Search results: 204 matching results

2017 Vendor Risk Management Benchmark Survey

Protiviti’s 2017 Vendor Risk Management Benchmark Survey, now in its fourth year, found that a majority of companies pla...
Subscriber Content

How Long Does It Take to Implement a Patch?

A recent breach has raised serious questions about whether boards of directors and senior management are asking the righ...
Subscriber Content

Executive Perspectives on Top Risks for 2018

Critical concerns abound for board members and C-suite executives, according to the sixth annual Executive Perspectives ...
Subscriber Content

SOX Compliance: PCAOB Inspections Drive Change in External Audits

Since the PCAOB began publishing inspection reports on external auditors, Protiviti has been measuring the effect of tho...
Subscriber Content

U.S. Anti-Money Laundering Requirements

This guide summarizes some basic principles of money laundering and terrorist financing, followed by discussions of the ...
Subscriber Content

Top Risks for 2018: Financial Services Industry Group Results

Regulatory pressures continue to be top-of-mind for financial services firms as regulatory change and scrutiny again top...
Subscriber Content

The Top Global Risks for 2018

This issue of Board Perspectives: Risk Oversight provides a context for understanding the most critical uncertainties co...
Subscriber Content

GDPR: Strict New EU Data Privacy Rules Have Global Reach

The new GDPR law, scheduled to become effective May 25, 2018, introduces strict rules for the protection of the personal...
Subscriber Content

Top Risks for 2018: Healthcare and Life Sciences Industry Group Results

While the acceleration of digital technology and connectivity within healthcare creates a window of opportunity for orga...
Subscriber Content

Wealth 2022: Wealth and Asset Management Firms Need to Get the Trust Equation Right When Going Digital

This article summarizes some of the key points made at a Protiviti media breakfast in London talking about the impact of...
Subscriber Content

In Vendor Risk Management, Cybersecurity, Data Governance and Broadening the Board’s Perspective Are Key Goals

More than half of respondents to the 2017 Vendor Risk Management Survey said they are extremely likely or somewhat likel...
Subscriber Content

New IT Security Awareness Learning Library Is Designed to Help Workers Become Frontline Cyber Defenders for Their Employers

Employee training can go a long way toward improving an organization’s overall security posture. With that in mind, Prot...
Subscriber Content

The Cyber Risk Oversight Challenge

Every board today faces the challenge of overseeing the investment of finite protection resources in an ever-changing cy...
Subscriber Content

2018 Security Threat Report

Protiviti has compiled and quantified the vulnerability and threat discoveries from more than 500 in-depth security scan...
Subscriber Content

Security Advisory: Hackers Target Remote Email Access

As organizations look for workable ways to accommodate an increasingly mobile work force with remote access to email, ha...
Subscriber Content

Preparing to Face a HIPAA Audit With Confidence

In 2017, the OCR formally implemented an audit program whose subjects include a wide variety of healthcare organizations...
Subscriber Content

Internal Audit’s Role Will Be Key in the GDPR Journey

This article focuses on GDPR’s implication for internal audit specifically. The internal audit function, by virtue of it...
Subscriber Content

Saving Analytical Data Without Violating GDPR – Part 1: Data Minimization and Masking

There are several possible strategies for reducing the impact of GDPR on a company’s analytical data. The best methods a...
Subscriber Content

Hunting for Hackers: Internal Audit’s Growing Role in Breach Detection

Information technology assets—and the ways criminals exploit them—keep evolving. Monitoring alone isn’t enough. Organiza...
Subscriber Content

Obtain Greater Clarity Into Identity and Access Management by Establishing and Tracking Metrics

Identity and access management (IAM) has become a critical area of focus in security discussions within all organization...
Subscriber Content

Saving Analytical Data Without Violating GDPR – Part 2: Aggregation and Anonymization

The best methods for reducing the impact of GDPR on a company’s analytical data are those that can be implemented with a...
Subscriber Content

Conservas La Costeña: Differentiating a Commodity Business With Supply Chain Automation

La Costeña’s internal audit manager explains in this profile how the company has applied digital technology externally t...
Subscriber Content