Cybersecurity Collection Cyber resilience is an organization’s ability to detect, prevent, respond, recover and learn from cybersecurity disruptions. Our cybersecurity collection explores common issues, trends and what organizations must do to prepare proactive and reactive solutions to and keep your assets safe. In Focus April 25, 2025 Navigating the DOJ final rule on bulk sensitive personal data: What does it mean for your business? Multinational organisations must now comply with a sweeping new U.S. Department of Justice rule that restricts the transfer of bulk sensitive personal data to foreign adversaries. The rule, established under Executive Order 14117, went into effect earlier this month and introduces prohibitions and controls on data transactions involving countries of concern such as... Read more Featured Insights IN FOCUS April 29, 2025 Oracle Cloud security: Preventing unauthorised access and data theft Data breaches have increasingly plagued organisations worldwide, underscoring the urgent need for robust security measures. The latest reported... SURVEY February 13, 2025 2025 Report on Top Risks Read Protiviti's Top Risks Report 2025 covering executives' views on emerging risks related to AI, cyber threats, talent management, and economic... INSIGHTS PAPER November 8, 2024 Understanding the Impact of the EU AI Act: A Primer for Financial Institutions Navigate the EU AI Act's impact on finance with our strategic guide to compliance and ethical AI use. VISION October 21, 2024 Protiviti-Oxford survey shows ‘us vs. them’ disconnect in how global execs view data privacy 86% of executives say they are confident or extremely confident their company is doing everything it possibly can to protect customer data. ... Previous Article Pagination Next Article IN FOCUS April 29, 2025 Oracle Cloud security: Preventing unauthorised access and data theft Data breaches have increasingly plagued organisations worldwide, underscoring the urgent need for robust security measures. The latest reported... SURVEY February 13, 2025 2025 Report on Top Risks Read Protiviti's Top Risks Report 2025 covering executives' views on emerging risks related to AI, cyber threats, talent management, and economic... INSIGHTS PAPER November 8, 2024 Understanding the Impact of the EU AI Act: A Primer for Financial Institutions Navigate the EU AI Act's impact on finance with our strategic guide to compliance and ethical AI use. VISION October 21, 2024 Protiviti-Oxford survey shows ‘us vs. them’ disconnect in how global execs view data privacy 86% of executives say they are confident or extremely confident their company is doing everything it possibly can to protect customer data. ... Digital Identity BLOG February 25, 2025 Modernizing Identity Management for SAP with Microsoft Entra ID When a software firm announces end-of-life support for a key software solution, the event often signals a difficult transition ahead for IT and... BLOG January 14, 2025 Privacy Compliance: The Role of Digital Identity Driven by stringent global privacy regulations, consumer privacy and security are top of mind for technology executives. Compliance with these... CLIENT STORY April 19, 2024 Rural Lifestyle Retailer Builds Customer Loyalty With Enhanced CIAM Strategy Protiviti partnered with a rural lifestyle retailer client to assess its Customer Identity and Access Management (CIAM) program and architecture. ... FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... Previous Article Pagination Next Article BLOG February 25, 2025 Modernizing Identity Management for SAP with Microsoft Entra ID When a software firm announces end-of-life support for a key software solution, the event often signals a difficult transition ahead for IT and... BLOG January 14, 2025 Privacy Compliance: The Role of Digital Identity Driven by stringent global privacy regulations, consumer privacy and security are top of mind for technology executives. Compliance with these... CLIENT STORY April 19, 2024 Rural Lifestyle Retailer Builds Customer Loyalty With Enhanced CIAM Strategy Protiviti partnered with a rural lifestyle retailer client to assess its Customer Identity and Access Management (CIAM) program and architecture. ... FLASH REPORT February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity... Data Privacy & Protection VISION March 6, 2025 Robert Half execs: Our focus on data security and privacy creates competitive advantage With the ubiquitous nature of privacy laws and the introduction of AI and its direct impact on business operations, the CPO must be aware of all... BLOG January 23, 2025 Long-Awaited HIPAA Security Rule Revamp Formally Proposed with Significant Changes The U.S. Department of Health and Human Services (HHS) published a Notice of Proposed Rule Making (NPRM) related to the HIPAA Security Rule, which... VISION December 2, 2024 Data security and privacy management with Carol Lee, VP of ISACA China, Hong Kong “An aspect of the privacy-by-design approach is its proactive nature that will benefit the company by integrating privacy consideration into design... INSIGHTS PAPER October 8, 2024 Best Practices for Building a Sustainable PCI DSS Compliance Program Creating and maintaining a sustainable PCI DSS compliance program is a crucial and complex task for organisations to protect payment card transactions... Previous Article Pagination Next Article VISION March 6, 2025 Robert Half execs: Our focus on data security and privacy creates competitive advantage With the ubiquitous nature of privacy laws and the introduction of AI and its direct impact on business operations, the CPO must be aware of all... BLOG January 23, 2025 Long-Awaited HIPAA Security Rule Revamp Formally Proposed with Significant Changes The U.S. Department of Health and Human Services (HHS) published a Notice of Proposed Rule Making (NPRM) related to the HIPAA Security Rule, which... VISION December 2, 2024 Data security and privacy management with Carol Lee, VP of ISACA China, Hong Kong “An aspect of the privacy-by-design approach is its proactive nature that will benefit the company by integrating privacy consideration into design... INSIGHTS PAPER October 8, 2024 Best Practices for Building a Sustainable PCI DSS Compliance Program Creating and maintaining a sustainable PCI DSS compliance program is a crucial and complex task for organisations to protect payment card transactions... Security Resilience WHITEPAPER April 9, 2025 Third-Party Resilience: Increasing Transparency The threats faced by financial institutions are vast, multi-faceted and constantly evolving. The industry has responded in kind, in part by investing... WHITEPAPER November 26, 2024 Network and information security directive 2 (NIS2) The European Commission has revised the NIS Directive, expanding its scope to include numerous new sectors. This revision aims to enhance... BLOG October 9, 2024 Digital Twins: Adopting a Data-Centric Approach to Mature Resilience Operational resilience – the ability for firms to prevent, adapt, respond to, recover and learn from operational disruptions – is a common concern for... BLOG September 26, 2024 The Strategic Imperative of Enterprise Resilience In a volatile business environment, the concept of resilience has emerged as a cornerstone of strategic management. More than just a trendy concept,... Previous Article Pagination Next Article WHITEPAPER April 9, 2025 Third-Party Resilience: Increasing Transparency The threats faced by financial institutions are vast, multi-faceted and constantly evolving. The industry has responded in kind, in part by investing... WHITEPAPER November 26, 2024 Network and information security directive 2 (NIS2) The European Commission has revised the NIS Directive, expanding its scope to include numerous new sectors. This revision aims to enhance... BLOG October 9, 2024 Digital Twins: Adopting a Data-Centric Approach to Mature Resilience Operational resilience – the ability for firms to prevent, adapt, respond to, recover and learn from operational disruptions – is a common concern for... BLOG September 26, 2024 The Strategic Imperative of Enterprise Resilience In a volatile business environment, the concept of resilience has emerged as a cornerstone of strategic management. More than just a trendy concept,... Security Strategy & Architecture PODCAST March 26, 2025 Podcast | Digital Frontier: Addressing Blind Spots in Corporate Governance and Strategy – with Frank Kurre and Ann Rodriguez In this episode, Protiviti Managing Director Frank Kurre is joined by Ann Rodriguez to explore the impact of digital assets on corporate governance... VISION November 20, 2024 Privacy, data protection and cybersecurity in the boardroom with Dr. Gregg Li “When I first started this 30 years ago, I thought the more time you spend on innovation, the less time you spend on this data management. So that was... BLOG October 7, 2024 Low-Code Applications Yield High Value, Big Change in Less Time The big picture: Deploying enterprise technology systems and tools often is cumbersome and hampered by complex configurations, lengthy implementations... VISION September 10, 2024 CPO or no? Protiviti’s Tom Moore on the evolution of the privacy role and its uncertain future When Google, a company estimated to hold between 10 and 15 exabytes of data — or the storage power of about 30 million PCs — makes a potentially game... Previous Article Pagination Next Article PODCAST March 26, 2025 Podcast | Digital Frontier: Addressing Blind Spots in Corporate Governance and Strategy – with Frank Kurre and Ann Rodriguez In this episode, Protiviti Managing Director Frank Kurre is joined by Ann Rodriguez to explore the impact of digital assets on corporate governance... VISION November 20, 2024 Privacy, data protection and cybersecurity in the boardroom with Dr. Gregg Li “When I first started this 30 years ago, I thought the more time you spend on innovation, the less time you spend on this data management. So that was... BLOG October 7, 2024 Low-Code Applications Yield High Value, Big Change in Less Time The big picture: Deploying enterprise technology systems and tools often is cumbersome and hampered by complex configurations, lengthy implementations... VISION September 10, 2024 CPO or no? Protiviti’s Tom Moore on the evolution of the privacy role and its uncertain future When Google, a company estimated to hold between 10 and 15 exabytes of data — or the storage power of about 30 million PCs — makes a potentially game... Content Collections Technology Industry Collection A curated collection of topics, trends and insights to help technology, media and telecom (TMT) industry organisations face today's challenges and opportunities. For any critical point in a company's growth, explore Protiviti's insights and solutions. Our team will enable your business with a comprehensive approach to… Read More Board and C-Suite Leadership Collection Sharing the latest trends, risks, and challenges for board directors and CEOs around the globe. This collection of thought leadership provides practical insights and guidance for new and experienced board members alike on such topics as data/artificial intelligence, technology modernisation, succession planning, disruptive… Learn More Audit & Risk Management Collection Protiviti leaders and subject-matter experts from around the world provide insights on key issues facing organisations in our dynamic, challenging and competitive global business climate. Our world-class internal audit and risk assessment experience provides a wealth of information and data to help you meet future challenges. Read More