Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Leadership Tom Andreesen Tom is a managing director with over 33 years’ experience helping organizations develop and implement a variety of business and technology solutions to enhance their operations. Tom has also helped companies establish risk management capabilities and overall governance programs to help address operational risks, technology risks, and regulatory compliance requirements. Tom is the leader of… Podcast Transcript August 23, 2021 Transcript | Workplace Transformation Next in our Transformation Series, guest host Lucy Pearman talks with Sophie Krynauw about the future of insurance and workplaces in a digital environment with global collaborative teams focusing on outcomes rather than process. Podcast Transcript August 25, 2021 Transcript | Bridging the Gap Between Algorithms and Machines Open source helped revolutionize classical computing. What can it do for quantum? EPiQC is a collaboration across five universities that is developing a range of open-source tools to connect algorithms to quantum computers, including programing languages, compilers, optimizers, and more. They’re also working on benchmarking, which is much needed as different types of quantum systems come online,… Leadership Sev Derghazarian Sev is a Senior Manager & Architect within Protiviti’s Microsoft 365 Digital Practice, specializing in Security, Compliance and Organizational Change Management, including Federal and Provincial government organizations as well as a variety of organizations within the private sector. He has successful experience in multiple roles including System Administration, Business Analysis, Project… Podcast November 16, 2022 Podcast | Entanglement and Other Quantum Foundations with Quantinuum Quantum computing is built on the ideas of giants. These so-called quantum foundations contain complicated concepts, including entanglement. In fact, the 2022 Nobel Prize in Physics was awarded to three scientists who expanded our understanding of entanglement. How does this key concept work? What are some other fascinating core ideas behind Quantum Information Science? Join host Konstantinos… Flash Report November 15, 2022 Biden Doubles Down at COP27 Last Friday at the 2022 United Nations Climate Change Conference, or Conference of the Parties of the UNFCCC (more commonly referred to as COP27), in Egypt, United States President Joe Biden asserted that global warming posed an existential threat to the planet and promised his country would meet its targets for fighting it. In his speech, he said, “The climate… Client Story November 18, 2022 Insurance Distribution Firm Positions Itself for Successful IPO and Global Expansion with Finance and Technology Transformation An award-winning, entrepreneurial insurance distribution and risk management firm serving more than 1.2 million clients was facing multiple challenges as it prepared to launch an initial public offering (IPO). The company was experiencing massive growth through the acquisition of as many as 20 companies per year. Its leadership was innovating the industry with a vision to expand internationally,… Infographic November 18, 2022 Infographic: Finance Trends for Technology, Media and Telecommunication Whether migrating to cloud-based applications or enhancing data security and privacy or managing workforce disruptions, chief financial officers at technology, media and telecommunications (TMT) organizations are resetting priorities and reimagining their long-term roles. Below are some of the key takeaways from the TMT results of Protiviti's latest Global Finance Trends Survey. Read full survey… Blog January 19, 2018 The Tools Hackers Use to Own Your World Corporate technology and security executives no doubt spend many a sleepless night anticipating what hackers might do next to attempt to gain access to valuable company assets. Keeping company and valuable customer data safe is Job One, as breaches can cost millions in lost assets, not to mention the reputational damage a corporation can suffer when an attack happens. Clearly, hackers can own the… Blog March 7, 2018 A Modern Approach to Hacking Modems In a technology world where terms like Internet of Things (IoT), big data, augmented reality and bots are hot, a conversation about modems might seem painfully antiquated. But phone modems are still a surprisingly viable way for hackers to gain access to your organization’s valuable data. So today, we’re talking about the process for setting up an environment for interacting with modems, as well… Load More