Insight Search

Sort by:
  • Podcast

    October 5, 2022
    Using cardinality constraints for portfolio optimization opens the doors to new applications for creating innovative portfolios and exchange-traded-funds (ETFs). All while providing better returns with less market risk.  Host Konstantinos Karagiannis recently co-authored a paper on portfolio optimization with Sam Palmer from Multiverse Computing. Find out how the team was able to outperform…
  • Podcast Transcript

    November 25, 2022
    Using cardinality constraints for portfolio optimisation opens the doors to new applications for creating innovative portfolios and exchange-traded-funds (ETFs). All while providing better returns with less market risk.  Host Konstantinos Karagiannis recently co-authored a paper on portfolio optimisation with Sam Palmer from Multiverse Computing. Find out how the team was able to outperform…
  • Whitepaper

    December 27, 2023
    A Whitepaper on how solutions by stc transformed its Cybersecurity program for a sustainable digital future in partnership with Protiviti Member Firm for the Middle East Region.
  • Client Story

    April 28, 2022
    Web application accessibility is critical to the ongoing success of any digital application. In fact, the Americans with Disabilities Act (ADA) includes digital assets in its definition of “public places of accommodation” that should adhere to accessibility standards. Jamf, a global software company based in Minneapolis, Minn., produces applications to manage Apple devices and services and has a…
  • Whitepaper

    July 10, 2023
    The role of the CIO has changed significantly in recent years. Today, CIOs are key decision-makers in the C-suite and are responsible for driving business strategy. They need to stay on top of new technology trends and use them to develop strategies that keep their businesses competitive. Some of the key areas where CIOs are focusing their attention include: Establishing a single technology…
  • Flash Report

    July 31, 2023
    On 26 July 2023, the U.S. Securities and Exchange Commission (SEC) adopted amendments1 to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing risk to public companies, investors and market…
  • Survey

    March 9, 2023
    As internal audit functions face a continuing talent crunch and demands to support the organisation’s strategic moves in response to external events, chief audit executives (CAEs) are focused on growing internal audit’s relevance with the board, senior executives and other stakeholders. For internal audit functions, elevating their relevance requires ongoing evolution and a committed focus on…
  • Whitepaper

    December 19, 2024
    As we enter the new year, the financial services industry once again faces compliance risks that are increasingly diverse and complex.
  • Podcast Transcript

    February 7, 2023
    Quantum computing requires quantum networking to reach its full potential. But there are engineering challenges to overcome. Learn about how repeaters that extend entanglement between qubits are really just application-specific quantum computers of their own. Also, learn how connecting these devices will pave the way for interconnect and other advances. Join host Konstantinos Karagiannis for a…
  • Whitepaper

    March 11, 2025
    Explore ISMG’s Second Annual Generative AI Study, sponsored by Protiviti. Learn how businesses balance AI innovation with security risks in this comprehensive report
Loading...