Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog February 27, 2019 SAP BI Platform Security Best Practices: Access Rights and Custom Access Levels This is the first in a series of blogs about security in the SAP BI Platform. The SAP BI Platform comes with a set of five default access levels: View Schedule View on Demand Full Control (owner) Full Control However, there are many situations where these either give too much access or not enough for a given situation. While it is possible to use an access level to assign security… Flash Report July 31, 2023 SEC Cybersecurity Disclosure Enhancements: Efforts to Boost Investor Confidence On 26 July 2023, the U.S. Securities and Exchange Commission (SEC) adopted amendments1 to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing risk to public companies, investors and market… Podcast Transcript May 5, 2023 Transcript | A New Quantum Software Development Kit — With Anne Matsuura of Intel Intel is preparing to build its first quantum dot processor. But you don’t have to wait to try your hand at writing code for it. Thanks to the Intel Quantum SDK, you can access the support system and software stack for this future chip via simulators today. Prepare to run algorithms on a bleeding-edge platform in this episode of The Post-Quantum World. I’m your host, Konstantinos Karagiannis. I… Blog May 4, 2023 Consumer Products Companies Gain Competitive Edge with SAP Solutions Integration The consumer products industry has experienced a major shift in the way business is conducted. Out of the pandemic, new business models have emerged, as well as changing expectations from customers and suppliers, and the rise of inflation has added a compounding effect. To address these challenges, consumer products companies should focus on these key areas: Pandemic and inflation impact on… News May 4, 2023 Protiviti Recognized as a Microsoft Security Excellence Awards Winner With Compliance & Privacy Trailblazer Award MENLO PARK, Calif. – May 4, 2023 – Global consulting firm Protiviti has been honored with the Compliance & Privacy Trailblazer award in the fourth annual Microsoft Security Excellence Awards. The award recognizes companies that deliver innovative solutions or services and are distinguished leaders in driving holistic or end-to-end Microsoft compliance or privacy strategy with their customers… Blog April 27, 2023 New Protiviti Research: The Innovation vs. Technical Debt Tug of War Innovation is the name of the game in today’s global market. Recognizing this new reality, CIOs, CTOs, CISOs and other technology executives and leaders are exploring new ways to fuel innovation throughout their organizations. However, there are many roadblocks on this path, per findings from Protiviti’s 2023 Global Technology Executive Survey. For this survey of technology executives… Blog September 21, 2020 The Art of Allocations - A Key Benefit of SAP Analytics Cloud Perfecting the art of allocations is much like successfully splitting the check when friends dine together (Remember those days?) Read on to see why. When a business reports or plans profitability of its goods or services, it is vital to account for all aspects of costs associated to their production. This helps determine the value of certain programs and invest more in those that drive… Blog May 2, 2023 Creating a Resilient Cybersecurity Strategy, Part 2: The Role of Senior Leaders in Governance This is part two of a three-part series about developing a cybersecurity governance lifecycle that provides coverage, balance, effectiveness, efficiency and assurance. Because clear boundaries between governance roles are so important, this series explores the cybersecurity governance lifecycle in the context of enterprise governance and strategy. This post explores the role of the senior… Blog May 3, 2023 Muddy Footprints – Every Contact Leaves a Trace Imagine a murder scene: a broken window, muddy footprints, a knife and a body. Now imagine a computer incident: Hundreds of encrypted files. A ransom text file. A remote connection from an external Internet Protocol (IP) address. How does someone investigating such a security breach wind back the clock and peer into the past? What stories can voiceless clues tell? How can we separate evidence… Blog April 27, 2023 How Moving to SAP S/4HANA and Leveraging Other SAP Solutions Can Benefit Consumer Products Companies The consumer products industry has experienced a major shift in the way business is conducted. Out of the pandemic, new business models have emerged, as well as changing expectations from customers and suppliers, and the rise of inflation has added a compounding effect. To address these challenges, consumer products companies should focus on these key areas: Pandemic and inflation impact on… Load More