Results for “Finance Trends Survey”

  • Blog
    August 23, 2021
    What drives cybersecurity spend and budget decisions? Too often, the reasoning behind these decisions is reactive in nature, rather than proactive. Often, CISOs see budget increases following a breach at their organization or in response to what is happening to industry peers. While this is not inherently negative, fear should not be the primary driver of security program budgeting and spend…
  • Blog
    April 1, 2020
    Since the California Attorney General (AG) released proposed regulations back in October, and our comprehensive blog in February, keeping up with the California Consumer Privacy Act (CCPA) can be a challenge.  The proposed regulations have changed twice, with the first proposed modifications in February and the second set about a month later on March 11. Even though enforcement will not begin…
  • Blog
    June 6, 2022
    Whether due to poor data privacy protections, weak cybersecurity controls and oversight, or anticompetitive behavior, the financial and reputational costs for noncompliance with regulations continue to rise, with governments more determined than ever to make violating the law as painful as possible to companies’ bottom lines. This aggressive enforcement approach is particularly acute in the…
  • Blog
    November 15, 2023
    This post is the third and final in an occasional series about diversity in cybersecurity. Our first post discussed achieving diversity’s benefits in cybersecurity; the second explored the high cost of gender bias in cybersecurity. Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in…
  • Blog
    May 10, 2023
    Quantum computing will change the world— the industry has rightfully accepted this as fact. However, until it does, we must contend with some limitations in the noisy intermediate scale quantum (NISQ) era machines we have today. Many use cases allow us to show customers how to solve complex business problems with actual NISQ quantum computers. Still, we often must accept that it will be some time…
  • Blog
    May 16, 2023
    As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s operations, cybersecurity risks remain top of mind for many organizations. To this end, organizations are continuously seeking to validate their cybersecurity defenses in protecting their assets and mitigating cybersecurity risks. Two important tools that…
  • Blog
    August 19, 2016
    Technology is creating new areas of risk for businesses, requiring a collaborative mindset and strong relationships to manage risk effectively. At the same time, technology is creating new opportunities to improve how internal auditors manage risk – opportunities that come with the same requirements of collaboration and relationship-building. These changes to the internal audit landscape are…
  • Blog
    February 13, 2019
    From the back office to the factory floor to e-commerce operations, manufacturing companies have abundant opportunities to enhance their businesses digitally. But with so many options come decision and resource problems. This often results in digital initiatives either stalling after they start or not getting off the ground in time for the business to gain a competitive advantage. Another, and…
  • Blog
    December 10, 2018
    The festive season is a time for fun and good cheer. Your business is celebrating the end of the calendar year and staff are counting down the days before their extended holidays begin. But be warned – the holidays are also a peak season for cybercriminals and fraudsters looking to exploit your vulnerabilities at a time of skeleton staffing and “go slow” activity. Protiviti has found that a…
  • Blog
    March 28, 2022
    Companies face multiple threats as the security landscape continues to evolve. But how can they get to grips with the cyber risks they face and a record number of data breaches? Taken together, all areas of risk and security are essential in modern businesses: from IT and physical systems to cybersecurity and personal protection. But if they aren’t implemented correctly, they all have the…
Loading...