Results for “Finance Trends Survey”

  • Blog
    March 8, 2021
    One of my favorite things about being in business intelligence consulting is demonstrating toolsets to both existing and potential clients. I can quickly tell what resonates well and what does not. What typically resonates well are features that set the toolset apart from the competition. All competent BI toolsets can build a chart and add key performance indicators and trend lines, etc.  That…
  • Blog
    March 8, 2021
    One of my favorite things about being in business intelligence consulting is demonstrating toolsets to both existing and potential clients. I can quickly tell what resonates well and what does not. What typically resonates well are features that set the toolset apart from the competition. All competent BI toolsets can build a chart and add key performance indicators and trend lines, etc.  That…
  • Blog
    November 19, 2020
    A question receiving heightened attention recently is the quarterly evaluation of deficiencies identified in companies’ Sarbanes-Oxley (SOX) programs. Many organizations are considering whether a formal quarterly control deficiency analysis needs to be performed and documented to the same extent as the annual control deficiency analysis. In this blog, we provide a brief reminder on guidance and…
  • Blog
    February 23, 2017
    If improving brand protection isn’t a top-line agenda item in the cybersecurity discussions happening at the highest levels in your organization, it needs to be. In today’s era of lightning-quick social media sharing, brand protection has become even more important — and far more challenging — for technology, media and communications (TMC) companies. Two factors play a role: Expanding use of…
  • Infographic
    February 23, 2022
    Whether it’s challenges in the supply chain, rising cost of products, raw materials and shipping, disruptive technologies, labor shortages, data breaches, or restrictive government policies, the list of market-changing risks facing the retail and consumer packaged goods industry is long and daunting. These risk issues and more are identified in Protiviti’s latest annual Top Risks Survey, which…
  • Blog
    April 10, 2024
    This blog is an update to an earlier post: Achieve Seamless, Efficient SAP GRC Access Control Operations through Managed Services. As organizations transition to SAP S/4HANA and SAP cloud solutions, they often discover that GRC capabilities and processes also need to be updated on a more frequent basis. One example of a continuously changing dataset is the segregation of duties (SoD) ruleset.…
  • Podcast Transcript
    March 24, 2021
    Protiviti has produced a series of podcasts on GRC programs and technologies in which we obtained perspectives from Protiviti leaders and subject-matter experts around the world on GRC drivers, innovations and challenges in their markets. In this episode, we talked with Ivan Torres, a Director with Protiviti’s Technology Consulting group. Ivan, who is based in Mexico City, offers his views on GRC…
  • Blog
    January 3, 2024
    Artificial intelligence (AI) models—specifically, generative AI (GenAI) models—are becoming increasingly relevant for today’s businesses, yet many questions remain about how such models work and how accurate they are. Consider, for example, the need to expose an AI model to large amounts of data for training. When data may not yet exist or may lack comprehensiveness, synthetic data comes into the…
  • Blog
    May 26, 2021
    This blog is part of Protiviti’s CISO Next Initiative. To learn more, visit us. Emerging from an unprecedented year that presented arduous hurdles to overcome, consumer products and retail companies confront a formidable cluster of unique information security challenges. Overcoming these obstacles requires chief information security officers (CISOs) to do more than ply their technical…
  • Blog
    October 26, 2021
    Traditionally, it has been a conundrum for many CISOs and CIOs working with SAP products on what is truly needed to ensure the security of their data for sensitivity or competitive advantage purposes. Standard Security Information and Event Management (SIEM) monitoring often fails to ensure the security of the SAP system because the specific SAP logs and analyses can’t be interpreted, and,…
Loading...