Results for

Sort by:
  • Blog
    November 3, 2017
    In our latest podcast, Adam Hamm outlines 3 things to pay attention to in getting ready for the New York Department of Financial Services regulation known as Part 500, and Steven Stachowicz explains the reasoning behind some recent actions by the CFPB. Listen at the link below. Download the printable October issue of Compliance Insights here. [audio mp3="http://blog.protiviti.com/wp-content/…
  • Blog
    November 6, 2017
    Hurricane Harvey dumped over 51 inches of rain — or about 27 trillion gallons of water — on Texas and Louisiana last summer, more than four times the amount Louisiana and Mississippi received from Hurricane Katrina in 2005. Harvey caused catastrophic flooding, displaced tens of thousands of people and caused over US$180 billion in damage. It also provided a real-time test of business continuity…
  • Blog
    December 20, 2017
    Many manufacturers see “servitization” — the process of moving from a product-centric business model to a bundled product-and-service one — as an inevitable future shift for their organization. What they often have difficulty visualizing, though, is when and how to make that move, and how long they may need to wait before they see a return on their investment from this new strategy. The latter…
  • Blog
    December 22, 2017
    Having had a year to digest the aftermath of the U.S. election-driven economic, global trade, regulatory and other jitters that may have skewed the global risk outlook for 2017, executive perspectives on the top risks for 2018 have refocused on technology-driven change, and how well organizations are prepared to manage that transformation. Earlier this month, Protiviti and North Carolina State…
  • Blog
    January 8, 2018
    In Protiviti's Procurement Survey, conducted in the first quarter of last year, two findings stood out: Half of finance function respondents reported that only 20 percent of the savings procurement claims to achieve fall to the bottom line, and Only one-third of respondents, from both finance and procurement, agreed that there was a collaborative relationship between the two functions.…
  • Blog
    January 9, 2018
    Security researchers have identified a flaw, present in most computer processors, that allows unauthorized disclosure of information. The flaw, which affects most major processor manufacturers, is the first known instance of a security vulnerability at the processor level, and could be exploited in servers, workstations (including laptops), network infrastructure, mobile devices, IoT devices and…
  • Blog
    January 12, 2018
    The explosion in the use of digital channels and the data they produce have caused a corresponding rise in the use of data analytics by the risk management and internal audit functions within financial services firms seeking to streamline their processes to gain efficiency and adopt a more agile approach to risk management. The internal audit function has been using data analytics for some time…
  • Blog
    January 19, 2018
    At the end of last year, Protiviti conducted a webinar, Deriving Value from the Updated COSO ERM Framework. I had the pleasure of hosting the webinar, along with my colleagues: Dolores Atallo, a Managing Director in the Risk and Compliance practice, Jim DeLoach, Managing Director and member of the COSO Advisory Council (and host of this blog), and Bob Hirth, Senior Managing Director and COSO…
  • Blog
    January 24, 2018
    Amid growing pressure to meet or surpass the speed of disruptive innovation, executives and directors of technology, media and communications (TMC) companies worry that their organizations’ desire to innovate may outrun their ability to properly manage risks. This culture concern and a deepening fear of obsolescence were key takeaways for the TMC industry group responses in a recent survey,…
  • Blog
    January 25, 2018
    For as long as Business Intelligence (BI) has existed, organizations have made significant investments in high-performing platforms – only to find no one will use the solution. Why? For one, end users cannot find information quickly, or at all. Two, the information they do find isn’t relevant. Three, they expect their BI systems to work as effortlessly as popular search engines and social media,…
Loading...