Results for

  • Whitepaper
    October 22, 2021
    There was a time when financial misconduct meant a rogue trader racking up losses on a stock market bet he wasn’t authorized to make or a Ponzi scheme where crooked asset managers spent investors’ money on a posh lifestyle. But the definition of misconduct by financial actors has changed, and greatly expanded, in the past decade-and-a-half due to big scandals, even bigger financial catastrophes,…
  • Blog
    May 19, 2021
    In today’s rapidly evolving business world, the lines between technology and business have blurred. Organizations need to modernize and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s…
  • Whitepaper
    July 5, 2022
    Review of Microsoft 365 Capabilities for Records Management and the ICA Guidelines and Functional Requirements for Electronic Document and Records Management Systems Leveraging Microsoft 365 and SharePoint Online as an organization’s primary electronic document and records management system (EDRMS) provides the ability to effectively fulfill compliance and regulatory requirements for information…
  • Leadership
    Patrick is a Managing Director in the Data Management and Advanced Analytics practice at Protiviti. Patrick has over 20 years of consulting experience having spent the last 15 years in data and analytics. Prior to joining Protiviti (formerly Decision First Technologies), Patrick co-founded Capricorn Consulting, an application development and consulting firm in Atlanta. Patrick has helped hundreds…
  • Blog
    June 30, 2022
    How does a business go extinct? It’s not for lack of product improvement ideas, says futurologist, professor and business consultant Dr. Stefan Gröner. Typically, it’s for lack of understanding what customers really want. Gröner offers the example of the stagecoach. As a product, it could be endlessly improved by making it bigger or more comfortable. But what people wanted was speed. Once the…
  • Blog
    June 2, 2021
    In today’s rapidly evolving business world, the lines between technology and business have blurred. Organizations need to modernize and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s…
  • Leadership
    Eric is a Managing Director with over 20 years of experience in compliance, internal/external audit, and risk management. Eric's focus is primarily in the higher education industry, with specific experience in Internal Audit, Accreditation, Title IV compliance and risk management. Eric works with both large and small institutions of higher learning to evaluate and analyze compliance programs…
  • Blog
    June 3, 2021
    Plenty of businesses are just fine with home-grown code. Various developers may have contributed to the code base, as reflected in its varying quality and style. Architectures might also be older: a system may run on a thick client or even a mainframe. Some leaders already recognize the advantages of application modernization, but they are daunted by the scope of potential changes it will…
  • Blog
    June 4, 2021
    In today’s cybersecurity threat landscape with its ever-growing volume of incidents, it is remarkable to think that proactive threat and vulnerability management remains a challenge for companies to address effectively. Organizations are adopting threat exposure management techniques to manage business risks stemming from developing and applying technology such as Internet of Things (IoT)…
  • Blog
    June 7, 2021
    On March 9, 2021, Bloomberg reported hackers had accessed videos and data from thousands of security cameras in an event now known as the Verkada breach. Our first post about the incident covered the importance of end-to-end Internet of Things (IoT) security; this post takes a deeper look at IoT data privacy risk and suggests how purchasing organizations can mitigate it. It’s worth considering…
Loading...