2017 Vendor Risk Management Benchmark Survey
Protiviti’s 2017 Vendor Risk Management Benchmark Survey, now in its fourth year, found that a majority of companies pla...
Subscriber Content
How Long Does It Take to Implement a Patch?
A recent breach has raised serious questions about whether boards of directors and senior management are asking the righ...
Subscriber Content
Executive Perspectives on Top Risks for 2018
Critical concerns abound for board members and C-suite executives, according to the sixth annual Executive Perspectives ...
Subscriber Content
SOX Compliance: PCAOB Inspections Drive Change in External Audits
Since the PCAOB began publishing inspection reports on external auditors, Protiviti has been measuring the effect of tho...
Subscriber Content
U.S. Anti-Money Laundering Requirements
This guide summarizes some basic principles of money laundering and terrorist financing, followed by discussions of the ...
Subscriber Content
Top Risks for 2018: Financial Services Industry Group Results
Regulatory pressures continue to be top-of-mind for financial services firms as regulatory change and scrutiny again top...
Subscriber Content
Retailers, Tech Firms and Financial Services Providers: It’s Time to Shape the Future of Mobile Payments—Are You Ready?
This article summarizes the obstacles that have impeded the growth of the mobile payment industry, as well as strong tre...
Subscriber Content
The Top Global Risks for 2018
This issue of Board Perspectives: Risk Oversight provides a context for understanding the most critical uncertainties co...
Subscriber Content
GDPR: Strict New EU Data Privacy Rules Have Global Reach
The new GDPR law, scheduled to become effective May 25, 2018, introduces strict rules for the protection of the personal...
Subscriber Content
Top Risks for 2018: Healthcare and Life Sciences Industry Group Results
While the acceleration of digital technology and connectivity within healthcare creates a window of opportunity for orga...
Subscriber Content
2018 Audit Committee Agenda: Assessing Committee Effectiveness and Obtaining Business Context
This article covers the first two of eight recommendations Protiviti has for the 2018 audit committee agenda: periodic a...
Subscriber Content
Wealth 2022: Wealth and Asset Management Firms Need to Get the Trust Equation Right When Going Digital
This article summarizes some of the key points made at a Protiviti media breakfast in London talking about the impact of...
Subscriber Content
In Vendor Risk Management, Cybersecurity, Data Governance and Broadening the Board’s Perspective Are Key Goals
More than half of respondents to the 2017 Vendor Risk Management Survey said they are extremely likely or somewhat likel...
Subscriber Content
New IT Security Awareness Learning Library Is Designed to Help Workers Become Frontline Cyber Defenders for Their Employers
Employee training can go a long way toward improving an organization’s overall security posture. With that in mind, Prot...
Subscriber Content
The Cyber Risk Oversight Challenge
Every board today faces the challenge of overseeing the investment of finite protection resources in an ever-changing cy...
Subscriber Content
2018 Security Threat Report
Protiviti has compiled and quantified the vulnerability and threat discoveries from more than 500 in-depth security scan...
Subscriber Content
Security Advisory: Hackers Target Remote Email Access
As organizations look for workable ways to accommodate an increasingly mobile work force with remote access to email, ha...
Subscriber Content
Preparing to Face a HIPAA Audit With Confidence
In 2017, the OCR formally implemented an audit program whose subjects include a wide variety of healthcare organizations...
Subscriber Content
Internal Audit’s Role Will Be Key in the GDPR Journey
This article focuses on GDPR’s implication for internal audit specifically. The internal audit function, by virtue of it...
Subscriber Content
Saving Analytical Data Without Violating GDPR – Part 1: Data Minimization and Masking
There are several possible strategies for reducing the impact of GDPR on a company’s analytical data. The best methods a...
Subscriber Content
Hunting for Hackers: Internal Audit’s Growing Role in Breach Detection
Information technology assets—and the ways criminals exploit them—keep evolving. Monitoring alone isn’t enough. Organiza...
Subscriber Content
Obtain Greater Clarity Into Identity and Access Management by Establishing and Tracking Metrics
Identity and access management (IAM) has become a critical area of focus in security discussions within all organization...
Subscriber Content
Saving Analytical Data Without Violating GDPR – Part 2: Aggregation and Anonymization
The best methods for reducing the impact of GDPR on a company’s analytical data are those that can be implemented with a...
Subscriber Content
Conservas La Costeña: Differentiating a Commodity Business With Supply Chain Automation
La Costeña’s internal audit manager explains in this profile how the company has applied digital technology externally t...
Subscriber Content