Search results: 252 matching results

2017 Vendor Risk Management Benchmark Survey

Protiviti’s 2017 Vendor Risk Management Benchmark Survey, now in its fourth year, found that a majority of companies pla...
Subscriber Content

How Long Does It Take to Implement a Patch?

A recent breach has raised serious questions about whether boards of directors and senior management are asking the righ...
Subscriber Content

Executive Perspectives on Top Risks for 2018

Critical concerns abound for board members and C-suite executives, according to the sixth annual Executive Perspectives ...
Subscriber Content

SOX Compliance: PCAOB Inspections Drive Change in External Audits

Since the PCAOB began publishing inspection reports on external auditors, Protiviti has been measuring the effect of tho...
Subscriber Content

Top Risks for 2018: Disruptive Innovation, Resistance to Change

This article shares some of the top risks identified in Protiviti and North Carolina State University’s ERM Initiative’s...
Subscriber Content

U.S. Anti-Money Laundering Requirements

This guide summarizes some basic principles of money laundering and terrorist financing, followed by discussions of the ...
Subscriber Content

Top Risks for 2018: Financial Services Industry Group Results

Regulatory pressures continue to be top-of-mind for financial services firms as regulatory change and scrutiny again top...
Subscriber Content

Top Risks for 2018: Healthcare and Life Sciences Industry Group Results

While the acceleration of digital technology and connectivity within healthcare creates a window of opportunity for orga...
Subscriber Content

Digitalization Expands Audit Scope Into New Territory

Organizations across industries are racing to migrate analog approaches to customers, products, services and operating m...
Subscriber Content

Wealth 2022: Wealth and Asset Management Firms Need to Get the Trust Equation Right When Going Digital

This article summarizes some of the key points made at a Protiviti media breakfast in London talking about the impact of...
Subscriber Content

In Vendor Risk Management, Cybersecurity, Data Governance and Broadening the Board’s Perspective Are Key Goals

More than half of respondents to the 2017 Vendor Risk Management Survey said they are extremely likely or somewhat likel...
Subscriber Content

New IT Security Awareness Learning Library Is Designed to Help Workers Become Frontline Cyber Defenders for Their Employers

Employee training can go a long way toward improving an organization’s overall security posture. With that in mind, Prot...
Subscriber Content

The Cyber Risk Oversight Challenge

Every board today faces the challenge of overseeing the investment of finite protection resources in an ever-changing cy...
Subscriber Content

2018 Security Threat Report

Protiviti has compiled and quantified the vulnerability and threat discoveries from more than 500 in-depth security scan...
Subscriber Content

Security Advisory: Hackers Target Remote Email Access

As organizations look for workable ways to accommodate an increasingly mobile work force with remote access to email, ha...
Subscriber Content

Preparing to Face a HIPAA Audit With Confidence

In 2017, the OCR formally implemented an audit program whose subjects include a wide variety of healthcare organizations...
Subscriber Content

Internal Audit’s Role Will Be Key in the GDPR Journey

This article focuses on GDPR’s implication for internal audit specifically. The internal audit function, by virtue of it...
Subscriber Content

An Involved and Agile IT Audit Function Is Key to Cybersecurity

This article lists some questions for you to consider as you seek greater IT audit agility to manage cybersecurity and a...
Subscriber Content

Enterprise Role Management: Strategic Deployment of Role-Based Access Control in Today’s IAM Landscape

A well-governed role-based access control (RBAC) environment provides huge value to the business, simplifies user experi...
Subscriber Content

Cyber Risk Management Is Everyone’s Job, and Compliance Must Play Its Role

Global regulators are going to be looking for an “all lines of defense” approach when they assess an organization’s cybe...
Subscriber Content

Hunting for Hackers: Internal Audit’s Growing Role in Breach Detection

Information technology assets—and the ways criminals exploit them—keep evolving. Monitoring alone isn’t enough. Organiza...
Subscriber Content

Conservas La Costeña: Differentiating a Commodity Business With Supply Chain Automation

La Costeña’s internal audit manager explains in this profile how the company has applied digital technology externally t...
Subscriber Content

Security Advisory: Meltdown and Spectre – Processor Flaws Expose Networks to New Class of Vulnerabilities

In this article, Protiviti’s Andrew Retrum describes two problematic computer hardware vulnerabilities—Meltdown and Spec...
Subscriber Content