Results for “Finance Trends Survey” Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog August 23, 2021 How CISOs Prioritize Cybersecurity Spend What drives cybersecurity spend and budget decisions? Too often, the reasoning behind these decisions is reactive in nature, rather than proactive. Often, CISOs see budget increases following a breach at their organization or in response to what is happening to industry peers. While this is not inherently negative, fear should not be the primary driver of security program budgeting and spend… Blog April 1, 2020 Updates, Changes from the California Attorney General to the Proposed Text of CCPA Regulations Since the California Attorney General (AG) released proposed regulations back in October, and our comprehensive blog in February, keeping up with the California Consumer Privacy Act (CCPA) can be a challenge. The proposed regulations have changed twice, with the first proposed modifications in February and the second set about a month later on March 11. Even though enforcement will not begin… Blog June 6, 2022 Finding Equilibrium: Transformative Regulations Create More Hurdles for TMT Companies Whether due to poor data privacy protections, weak cybersecurity controls and oversight, or anticompetitive behavior, the financial and reputational costs for noncompliance with regulations continue to rise, with governments more determined than ever to make violating the law as painful as possible to companies’ bottom lines. This aggressive enforcement approach is particularly acute in the… Blog November 15, 2023 Inclusive Culture Starts with Contract Language This post is the third and final in an occasional series about diversity in cybersecurity. Our first post discussed achieving diversity’s benefits in cybersecurity; the second explored the high cost of gender bias in cybersecurity. Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in… Blog May 10, 2023 Today’s Quantum-Inspired Approaches for ROI Quantum computing will change the world— the industry has rightfully accepted this as fact. However, until it does, we must contend with some limitations in the noisy intermediate scale quantum (NISQ) era machines we have today. Many use cases allow us to show customers how to solve complex business problems with actual NISQ quantum computers. Still, we often must accept that it will be some time… Blog May 16, 2023 Cybersecurity Risk Assessments vs. Gap Assessments: Why Both Matter As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s operations, cybersecurity risks remain top of mind for many organizations. To this end, organizations are continuously seeking to validate their cybersecurity defenses in protecting their assets and mitigating cybersecurity risks. Two important tools that… Blog August 19, 2016 Internal Audit Around the World: Collaboration, Technology and the Female CAE Technology is creating new areas of risk for businesses, requiring a collaborative mindset and strong relationships to manage risk effectively. At the same time, technology is creating new opportunities to improve how internal auditors manage risk – opportunities that come with the same requirements of collaboration and relationship-building. These changes to the internal audit landscape are… Blog February 13, 2019 A Clear and Broad View of Digital Transformation Can Create Long-Term Value for Manufacturing Firms From the back office to the factory floor to e-commerce operations, manufacturing companies have abundant opportunities to enhance their businesses digitally. But with so many options come decision and resource problems. This often results in digital initiatives either stalling after they start or not getting off the ground in time for the business to gain a competitive advantage. Another, and… Blog December 10, 2018 Tips for a Fraud-Free Holiday Season The festive season is a time for fun and good cheer. Your business is celebrating the end of the calendar year and staff are counting down the days before their extended holidays begin. But be warned – the holidays are also a peak season for cybercriminals and fraudsters looking to exploit your vulnerabilities at a time of skeleton staffing and “go slow” activity. Protiviti has found that a… Blog March 28, 2022 Why Consolidated Security Will Help Meet Cyber Challenges Companies face multiple threats as the security landscape continues to evolve. But how can they get to grips with the cyber risks they face and a record number of data breaches? Taken together, all areas of risk and security are essential in modern businesses: from IT and physical systems to cybersecurity and personal protection. But if they aren’t implemented correctly, they all have the… Load More