Results for

  • Blog
    June 8, 2021
    In today’s rapidly evolving business world, the lines between technology and business have blurred. Organizations need to modernize and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s…
  • Newsletter
    February 16, 2022
    Our global survey of C-level executives and directors regarding their views on macroeconomic, strategic and operational risks highlights a disruptive risk landscape over the next decade through 2031. In the attached pdf, we rank the highest-rated risk themes in order of priority to provide a context for understanding the most critical uncertainties companies face looking forward over…
  • Blog
    June 9, 2021
    Implementation projects can present a variety of unique occurrences that can have both positive and negative effects on the process. Whether these events are problems to be solved or wins for the implementation team, they are also learning opportunities. Whether good or bad, it is key to take a step back and reflect on how the team addressed these events and how there may be opportunities for…
  • Blog
    June 22, 2022
    Many companies are evaluating how to leverage cloud tools within their business analytics and data programs. In this blog, our SAP experts have provided a high-level architecture of SAP Data Warehouse Cloud (SAP DWC) and core functionalities ranging from supported connections, data consumption and manipulation, to preparing for analytical usage. SAP DWC is an end-to-end data management business…
  • Blog
    June 23, 2022
    The past 18 months have seen a significant increase in threats targeting critical infrastructure and operational technology (OT) networks. These environments are prime targets due to their age, complexity and importance to organizations. OT is the driver behind the largest corporations in the world – whether it is mixing the secret recipe for Coca-Cola, generating power for millions of customers…
  • Blog
    June 27, 2022
    Robotic process automation (RPA) was first used to execute predetermined, rules-based tasks twenty or so years ago. Since then, RPA has functioned as a virtual workforce for businesses, which benefit from its power to collect data, execute processes rapidly and unerringly, and facilitate higher levels of quality — while enhancing customer satisfaction. We’ve previously addressed at length the…
  • Blog
    June 28, 2022
    Protiviti's Haniel Croitoru, a long-time Microsoft MVP, shares his thoughts on why it's important to include governance around the Microsoft Power Platform - a low-code tool that allows citizen developers to build solutions (with the potential for disastrous results!).  Spend three minutes learning the three keys to successful Power Platform governance. Hint: monitoring and alerting…
  • Blog
    May 26, 2021
    As part of an organization’s SAP S/4HANA journey, or really any enterprise system implementation project, the lack of attention paid to data is an all-too-common pitfall. While it is understandable that project teams focus the majority of their attention on the functional build and testing requirements that are typically core to a program’s success, the lack of attention on data can - and usually…
  • Blog
    July 5, 2022
    The mere terms third-party, supplier, vendor, service provider and customer demand context and definition. Either an organization conducts cybersecurity and privacy due diligence on critical third parties or is on the receiving end fielding customer due diligence requests – and often, doing both. Wherever each organization is on the third-party risk management journey, its leaders should know…
  • Blog
    May 27, 2021
    At no time in history has customer data and privacy protection been a greater concern for consumers, businesses and regulators alike than in the current pandemic environment. The massive shift to online commerce and contactless payments that began in early 2020 spurred by confinement measures to contain the spread of COVID-19 has dramatically escalated security and privacy risks associated with…
Loading...