automation, and governance of ERP and other cloud applications. He has been involved in various capacities in many ERP implementations throughout his career, with…
  • Leadership
    Based in our Chicago office, Scott is a founding Managing Director and serves as the Global Leader for the Protiviti Software Services segment area within our Technology Consulting service line, which includes the Custom Business Applications, Microsoft Cloud Applications, Salesforce Solutions, Website Design & Solutions, Workflow Automation, and Managed Support Services practice areas.…
  • Blog
    January 26, 2022
    What is Log4Shell? On December 10, 2021, a vulnerability known as Log4Shell (CVE-2021-44228) was disclosed, related to a popular Java logging library (log4j). Log4Shell gained a lot of attention due to how simple it is to exploit, how pervasive Log4j is, and the potential level of access it can provide. Within a few days of being released, many companies discovered vulnerabilities in their…
Loading...