Insight Search

Sort by:
  • Survey

    March 11, 2025
    Disruptive change is happening, and more is coming. Is your organisation ready to seize the moment? Our results, based on a global survey of more than 1,800 board members and C-suite executives, reveal that organisations globally and in Australia that consider themselves to be disruptive leaders see opportunities in a changing business landscape and operate differently compared to organisations…
  • Blogs

    May 17, 2024
    An SAP S/4HANA transformation project has many risks that need to be managed and often, it is difficult for the project team operating day to day on detailed tasks to “see the forest for the trees.” The PMO has intimate knowledge of the key processes and risks associated with the project and, as such, is in an ideal position to develop mitigation strategies in collaboration with the system…
  • Survey

    April 17, 2025
    According to findings from Protiviti’s latest Top Risks survey, executives and board members from PE firms and their portfolio companies are facing several complex and interconnected risks — operational, macroeconomic and strategic — that could derail their value-creation efforts. In addition to economic-related worries, cyber threats rank as a top risk issue for this industry group, and with…
  • Blogs

    July 31, 2023
    For security teams looking to implement and design smart contracts, there are many intricacies and nuances that can be overwhelming. Using established standards for the secure development of smart contracts/decentralised applications (dApps) is instrumental to effectively launch smart contracts. In an earlier blog, I introduced the basics of smart contracts; today, I’m diving into existing…
  • Flash Report

    June 3, 2022
    Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and…
  • Video

    December 21, 2024
    In this episode, host Chad Volkert, Global Solutions leader at Protiviti, is joined by Frank Serge, managing vice president of legal consulting at Protiviti. With over 20 years of industry experience and more than a decade at Protiviti and Robert Half, Frank brings extensive knowledge in legal technology, e-discovery and contract-lifecycle management (CLM). This discussion highlights the growing…
  • Blogs

    May 17, 2024
    Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in responses. Over the past several years, more and more potential customers are seeking cybersecurity partners whose values in the areas of diversity, equity and inclusion (DEI) correspond with their own. Sometimes, enterprises will…
  • Whitepaper

    May 10, 2024
    Any predictions made before 2020 about the future of work have changed with COVID-19, inflation and social movements of the past two years. The workforce of 2030 looks very different than once expected. Prior to 2020, the U.S. labor force included five generations working side by side for the first time in history. Attracting, engaging and retaining a multigenerational workforce was a top…
  • Blogs

    February 23, 2024
    In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of the most challenging and often overlooked threats is the dark web, an intentionally hidden part of the internet where threat actors can operate with a greater sense of anonymity. To adequately protect assets, companies need to do more than merely…
  • Blogs

    January 31, 2024
    Segregation of duties (SoD) is a well-known term among auditors and anyone who has ever been audited. SoD is the understanding that no user should have access to two conflicting business functions that would allow a user to commit fraud or error (e.g., the ability to create a vendor record, then process a payment to that vendor). The idea can be intimidating and overwhelming to those who do not…
Loading...