Insight Search

Sort by:
  • Whitepaper

    September 19, 2022
    Plan for the Unexpected. Build Resiliency.Instill your organisation with the advantage to endure company disruptions and consistently meet business goals with reduced financial, operational, cybersecurity, and efficiency losses. Assess your areas of risk and develop, enhance, as well as maintain plans to enable resilience, regardless of the circumstance. Flashing back to 2020, the world was in…
  • Client Story

    December 19, 2022
    Regierungsbehörden gelten als langsam beim Einführen neuer Prozesse. Im Zuge der COVID-19-Pandemie musste dieses ausländische Verteidigungsministerium schnell auf Remote Work für zivile und nicht-zivile Mitarbeiter umstellen und gleichzeitig ein hohes Maß an
  • Podcast

    March 28, 2023
    Over the past year, as one crypto organisation after another has been beset by fraud or declared bankruptcy, countless headlines have surfaced warning of the death of the crypto industry. Yet the damage has been largely contained.The developments have raised many questions about digital assets, cryptocurrency and blockchain technology as well as regulation and other factors that may help the…
  • Podcast Transcript

    March 28, 2023
    Over the past year, as one crypto organisation after another has been beset by fraud or declared bankruptcy, countless headlines have surfaced warning of the death of the crypto industry. Yet the damage has been largely contained. The developments have raised many questions about digital assets, cryptocurrency and blockchain technology as well as regulation and other factors that may help the…
  • Podcast

    June 2, 2021
    The holy grail of quantum computing in the near term is a use case that provides advantage. We believe it’s only a matter of time, but major companies have to plan and prepare now so that they are not left behind when these applications arrive. Join host Konstantinos Karagiannis for a chat about quantum computing use cases with Pranav Gokhale from Super.tech. We cover mostly financial customer…
  • Survey

    January 7, 2022
    The quality and, in some cases, the existence of the CISO/CFO relationship varies by company. In organisations where the CISO role is positioned and promoted as a source of value, CISOs and CFOs tend to collaborate more often and more meaningfully than in companies that treat information security as a cost center (and typically struggle with cybersecurity as a result). Protiviti’s 2021 Global…
  • Podcast

    March 23, 2022
    Quantum machine learning, or QML, is one of the three major application categories for quantum computing, along with optimisation and simulation. As we’re working with customers at Protiviti to find advantageous use cases in QML, we rely daily on a tool called PennyLane from Xanadu. Join host Konstantinos Karagiannis, and special cohost Emily Stamm, for a chat with Nathan Killoran from Xanadu to…
  • Podcast

    July 18, 2022
    In coding, libraries make developers’ lives easier, sparing them thousands of lines of code, while also increasing performance and security. And everyone’s concerned with security as fault-tolerant quantum computing approaches. Geometry Labs has released the “lattice-algebra” library to bring a high-performance cryptographic library to developers interested in using post-quantum cryptography in…
  • Newsletter

    March 15, 2022
    In this issue of Private Equity Insights, we take a deep dive into the top risk issues facing companies owned by private equity (PE) in 2022 and over the next 10 years. These insights were obtained from our 10th annual survey of top risks by Protiviti and NC State University’s ERM Initiative.Of the global boards of directors and executives surveyed, respondents from PE-owned company leaders…
  • Whitepaper

    August 12, 2021
    Introduction Most technology companies today understand that ensuring data privacy and protection is an imperative for their business; however, few manage this process well or even invest enough resources in that effort. As governments and consumers around the world continue to raise their expectations of how technology businesses should handle and process private and sensitive data, the need to…
Loading...