Flash Report April 11, 2024 The American Privacy Rights Act of 2024: Could this framework become the data privacy panacea? On April 8, 2024, U.S. Representative Cathy McMorris Rodgers (R-WA) and U.S. Senator Maria Cantwell (D-WA) announced the American Privacy Rights Act. This act aims to establish a comprehensive set of rules that govern the usage of citizens' data. The bipartisan draft legislation seeks to create a national standard for data privacy and security, addressing the... Read more Featured Insights SURVEY April 4, 2024 CIOs and CTOs See Skills, Staffing and Talent as Top Risk Concerns Businesses today face a myriad of challenges as they work to adapt and transform their operational models in order to overcome future obstacles,... INSIGHTS PAPER March 20, 2024 Mastering Data Dilemmas: Navigating Privacy, Localisation and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape... FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... INSIGHTS PAPER January 8, 2024 How data sovereignty and data localisation impact your privacy programs The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad... Button Button SURVEY April 4, 2024 CIOs and CTOs See Skills, Staffing and Talent as Top Risk Concerns Businesses today face a myriad of challenges as they work to adapt and transform their operational models in order to overcome future obstacles,... INSIGHTS PAPER March 20, 2024 Mastering Data Dilemmas: Navigating Privacy, Localisation and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape... FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... INSIGHTS PAPER January 8, 2024 How data sovereignty and data localisation impact your privacy programs The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad... Managed Security Services BLOG April 5, 2024 New SEC Cybersecurity Disclosure Rules: Key Takeaways From Companies’ Responses While the ink is still drying on many 2023 Form 10-Ks, Protiviti has reviewed a subset of the filings to gauge how firms are responding to the U.S.... BLOG August 23, 2023 How Offloading Vulnerability Management Enhances Security The obstacles cybersecurity organizations face may often seem insurmountable. From dealing with a competitive labor market, to the rapid pace at which... BLOG June 7, 2023 A Guide to Pen Testing and Red Teaming: What to Know Now Penetration testing and red teaming are essential cybersecurity practices that bolster an organization's security posture by uncovering... BLOG March 7, 2023 Common Frameworks for Maturing Security Programs Every cybersecurity organization, through its program maturity journey, grapples with the challenge of choosing and aligning with a security framework... Button Button BLOG April 5, 2024 New SEC Cybersecurity Disclosure Rules: Key Takeaways From Companies’ Responses While the ink is still drying on many 2023 Form 10-Ks, Protiviti has reviewed a subset of the filings to gauge how firms are responding to the U.S.... BLOG August 23, 2023 How Offloading Vulnerability Management Enhances Security The obstacles cybersecurity organizations face may often seem insurmountable. From dealing with a competitive labor market, to the rapid pace at which... BLOG June 7, 2023 A Guide to Pen Testing and Red Teaming: What to Know Now Penetration testing and red teaming are essential cybersecurity practices that bolster an organization's security posture by uncovering... BLOG March 7, 2023 Common Frameworks for Maturing Security Programs Every cybersecurity organization, through its program maturity journey, grapples with the challenge of choosing and aligning with a security framework... Data Protection BLOG April 30, 2024 Building a Better Mousetrap for Telco Fraud Detection Begins with Data Monetization, Strong Analytics Over the last three years, the telecommunications industry has experienced a significant rise in fraud incidents. In recent months, a major wireless... BLOG April 9, 2024 Securing Large Language Models: Unique Challenges and Rethinking Traditional Security Approaches Large Language Models (LLMs) are computational systems that process and generate text by learning from vast datasets. These advanced models, which can... BLOG March 27, 2024 Protecting Controlled Unclassified Information Across Data Ecosystems Companies that work with the Department of Defense (DoD) know that it is critical to store data properly and are constantly on guard against... BLOG February 14, 2024 AI Is a Double-Edged Sword of Business Opportunity and Cybersecurity Risk for E&U Industry The challenge: Companies in the energy and utilities (E&U) industry are moving fast to adopt artificial intelligence (AI), including generative AI... Button Button BLOG April 30, 2024 Building a Better Mousetrap for Telco Fraud Detection Begins with Data Monetization, Strong Analytics Over the last three years, the telecommunications industry has experienced a significant rise in fraud incidents. In recent months, a major wireless... BLOG April 9, 2024 Securing Large Language Models: Unique Challenges and Rethinking Traditional Security Approaches Large Language Models (LLMs) are computational systems that process and generate text by learning from vast datasets. These advanced models, which can... BLOG March 27, 2024 Protecting Controlled Unclassified Information Across Data Ecosystems Companies that work with the Department of Defense (DoD) know that it is critical to store data properly and are constantly on guard against... BLOG February 14, 2024 AI Is a Double-Edged Sword of Business Opportunity and Cybersecurity Risk for E&U Industry The challenge: Companies in the energy and utilities (E&U) industry are moving fast to adopt artificial intelligence (AI), including generative AI... Security Resilience BLOG January 10, 2024 Developing a Security Function During a CISO’s First 100 Days These turbulent times of evolving threats and rising personal responsibility considerations for cybersecurity leaders make the CISO role a challenging... BLOG January 4, 2024 Building Technology Resilience: Aspects and Actions This is the second in a two- part series exploring the benefits of technology resilience , its aspects and the steps involved to implement a... BLOG December 12, 2023 Why Care about Technology Risks and Building Resilience? This is the first post in a two-part series exploring the benefits of technology resilience. It defines technology resilience and describes its value... FLASH REPORT November 3, 2023 Are SEC Charges Against SolarWinds and Its CISO Signaling a New Era of Personal Accountability? In this Flash Report, we summarize the SEC’s allegations against SolarWinds and offer nine points for executives and functional leaders with SEC... Button Button BLOG January 10, 2024 Developing a Security Function During a CISO’s First 100 Days These turbulent times of evolving threats and rising personal responsibility considerations for cybersecurity leaders make the CISO role a challenging... BLOG January 4, 2024 Building Technology Resilience: Aspects and Actions This is the second in a two- part series exploring the benefits of technology resilience , its aspects and the steps involved to implement a... BLOG December 12, 2023 Why Care about Technology Risks and Building Resilience? This is the first post in a two-part series exploring the benefits of technology resilience. It defines technology resilience and describes its value... FLASH REPORT November 3, 2023 Are SEC Charges Against SolarWinds and Its CISO Signaling a New Era of Personal Accountability? In this Flash Report, we summarize the SEC’s allegations against SolarWinds and offer nine points for executives and functional leaders with SEC... Security Architecture BLOG February 28, 2024 Strengthening Security Against AI-Powered Attacks Generative AI (GenAI) technologies, such as ChatGPT, have demonstrated substantial advantages across multiple industries, including the field of... BLOG February 7, 2024 IAM in Operational Technology: How and Where to Make it Work By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now... BLOG October 3, 2023 Emerging Trends in IAM Part 4: Going Passwordless with the FIDO Use Case The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their... BLOG May 16, 2023 Cybersecurity Risk Assessments vs. Gap Assessments: Why Both Matter As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s... Button Button BLOG February 28, 2024 Strengthening Security Against AI-Powered Attacks Generative AI (GenAI) technologies, such as ChatGPT, have demonstrated substantial advantages across multiple industries, including the field of... BLOG February 7, 2024 IAM in Operational Technology: How and Where to Make it Work By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now... BLOG October 3, 2023 Emerging Trends in IAM Part 4: Going Passwordless with the FIDO Use Case The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their... BLOG May 16, 2023 Cybersecurity Risk Assessments vs. Gap Assessments: Why Both Matter As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s... Content Collections Technology Industry Collection A curated collection of topics, trends and insights to help technology, media and telecom (TMT) industry organisations face today's challenges and opportunities. For any critical point in a company's growth, explore Protiviti's insights and solutions. Our team will enable your business with a comprehensive... Read More Board and C-Suite Leadership Collection Explore challenges and areas of interest for boards of directors around the world. From environmental, social and governance (ESG) matters to fulfilling the board’s vital risk oversight mandate, this collection provides practical insights and guidance for new and experienced board members alike. Learn More Audit & Risk Management Collection Protiviti leaders and subject-matter experts from around the world provide insights on key issues facing organisations in our dynamic, challenging and competitive global business climate. Our world-class internal audit and risk assessment experience provides a wealth of information and data to help you meet future challenges.... Read More