Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog October 11, 2021 Data and Analytics Monetization: Data Strategy Is Business Strategy To the uninitiated, monetization of data can sound sketchy, often conjuring up a scenario of reselling customers’ personal information. But opportunities to monetize data extend far beyond selling it to external parties, and into other goals that create new value for businesses. Organizations may one day formally account for their data as balance sheet assets –discussions about that are already… Whitepaper April 29, 2021 Credit Pulse - Spring 2021 THE U.S. FINANCIAL SERVICES INDUSTRY CONFRONTS A NEW ENVIRONMENT In this issue of the Credit Pulse, we provide a look at the credit risk implications of the banking and capital markets oversight environment under the Biden administration, highlight post-stimulus commercial and consumer credit risks, and examine the pressing climate change-related risks affecting financial institutions and their… Whitepaper October 26, 2020 Credit Pulse - October 2020 COVID Shockwaves and Aftereffects In this issue of the Credit Pulse, we provide a U.S. bank supervisory update, spotlight commercial real estate (CRE) risks and shifting consumer payment priorities, and offer suggested actions related to credit risk modeling that financial institution leaders can take. As COVID-19’s shockwaves continue, credit portfolio managers are finding that an advanced… Blog October 19, 2021 Securing Edge Cloud and 5G: How to Do It and Why It Matters The fourth industrial revolution, known as 4IR or Industry 4.0, is in full swing. It focuses heavily on automation, interconnectivity of devices, machine learning and real-time data. The intersection of 5G and edge computing technologies are core components of Industry 4.0 and are expected to reinvent industries, change the way security is implemented and revolutionize business operations.… Leadership Michael Walter Michael Walter is a Managing Director in the Atlanta office of Protiviti, providing clients with Security and Privacy Consulting. Michael has more than 15 years of information security experience in industry and consulting. Michael spent six years at IBM in the Managed Security Services team. Michael then spent two years at Cybertrust in their professional services practice. After that, Michael… Leadership Jeff Conner Jeff is a proven security professional and leader on the cloud security team, specializing in network security, program design and architecture, compliance, secure edge services, and DevSecOps. Jeff has extensive experience leading companies to the next stage of growth and innovation and has worked with a variety of the Fortune 500 within many industries. Leadership Siobhan Moran Siobhan has over 20 years as a cybersecurity professional and 10 years specializing in cloud and emerging technologies. She has worked for many Fortune 500 clients across healthcare and financial services as well as critical infrastructure organisations including energy and the Department of Homeland Security. Leadership Murali Aiyer Murali is a cloud security expert at Protiviti based out of Philadelphia. Murali has 25 years of industry experience in cloud security strategy, architecture and assessments, security risk management, data privacy, security compliance, information protection, and security transformation. Leadership Joseph Burkard Joseph is a strategic results-driven security and risk executive with more than 20 years of experience in information and cybersecurity, security governance, risk management, data protection, and incident response. He has been a Chief Information Security Officer (CISO) in three different industries including benefits administration, legal services, and healthcare manufacturing. Major Projects… Blog October 26, 2021 Understanding the Parallel Worlds of SAP and SIEM Traditionally, it has been a conundrum for many CISOs and CIOs working with SAP products on what is truly needed to ensure the security of their data for sensitivity or competitive advantage purposes. Standard Security Information and Event Management (SIEM) monitoring often fails to ensure the security of the SAP system because the specific SAP logs and analyses can’t be interpreted, and,… Load More