Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog June 8, 2021 Balancing Identity and Access Management for Risk Versus Speed In today’s rapidly evolving business world, the lines between technology and business have blurred. Organizations need to modernize and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s… Newsletter February 16, 2022 The Top Risks for the Next Decade: A Global Perspective Our global survey of C-level executives and directors regarding their views on macroeconomic, strategic and operational risks highlights a disruptive risk landscape over the next decade through 2031. In the attached pdf, we rank the highest-rated risk themes in order of priority to provide a context for understanding the most critical uncertainties companies face looking forward over… Blog June 9, 2021 Lessons Learned During an SAP Risk Management Implementation Implementation projects can present a variety of unique occurrences that can have both positive and negative effects on the process. Whether these events are problems to be solved or wins for the implementation team, they are also learning opportunities. Whether good or bad, it is key to take a step back and reflect on how the team addressed these events and how there may be opportunities for… Blog June 22, 2022 SAP Data Warehouse Cloud – Is it the Right Product for Your Company? Many companies are evaluating how to leverage cloud tools within their business analytics and data programs. In this blog, our SAP experts have provided a high-level architecture of SAP Data Warehouse Cloud (SAP DWC) and core functionalities ranging from supported connections, data consumption and manipulation, to preparing for analytical usage. SAP DWC is an end-to-end data management business… Blog June 23, 2022 Maximizing OT Security and Resiliency Through a Risk-Based Framework The past 18 months have seen a significant increase in threats targeting critical infrastructure and operational technology (OT) networks. These environments are prime targets due to their age, complexity and importance to organizations. OT is the driver behind the largest corporations in the world – whether it is mixing the secret recipe for Coca-Cola, generating power for millions of customers… Blog June 27, 2022 Balancing Opportunity and Risk: Security for RPA Platforms Robotic process automation (RPA) was first used to execute predetermined, rules-based tasks twenty or so years ago. Since then, RPA has functioned as a virtual workforce for businesses, which benefit from its power to collect data, execute processes rapidly and unerringly, and facilitate higher levels of quality — while enhancing customer satisfaction. We’ve previously addressed at length the… Blog June 28, 2022 Video Blog: 3 Keys to Successful Microsoft Power Platform Governance Protiviti's Haniel Croitoru, a long-time Microsoft MVP, shares his thoughts on why it's important to include governance around the Microsoft Power Platform - a low-code tool that allows citizen developers to build solutions (with the potential for disastrous results!). Spend three minutes learning the three keys to successful Power Platform governance. Hint: monitoring and alerting… Blog May 26, 2021 Properly Prepping Data for SAP S/4HANA As part of an organization’s SAP S/4HANA journey, or really any enterprise system implementation project, the lack of attention paid to data is an all-too-common pitfall. While it is understandable that project teams focus the majority of their attention on the functional build and testing requirements that are typically core to a program’s success, the lack of attention on data can - and usually… Blog July 5, 2022 Sustainability in Third-Party Risk Management: Going Back to the Basics The mere terms third-party, supplier, vendor, service provider and customer demand context and definition. Either an organization conducts cybersecurity and privacy due diligence on critical third parties or is on the receiving end fielding customer due diligence requests – and often, doing both. Wherever each organization is on the third-party risk management journey, its leaders should know… Blog May 27, 2021 E-Commerce Boom Heightens Privacy Risks, Creates Opportunity for Retailers to Enhance Data Practices At no time in history has customer data and privacy protection been a greater concern for consumers, businesses and regulators alike than in the current pandemic environment. The massive shift to online commerce and contactless payments that began in early 2020 spurred by confinement measures to contain the spread of COVID-19 has dramatically escalated security and privacy risks associated with… Load More