Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Podcast Transcript September 4, 2023 Transcript | The future of insurance asset protection in the metaverse What will insurance look like in the metaverse future? To help sort it all, the VISION by Protiviti podcast welcomes a panel of Protiviti insurance experts, including managing directors Shawn Seasongood and Tom Luick, as well as director Jackie Simmons. Alex Weishaupl, a managing director with Protiviti Digital practice, leads this important discussion. Blogs April 21, 2023 Adopting Emerging Technologies When Modernising Legacy Systems Some of the toughest conversations CIOs will have within their organisations are likely to be about the benefits of adopting every emerging technology that’s caught business leaders’ attention versus the potential investments to be made in transforming legacy systems. As companies across all industries look to accelerate efforts to achieve their business transformation goals, a considerable… Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Infographic December 21, 2023 5G Unleashed for Industry Transformation Unlocking the full potential of 5G technology requires understanding of the diverse real-world applications it offers across various industries. Organisations can harness this revolutionary technology to drive innovation, enhance their services, and seize new business opportunities. By exploring use cases across industries, leaders can gain insights into how to best cater to the unique needs of… Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Research Guide May 2, 2022 The Guide to Technology Modernisation and Transformation Helping Leaders with their Technology Journey Key Considerations for Technology Modernisation and Transformation CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. This guide contains informative insights and practical tips that CIOs, CISOs, and other technology and C-suite… Blogs July 31, 2023 Simple is secure: Streamlining smart contract design For security teams looking to implement and design smart contracts, there are many intricacies and nuances that can be overwhelming. Using established standards for the secure development of smart contracts/decentralised applications (dApps) is instrumental to effectively launch smart contracts. In an earlier blog, I introduced the basics of smart contracts; today, I’m diving into existing… Newsletter December 9, 2022 Setting the 2023 Audit Committee Agenda As in prior years, our suggested 2023 audit committee agenda includes important enterprise, process and technology issues and financial reporting and disclosure issues. In addition to discussing these agenda items, we have offered questions for audit committees to consider when self-assessing their own performance with respect to executing the normal ongoing activities articulated in the… Flash Report November 16, 2023 ASIC’s cyber security survey: Key takeaways and quick wins The results from the recent ASIC cyber security survey, ‘REP 776 Spotlight on cyber: Findings and insights from the cyber pulse survey 2023,’ released on 13 November 2023, have once again highlighted the security posture of corporate Australia’s management of cyber security. While there were some encouraging trends in specific security capabilities around identity and access management,… Blogs November 29, 2022 Data Governance Shapes Enterprise Transformation In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s… Load More