Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog April 15, 2019 SAP Cloud Identity Access Governance: What’s Going On at SAPinsider The 2019 GRC, BI/Analytics and Finance SAPinsider Conferences took place in mid-March in Las Vegas. Our SAP teams spent time attending conference sessions, and their observations on what’s trending across the industry are compiled here in the first of a post-conference series. During the 2019 conference, I talked with a number of customers who were unsure how SAP Cloud Identity Access… Blog April 17, 2019 The Digital Enterprise Requires GRC 12 – Why it’s Time to Upgrade According to the recent survey conducted by North Carolina State University’s ERM Initiative and Protiviti (2019 Executive Perspectives on Top Risks), C-suite executives and board members continue to view cyberthreats as a top risk behind the risks of competing against “born digital” firms, retaining top talent, and regulatory changes. Additionally, these leaders continue to view identity… Blog April 24, 2019 Two Far-Reaching CCPA Amendments You Should Know About Two proposed amendments to the California Consumer Privacy Act (CCPA) are sure to generate mixed reactions if either passes. The first would expand individual consumer rights while the second modifies the definition of “consumer” to exclude California employees as consumers under a separate amendment, if passed. The CCPA will affect any business collecting or storing data about California… Blog May 2, 2019 Update on 2019 Privacy Legislation As legislative sessions came to a close around the United States late last month, a number of proposed state laws around privacy currently in flight failed to move out of their house of origination in Nevada, New York, New Mexico and Hawaii. This effectively ends their entry into the 2019 legislative session, with just a miniscule chance for being reintroduced by mechanical measures such as a… Blog May 20, 2019 Designing Oracle Cloud Job Role Security for Optimization and Compliance It’s no secret that Oracle Cloud is quickly making its mark on the cloud application landscape. Over the last several years, Oracle’s cloud footprint has expanded tremendously. In doing so, more and more companies are beginning to understand the complexities of Oracle Cloud application security and how it can either help or hinder compliance goals. For many organizations, risks related to… Blog June 6, 2019 CCPA Legislation Updates; Now’s the Time to Consider its Impact to Your Organization The California Consumer Privacy Act (CCPA) continues to be a work in progress. For bills to advance, they must go through the full Assembly, the California Senate and the California governor to be enacted as law. As the CCPA works its way through the legislative process, lawmakers in California continue to mull over the proposed amendments to clarify the legislation, limit its scope and… Blog June 14, 2019 Cloud Security in Financial Services – Are you Cloud First or Cloud Averse? More and more financial services firms are saying they are cloud first, but they are really cloud averse and it’s understandable. When we ask firms how they are embracing “digital transformation,” and the impact associated with fundamental digital change, most business owners proclaim they are transforming or evolving into digital. However, there is a disconnect between the business and support… Blog July 1, 2019 Will the CCPA Drive More Class Action Suits? Readiness is the Best Remedy The California Consumer Privacy Act (CCPA), as written, allows consumers to have a private right of action when their non-encrypted and nonredacted information is stolen (see Section 1798.150). What is one of the best ways to avoid litigation? Readiness. According to a recent survey from the Carlton Fields Class Action Survey of corporate general counsel and senior legal officers, the next wave… Blog July 16, 2019 Top Security Pitfalls for Medical Devices at Healthcare Providers Today, medical devices are used throughout the world for the diagnosis and ongoing treatment of medical conditions. Technology advances and medical treatment innovations have led to many of these devices becoming more connected (and interconnected) to healthcare provider networks via various mechanisms. This is achievable through both wired and wireless information communication vehicles and… Blog August 31, 2021 Future of Transaction Monitoring: Chasing the Holy Grail The current and future state of suspicious activity monitoring and reporting is being transformed by technology and the use of data, analytics and robotics. In the latest episode of Protiviti's Risk Transformation podcast series, Mark Highton, Managing Director leading Protiviti’s Financial Crimes Consulting practice, interviews Vishal Ranjane, Head of Global AML Strategies, Solutions and… Load More