Insight Search

Sort by:
  • Podcast

    March 25, 2025
    Our topic in the latest episode of Board Perspectives is managing climate risk, featuring a discussion with Matthew Sekol, Kimberly Roscoe and Alyse Mauro Mason on the evolving landscape of climate risk and sustainability.These experts highlight the distinction between acute and chronic climate risks and their impact on businesses, and also emphasise the necessity for companies to adapt and plan…
  • Whitepaper

    June 24, 2022
    On April 29, 2022, the PCI Security Standards Council (PCI SSC) released new versions of the PCI DSS Self-Assessment Questionnaires (SAQs) ahead of the anticipated June 2022 release timeline. After the release of the new version of PCI DSS 4.0 a month prior, the new versions of the SAQs have been updated to reflect changes in the standard, as well as to adjust requirements applicable for…
  • Whitepaper

    October 5, 2020
    An emerging trend among private equity firms is their growing attention to the remediation, monitoring and reporting of cybersecurity capabilities of the companies in their portfolios. Historically, they have not fully appreciated the varying degrees of cybersecurity risk relative to a company’s specific industry. And understandably, the emphasis on investing in promising businesses and improving…
  • Video

    June 23, 2023
    A new and dramatic approach to regulating big technology firms is coming into force across the European Union. The Digital Services Act (DSA), which the European Council signed into law on September 15, 2022, aims to protect the digital space against the spread of illegal content, particularly on social networks, content sharing platforms and e-commerce sites. The countdown has begun for…
  • Whitepaper

    August 31, 2023
    By Sharon Lindstrom - Global Leader, Manufacturing and Distribution Industry Practice, ProtivitiBy the numbers: Overall, organisations today spend an average of 30% of their IT budgets on and invest a fifth of their IT human resources in technical debt management.This research, based on a global survey of more than 1,000 CIOs, CTOs and other technology leaders, underscores the burden created by…
  • Podcast

    September 10, 2024
    A look at the top priorities for CFOs and finance leaders in the coming year — among them, security and privacy of data, financial and strategic planning and analysis, leadership, and enhanced data analytics — reveals a tale of transformation for CFOs whose responsibilities continue to widen.
  • Insights paper

    November 27, 2024
    In the fast-paced world of technology, both regulators and companies face challenges applying existing laws to new and rapid developments. Given the high stakes of non-compliance, which may lead to business restrictions, technology companies’ senior management, boards and compliance teams must clearly understand current and emerging risks, ensuring that they have effective people, processes and…
  • Insights paper

    February 21, 2025
    The era of big data is upon us, ushering in a digital transformation driven by the Internet-of-Things, mobile technology, AI and cloud computing. This revolution has generated a vast array of new digital data sources. Many businesses are digitising traditional paper records, while advanced algorithms now process various types of content — audio, video, text and images — with remarkable speed and…
  • Survey

    April 17, 2025
    Businesses today face a myriad of challenges as they adapt and transform their operational models to overcome future obstacles, including competitive pressures and cyber threats. The global marketplace is deeply influenced by advancements in technology, changing regulations, and economic factors, all of which necessitate access to skilled professionals and expertise. These factors shape the risk…
  • In Focus

    August 28, 2024
    Earlier this month, the National Institute of Standards and Technology (NIST) approved three post-quantum cryptography (PQC) standards that constitute the first significant steps towards protecting critical services from quantum computers being used to break the encryption of sensitive and classified information for both business and government.
Loading...