Insight Search

Sort by:
  • Podcast Transcript

    March 28, 2023
    The level of uncertainty in today’s global marketplace and the velocity of change continue to produce an array of potential risks that can disrupt an organisation’s business model and strategic plan on very short notice. The results of the latest Top Risks Survey from NC State University’s ERM Initiative and Protiviti indicate the business landscape, to no surprise, looks much riskier for 2023…
  • Whitepaper

    January 29, 2018
    On June 1, 2017, China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Long before the Cybersecurity Law took effect, China had already made some efforts to strengthen information security. For example, a white paper titled The Internet in China, published in 2010, served as an early guide to China’s policy…
  • Flash Report

    March 29, 2023
    The Committee of Sponsoring Organisations of the Treadway Commission (COSO) has released supplemental guidance on how to effectively apply the 2013 Internal Control — Integrated Framework (ICIF) — which is currently applied to financial reporting — to sustainability reporting. The guidance results from a project approved by the COSO board a year ago with the objective of helping organisations “…
  • Whitepaper

    April 27, 2023
    Price transparency compliance continues to elude hospitals two years after its effective date on January 1, 2021. While the Hospital Price Transparency (HPT) rule was met with great debate within the industry, the Centers for Medicare and Medicaid Services (CMS) continues its initiatives for ensuring greater transparency in healthcare. An audit of price transparency can prompt further compliance…
  • Blogs

    April 6, 2023
    Over the last few months, both business and technology worlds alike have been abuzz about ChatGPT, and more than a few leaders are wondering what this AI advancement means for their organisations. Let’s explore ChatGPT, generative AI in general, how leaders might expect the generative AI story to change over the coming months and how businesses can stay prepared for what’s new now – and what may…
  • Blogs

    April 6, 2023
    I am often asked, with all the investments in data management and infrastructure over the last 50 years, why are we still not great with governing data? To put it simply and directly – it’s hard! Data governance programmes are easy to envision conceptually, difficult to implement, and without proper care, impossible to sustain. Often data governance investments have a long ‘time to…
  • Blogs

    April 6, 2023
    DevSecOps is an organisational software engineering culture and practice that aims at unifying software development (Dev), application security (Sec), and operations (Ops). The main characteristic of DevSecOps is to monitor and apply security at all phases of the software lifecycle: Planning, development, integration, delivery, deployment and production. Looking at DevSecOps through an IT…
  • Blogs

    April 6, 2023
    This blog post was authored by Chris Hanson - Director, Danielle Baumann - Senior Manager, Enterprise Application Solutions on The Technology Insights Blog. As more and more retailers build strategies to address supply chain challenges, customer experience and ease of doing business, many have come to the realisation that there may not be a single best solution for their various needs…
  • Whitepaper

    April 4, 2023
    Chief financial officers (CFOs) in the technology sector met to discuss leading industry practices, trends and other topics of mutual interest in a virtual roundtable conducted under the Chatham House Rule. The agenda for this virtual exchange, hosted by Protiviti Managing Directors Gordon Tucker, Christopher Wright and Fran Maxwell, was created through a series of pre-interviews. Comments from…
  • Blogs

    April 6, 2023
    Microsoft Dynamics 365 Finance and Supply Chain Management (D365 F&SCM) publishes security changes with new code releases. These changes are automatically applied to out-of-the-box security roles, duties and privileges when the code is upgraded in a given environment. However, manual migrations between development, test and production environments are required when maintaining a customised…
Loading...