Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper December 14, 2020 Adjusting Internal Audit Priorities in Healthcare Organisations Pre-COVID-19 Survey Results and Current Audit Planning Considerations Next-Generation Internal Audit in Healthcare: It’s Time to Ride the Wave of Transformation and Innovation The COVID-19 pandemic has brought massive waves of disruption and unique challenges to the healthcare industry. These waves have driven healthcare delivery organisations to find more innovative means to treat… Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Infographic May 8, 2023 Infographic | COSO ESG Guidance Webinar: Internal Control Over ESG Operations, Compliance & Reporting The Committee of Sponsoring Organisations of the Treadway Commission (COSO) recently released interpretive guidance for organisations about designing, evaluating and achieving effective internal control over sustainability reporting (ICSR) using COSO’s globally recognised Internal Control — Integrated Framework (ICIF), developed in 2013. The intended outcome is to build trust and confidence in… Whitepaper September 7, 2021 China's Evolving Cybersecurity Law China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for… Whitepaper August 26, 2020 China’s Cybersecurity Law: Personal Information Protection Law (PIPL) Overview As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection. Whitepaper August 26, 2020 Interpretations of the Updates to China’s Cybersecurity Law All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017. Survey December 8, 2022 Executive Perspectives on Top Risks for 2023 and 2032 The level of uncertainty in today’s global marketplace and the velocity of change continue to produce a multitude of potential risks that can disrupt an organisation’s business model and strategy on very short notice. Flash Report March 29, 2023 COSO Issues Supplemental Guidance on Internal Control Over Sustainability Reporting The Committee of Sponsoring Organisations of the Treadway Commission (COSO) has released supplemental guidance on how to effectively apply the 2013 Internal Control — Integrated Framework (ICIF) — which is currently applied to financial reporting — to sustainability reporting. The guidance results from a project approved by the COSO board a year ago with the objective of helping organisations “… Survey January 3, 2023 ESG: A continental rift? Key findings from an Oxford-Protiviti Survey, Executive Outlook on the Future of ESG, 2032 and Beyond:Oxford-Protiviti executive survey with a 10-year outlook finds North American leaders less worried about environmental risk and ESG regulation, and less open to change.Executives in Europe and Asia-Pacific (APAC) perceive the stakes as higher and expect more change externally and within their… Whitepaper January 29, 2018 China’s Cybersecurity Law and its Impacts - Key Requirements Businesses Need to Understand to Ensure Compliance On June 1, 2017, China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Long before the Cybersecurity Law took effect, China had already made some efforts to strengthen information security. For example, a white paper titled The Internet in China, published in 2010, served as an early guide to China’s policy… Load More