Results for

  • Podcast Transcript
    July 25, 2022
    To kick off our 2022 Risky Women Radio podcast series, Kimberley Cole speaks with Senior Risk and Compliance Leaders at Protiviti, Carol Beaumier and Bernadine Reese about financial services industry compliance priorities for 2022.
  • Blog
    March 8, 2018
    Security researchers have identified a flaw, present in most computer processors, that allows unauthorized disclosure of information. The flaw, which affects most major processor manufacturers, is the first known instance of a security vulnerability at the processor level, and could be exploited in servers, workstations (including laptops), network infrastructure, mobile devices, IoT devices and…
  • Blog
    March 12, 2018
    Taking advantage of a user’s poor security practices is often a critical first step for malicious hackers or other cybercriminals seeking to compromise an organization’s systems and data. More than 80 percent of hacking-related breaches leveraged stolen or weak passwords, according to research for the 2017 Data Breach Investigations Report from Verizon. The report also says that about…
  • Blog
    March 14, 2018
    Undetected Breaches and Ransomware Change How We Think About Cybersecurity As new possibilities in information technology continue to transform organizations, they may outpace any cybersecurity protections already in place. Controls that seemed adequate yesterday might not be equal to the challenges presented by new technology and ever-evolving threats today. Our issue of Board Perspectives:…
  • Blog
    March 19, 2018
    As cloud adoption accelerates within well-established businesses and emerges across nearly all industries and company sizes, security executives have been presented with thematic challenges to managing cloud governance, security, and regulatory risk.  Protiviti recently held a roundtable of Chicago-area CISOs and Security Leaders to discuss the thematic challenges, share strategies, and gain…
  • Blog
    March 20, 2018
    First, a recap of the vulnerability For the first time, performance-enhancing features of most modern processors (known as out-of-order superscalar execution, speculative prediction, and HW caching) were discovered to contain (as a unit) a flaw that allows unauthorized disclosure of information. The fact that this flaw is at the processor level differentiates it from other potential…
  • Blog
    October 27, 2022
    A traditional SAP S/4HANA transformation project has many decision points including strategic ones, such as choosing between a system conversion (brownfield), a new implementation (greenfield) or a hybrid approach and whether to move to the cloud or stay on-premise. There are key decisions related to handling custom developments, business process changes and reporting and analytics…
  • Video
    September 7, 2020
    A line-up of eminent panelists in operational resilience discussed how organizations have responded to the COVID-19 pandemic and what it means for their operational resilience planning going forward, including the potential impact on critical third party vendors.
  • Blog
    April 16, 2018
    The 2018 GRC and Finance SAP Insider Conferences featured a wealth of knowledge and insight around new areas of interest, including SAP S/4HANA updates, Central Finance strategies, the importance of managing risks during S/4HANA implementations, and some newer topics around General Data Protection Regulation (GDPR), lease accounting (IFRS 16 and ASC 842), and SAP’s big announcement of the…
  • Blog
    October 18, 2022
    When it comes to resilience planning, enterprise leaders have their hands full. Maintaining continuity of critical operations in the face of an uncertain economic environment, the lingering effects of pandemic-related supply chain disruptions, an uptick in climate-driven catastrophic events and more has created a situation in which conventional strategies are simply not as effective as they once…
Loading...