Results for

  • Blog
    June 13, 2022
    Most public companies have made strides to provide meaningful environmental, social and governance (ESG) reporting to their stakeholders. However, even these leaders are concerned about complying with new proposed regulations from the SEC, which would require public companies to disclose extensive climate-related information in their SEC filings. CFOs are feeling particular pressure from this…
  • Podcast Transcript
    May 4, 2022
    The fear of a quantum cryptographic apocalypse has been with us since the 90s and has launched quite a few careers and companies. Post-Quantum, no relation to this show, has been developing end-to-end solutions for quantum-secure communications since 2009, and they recently participated in a year-long proof of concept with NATO. Join host Konstantinos Karagiannis for a chat on practical solutions…
  • Blog
    September 28, 2021
    In a recent episode of our popular podcast series, The Post-Quantum World, host Konstantinos Karagiannis spoke with Denis Mandich, CTO at Qrypt about the cryptographic apocalypse, which could be under five years away, depending on interconnect technologies that might allow quantum computers to work together. Is now the time to start planning for, or even implementing, post-quantum safe…
  • Insight
    June 1, 2022
    The availability of large volumes of internal, external, social media data, along with advances in analytics and the advent of machine learning have created the perfect opportunity for optimizing consumer lending decisions. Not sure how to create a plan for your own organization? Attend this webinar to learn how to put an Advanced Analytics approach to optimize consumer lending decision making.…
  • Podcast
    June 1, 2021
    The current and future state of risk analytics is bedrock to empowering the compliance function’s forward-looking agenda. With the evolution of enterprise risks, advancements in analytics, and the ever-morphing regulatory landscape, compliance can be transformed by being further data driven, and monetize the deployment of advanced analytics in empowering intelligent decision-making and risk…
  • Newsletter
    September 8, 2021
    Ransomware attacks have been around for many years. In the past, cyber-threat actors would penetrate a company’s computer and network systems and obtain data with the objective of returning it upon payment. The demanded payments were usually smaller than the ransoms requested in recent incidents. Most of these incidents weren’t financially material, nor were they reported publicly. By contrast,…
  • Newsletter
    March 11, 2021
    Our global survey of C-level executives and directors on macroeconomic, strategic and operational risks highlights their views regarding a disruptive risk landscape over the next decade through 2030.[1] Our global survey captures insights from 1,081 C-level executives and directors across multiple industries, with broad geographic representation. As with our prior surveys, the results captured…
  • Blog
    September 23, 2021
    Earlier in 2021, Protiviti published a blog post titled Taking a Test Drive of SAP Analytics Cloud Report Design. In that blog, we discussed the ability to create paginated reports within the SAP Analytics Cloud (SAC) platform and made the argument for a hybrid approach to data visualization and transactional reporting with SAC and SAP BusinessObjects. While SAC has always been a data…
  • Whitepaper
    April 3, 2020
    As the COVID-19 pandemic continues to disrupt business activity across the globe, organizations are reacting to unexpected challenges and adopting new business practices to align with social distancing, school closures and other public health measures. With this, organizations require a sudden shift to employees working from home, most literally overnight. A modernized collaboration and…
  • Flash Report
    September 30, 2021
    What Happened to Mammoth Bank? Mammoth Bank demonstrated how quantification can be deployed to analyze ransomware risk accurately to acquire critical insights needed to build cyber resilience. Learn more about this fictional entity’s journey below.
Loading...