Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Leadership Abhi Roy Bio coming soon. Newsletter October 14, 2022 The Board’s Role in the Transformation of Work The pandemic has had a lasting effect on people and the workplace. Seven in 10 business leaders expect the market will be embracing a hybrid work model 10 years out, up from 22% pre-pandemic. What is the board’s role in this transition? The pandemic has transformed how, where, when and even why we work. It accelerated workplace redesign as offices closed, entire industries were upended and… Podcast Transcript November 25, 2022 Transcript | Financial Index Tracking via Quantum Computing— with Multiverse Using cardinality constraints for portfolio optimisation opens the doors to new applications for creating innovative portfolios and exchange-traded-funds (ETFs). All while providing better returns with less market risk. Host Konstantinos Karagiannis recently co-authored a paper on portfolio optimisation with Sam Palmer from Multiverse Computing. Find out how the team was able to outperform… Podcast Transcript July 28, 2021 Transcript | Building a new Type of Quantum Computer with Superfluid Helium EeroQ is building a new type of quantum computing chip that uses electrons in superfluid helium. The approach promises over 1-GHz gate speed, spin-state qubits with over 1-second coherence times, and high connectivity or “gateability.” Will these machines also be linkable or modular? In addition we discuss funding for quantum startups, the need for quantum knowledge by all – not just… Blog March 7, 2018 Saving Analytical Data Without Violating GDPR With an effective date less than four months away, the General Data Protection Regulation (GDPR), known officially as "REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016," is becoming a pressing concern for companies inside and outside the European Union (EU). Broadly, the regulation specifies that personal data protection of natural persons residing in… Whitepaper November 18, 2022 Managing credit risk in a differentiated downturn In this issue of the Credit Pulse, we look at credit risk considering the macroeconomic and geopolitical trends likely to shape the financial services industry over the next six months. First, we focus on critical considerations for loan servicers in the post-pandemic era. Then, we discuss risk management practices for non-financial organizations that extend trade credit and institutions that… Whitepaper October 5, 2022 Software Company CFOs Discuss Top Priorities and Strategies Chief financial officers (CFOs) of high-growth software organizations met virtually to discuss topics of mutual interest, including leading practices, industry trends and challenges. The agenda for this small-group meeting, conducted under Chatham House Rule, was created through a series of pre-interviews. Protiviti managing directors, led by Gordon Tucker, head of the technology, media and… Newsletter October 13, 2022 The ESG Debate: Where Does Your Company Stand? A University of Oxford and Protiviti global survey reports that North American companies are less committed to ESG than their counterparts in Europe and the Asia-Pacific region. The questions are why this disparity exists, and where does your organization stand? Whitepaper November 18, 2022 Navigating the Intersection of ESG and Money Laundering: How Financial Institutions Can Prevent Environmental Crime Environmental protection laws have been in place in many countries for more than 50 years.1,2 The United Nations Environment Program (UNEP) and the International Criminal Police Organization (Interpol) have highlighted the rise of environmental crime, its links to bribery and corruption, and its devastating impact on environments globally.3 But despite the strong connection to money laundering… Blog September 26, 2017 The 8 Character Password is Dead This article would be of interest to security professionals looking to enhance security practices around passwords. Passwords have been computer security’s first and last line of defense for decades. Despite exponential growth in computing power, 8 character passwords still remain the security standard for many organizations. This password length is no longer acceptable. With under $5,000 in… Load More