Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Podcast April 16, 2025 Podcast | Digital Assets and Their Implications for Governance and Strategy – with Frank Kurre and Ann Rodriguez In this Episode, host Frank Kurre welcomes Ann Rodriguez, a seasoned executive who brings extensive leadership experience from Deutsche Bank, GE Capital, Wells Fargo, Wachovia, and Goldman Sachs. Together, they explore the evolving landscape of digital assets and their implications for board governance. Their discussion delves into key elements of effective governance frameworks, emerging risk… In Focus April 29, 2025 Oracle Cloud security: Preventing unauthorised access and data theft Data breaches have increasingly plagued organisations worldwide, underscoring the urgent need for robust security measures. The latest reported incidents involving Oracle have spotlighted the critical importance of protecting customer data. In Focus August 28, 2024 NIST unveils post-quantum cryptography standards. What does it mean? Earlier this month, the National Institute of Standards and Technology (NIST) approved three post-quantum cryptography (PQC) standards that constitute the first significant steps towards protecting critical services from quantum computers being used to break the encryption of sensitive and classified information for both business and government. Survey September 26, 2024 From AI to Cyber - Deconstructing a Complex Technology Risk Landscape Protiviti’s global internal audit survey 2024 highlights the challenges and technology risk trends faced by internal auditors worldwide. Download the report. Newsletter May 3, 2022 Ransomware: Preventing an Attack and Responding to and Recovering From an Attack Ransomware attacks have been around for many years. In the past, cyber-threat actors would penetrate a company’s computer and network systems and obtain data with the objective of returning it upon payment. The demanded payments were usually smaller than the ransoms requested in recent incidents. Most of these incidents weren’t financially material, nor were they reported publicly. By contrast,… Whitepaper December 6, 2022 State of Cloud Adoption in Europe – AFME and Protiviti Paper Preparing the path for Cloud as a critical third-party solution Since the publication of the initial Cloud paper by Protiviti and Association for Financial Markets in Europe (AFME) in November 2019, and our subsequent paper on cloud resilience in 2021, Cloud adoption has continued to increase, with the use of Cloud Service Providers (CSPs) and Cloud technology becoming more integral to the… Podcast July 18, 2022 Podcast | Coding High-Performance, Post-Quantum Secure Blockchain Systems with Geometry Labs and The QRL In coding, libraries make developers’ lives easier, sparing them thousands of lines of code, while also increasing performance and security. And everyone’s concerned with security as fault-tolerant quantum computing approaches. Geometry Labs has released the “lattice-algebra” library to bring a high-performance cryptographic library to developers interested in using post-quantum cryptography in… Blogs March 26, 2021 Thriving post-pandemic: Lessons learned, delivering change, and what’s next In conversation with… Peter Richardson, Protiviti’s UK country market leader, will hand over the reins to technology consulting leader Tom Lemon in April 2021. Following a year like no other, we find out about lessons learned, delivering change, and what’s coming up for both of them in the next 12 months Client Story June 16, 2023 Leading Biotechnology Company Enhances AWS Environment Security and Risk Control A leading biotechnology company that develops life-transforming medicines has worked for decades to improve the lives of those who rely on their work. But recently, they found themselves in need of assistance to enhance the security of their AWS environment. Client Story June 16, 2023 Blockchain/Web3 Startup Blocks Gaps and Improves AWS Security Posture A blockchain/web3 startup engaged Protiviti to review their AWS environment. While getting the product to market as fast as possible was a primary goal for the client, security was an afterthought in many scenarios. To address this need and prevent a potential catastrophic security event, the client wanted a quick and consistent way to understand where their security gaps were and how they could… Load More