Cybersecurity Collection Cyber-Resilienz ist die Fähigkeit einer Organisation, Störungen der Cybersicherheit zu erkennen, zu verhindern, darauf zu reagieren, Cybersicherheit wiederherzustellen und daraus zu lernen. Unsere Cybersecurity-Sammlung thematisiert häufige Fälle, Trends sowie die Maßnahmen, die Unternehmen ergreifen müssen, um proaktive und reaktive Lösungen zu entwickeln und ihre Vermögenswerte zu schützen. Whitepaper November 26, 2024 Network and information security directive 2 (NIS2) The European Commission has revised the NIS Directive, expanding its scope to include numerous new sectors. This revision aims to enhance cybersecurity across the entire European region by unifying national laws with common minimum requirements. For many companies located within European Union (EU) Member States, as well as non-EU organisations that provide services... Read more Featured Insights IN FOCUS April 29, 2025 Oracle Cloud security: Preventing unauthorised access and data theft Data breaches have increasingly plagued organisations worldwide, underscoring the urgent need for robust security measures. The latest reported... SURVEY February 13, 2025 2025 Report on Top Risks Read Protiviti's Top Risks Report 2025 covering executives' views on emerging risks related to AI, cyber threats, talent management, and economic... INSIGHTS PAPER November 8, 2024 Die Auswirkungen des EU-KI-Gesetzes verstehen: Eine Einführung für Finanzinstitute Navigieren Sie durch die Auswirkungen des EU-KI-Gesetzes auf die Finanzwelt mit unserem strategischen Leitfaden zur Einhaltung von Vorschriften und... VISION October 21, 2024 Protiviti-Oxford survey shows ‘us vs. them’ disconnect in how global execs view data privacy 86% of executives say they are confident or extremely confident their company is doing everything it possibly can to protect customer data. ... Previous Article Pagination Next Article IN FOCUS April 29, 2025 Oracle Cloud security: Preventing unauthorised access and data theft Data breaches have increasingly plagued organisations worldwide, underscoring the urgent need for robust security measures. The latest reported... SURVEY February 13, 2025 2025 Report on Top Risks Read Protiviti's Top Risks Report 2025 covering executives' views on emerging risks related to AI, cyber threats, talent management, and economic... INSIGHTS PAPER November 8, 2024 Die Auswirkungen des EU-KI-Gesetzes verstehen: Eine Einführung für Finanzinstitute Navigieren Sie durch die Auswirkungen des EU-KI-Gesetzes auf die Finanzwelt mit unserem strategischen Leitfaden zur Einhaltung von Vorschriften und... VISION October 21, 2024 Protiviti-Oxford survey shows ‘us vs. them’ disconnect in how global execs view data privacy 86% of executives say they are confident or extremely confident their company is doing everything it possibly can to protect customer data. ... Data Privacy & Protection VISION March 6, 2025 Robert Half execs: Our focus on data security and privacy creates competitive advantage With the ubiquitous nature of privacy laws and the introduction of AI and its direct impact on business operations, the CPO must be aware of all... BLOG January 23, 2025 Long-Awaited HIPAA Security Rule Revamp Formally Proposed with Significant Changes The U.S. Department of Health and Human Services (HHS) published a Notice of Proposed Rule Making (NPRM) related to the HIPAA Security Rule, which... VISION December 2, 2024 Data security and privacy management with Carol Lee, VP of ISACA China, Hong Kong “An aspect of the privacy-by-design approach is its proactive nature that will benefit the company by integrating privacy consideration into design... INSIGHTS PAPER October 8, 2024 Best Practices for Building a Sustainable PCI DSS Compliance Programme Creating and maintaining a sustainable PCI DSS compliance programme is a crucial and complex task for organisations to protect payment card... Previous Article Pagination Next Article VISION March 6, 2025 Robert Half execs: Our focus on data security and privacy creates competitive advantage With the ubiquitous nature of privacy laws and the introduction of AI and its direct impact on business operations, the CPO must be aware of all... BLOG January 23, 2025 Long-Awaited HIPAA Security Rule Revamp Formally Proposed with Significant Changes The U.S. Department of Health and Human Services (HHS) published a Notice of Proposed Rule Making (NPRM) related to the HIPAA Security Rule, which... VISION December 2, 2024 Data security and privacy management with Carol Lee, VP of ISACA China, Hong Kong “An aspect of the privacy-by-design approach is its proactive nature that will benefit the company by integrating privacy consideration into design... INSIGHTS PAPER October 8, 2024 Best Practices for Building a Sustainable PCI DSS Compliance Programme Creating and maintaining a sustainable PCI DSS compliance programme is a crucial and complex task for organisations to protect payment card... Digital Identity BLOG February 25, 2025 Modernizing Identity Management for SAP with Microsoft Entra ID When a software firm announces end-of-life support for a key software solution, the event often signals a difficult transition ahead for IT and... BLOG January 14, 2025 Privacy Compliance: The Role of Digital Identity Driven by stringent global privacy regulations, consumer privacy and security are top of mind for technology executives. Compliance with these... FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... BLOG February 7, 2024 IAM in Operational Technology: How and Where to Make it Work By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now... Previous Article Pagination Next Article BLOG February 25, 2025 Modernizing Identity Management for SAP with Microsoft Entra ID When a software firm announces end-of-life support for a key software solution, the event often signals a difficult transition ahead for IT and... BLOG January 14, 2025 Privacy Compliance: The Role of Digital Identity Driven by stringent global privacy regulations, consumer privacy and security are top of mind for technology executives. Compliance with these... FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... BLOG February 7, 2024 IAM in Operational Technology: How and Where to Make it Work By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now... Security Strategy & Architecture VISION November 20, 2024 Privacy, data protection and cybersecurity in the boardroom with Dr. Gregg Li “When I first started this 30 years ago, I thought the more time you spend on innovation, the less time you spend on this data management. So that was... IN FOCUS October 17, 2024 The DoD unveils the Cybersecurity Maturity Model Certification Programme: A primer for defense contractors As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security... VISION September 18, 2024 Former CISO on what boards are getting wrong about data protection and privacy “We had two well-known CISOs with two very public companies charged with felonies through the SEC, which led to the cybersecurity disclosure rule... VISION September 10, 2024 CPO or no? Protiviti’s Tom Moore on the evolution of the privacy role and its uncertain future When Google, a company estimated to hold between 10 and 15 exabytes of data — or the storage power of about 30 million PCs — makes a potentially game... Previous Article Pagination Next Article VISION November 20, 2024 Privacy, data protection and cybersecurity in the boardroom with Dr. Gregg Li “When I first started this 30 years ago, I thought the more time you spend on innovation, the less time you spend on this data management. So that was... IN FOCUS October 17, 2024 The DoD unveils the Cybersecurity Maturity Model Certification Programme: A primer for defense contractors As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security... VISION September 18, 2024 Former CISO on what boards are getting wrong about data protection and privacy “We had two well-known CISOs with two very public companies charged with felonies through the SEC, which led to the cybersecurity disclosure rule... VISION September 10, 2024 CPO or no? Protiviti’s Tom Moore on the evolution of the privacy role and its uncertain future When Google, a company estimated to hold between 10 and 15 exabytes of data — or the storage power of about 30 million PCs — makes a potentially game... Security Resilience WHITEPAPER November 26, 2024 Network and information security directive 2 (NIS2) The European Commission has revised the NIS Directive, expanding its scope to include numerous new sectors. This revision aims to enhance... BLOG October 9, 2024 Digital Twins: Adopting a Data-Centric Approach to Mature Resilience Operational resilience – the ability for firms to prevent, adapt, respond to, recover and learn from operational disruptions – is a common concern for... BLOG September 26, 2024 The Strategic Imperative of Enterprise Resilience In a volatile business environment, the concept of resilience has emerged as a cornerstone of strategic management. More than just a trendy concept,... CLIENT STORY September 24, 2024 Enhancing Cyber Resilience Strategies in Global Manufacturing with the FAIR Methodology Protiviti helps a global manufacturer enhance cyber resilience strategies with a Factor Analysis of Information Risk (FAIR) quantification programme. Previous Article Pagination Next Article WHITEPAPER November 26, 2024 Network and information security directive 2 (NIS2) The European Commission has revised the NIS Directive, expanding its scope to include numerous new sectors. This revision aims to enhance... BLOG October 9, 2024 Digital Twins: Adopting a Data-Centric Approach to Mature Resilience Operational resilience – the ability for firms to prevent, adapt, respond to, recover and learn from operational disruptions – is a common concern for... BLOG September 26, 2024 The Strategic Imperative of Enterprise Resilience In a volatile business environment, the concept of resilience has emerged as a cornerstone of strategic management. More than just a trendy concept,... CLIENT STORY September 24, 2024 Enhancing Cyber Resilience Strategies in Global Manufacturing with the FAIR Methodology Protiviti helps a global manufacturer enhance cyber resilience strategies with a Factor Analysis of Information Risk (FAIR) quantification programme. Content Collections Technology Industry Collection Eine kuratierte Sammlung aus Themen, Trends und Erkenntnissen, die Unternehmen der Technologie-, Medien- und Telekommunikationsbranche (TMT) bei der Bewältigung der aktuellen Herausforderungen und Chancen unterstützen. In jeder kritischen Phase Ihres Unternehmenswachstums helfen Ihnen Protivitis Erkenntnisse und Lösungen.Unser… Mehr erfahren Board and C-Suite Leadership Collection Die neuesten Trends, Risiken und Herausforderungen für Vorstände und CEOs weltweit. Diese Thought Leadership Sammlung bietet praktische Einblicke und Orientierung für neue und erfahrene Vorstandsmitglieder zu Themen wie Daten / Künstliche Intelligenz, Technologie-Modernisierung, Nachfolgeplanung, disruptive Innovation,… Mehr erfahren Audit & Risk Management Collection Protiviti-Führungskräfte und Subject-Matter-Experten aus der ganzen Welt bieten Einblicke in die wichtigsten Themen, mit denen Unternehmen in unserem dynamischen, herausfordernden und wettbewerbsorientierten globalen Geschäftsklima konfrontiert sind. Unsere erstklassige Erfahrung in den Bereichen Interne Revision und… Mehr erfahren