The Protiviti View  | Insights From Our Experts on Trends, Risks and Opportunities

The Protiviti View

Insights From Our Experts on Trends, Risks and Opportunities
Search

Want to Increase User Adoption? Try This Simple FRA2MEwork

For as long as Business Intelligence (BI) has existed, organizations have made significant investments in high-performing platforms – only to find no one will use the solution. Why? For one, end users cannot find information quickly, or at all. Two, the information they do find isn’t relevant. Three, they expect their BI systems to work […]

Innovation with a Capital “C” – Culture Concerns Climb for Technology, Media and Communications Companies in 2018

Amid growing pressure to meet or surpass the speed of disruptive innovation, executives and directors of technology, media and communications (TMC) companies worry that their organizations’ desire to innovate may outrun their ability to properly manage risks. This culture concern and a deepening fear of obsolescence were key takeaways for the TMC industry group responses […]

ERM: A Tool for Risk-Informed Strategic Planning and Decision Making

At the end of last year, Protiviti conducted a webinar, Deriving Value from the Updated COSO ERM Framework. I had the pleasure of hosting the webinar, along with my colleagues: Dolores Atallo, a Managing Director in the Risk and Compliance practice, Jim DeLoach, Managing Director and member of the COSO Advisory Council (and host of […]

The Current State of Internal Audit Data Analytics

The explosion in the use of digital channels and the data they produce have caused a corresponding rise in the use of data analytics by the risk management and internal audit functions within financial services firms seeking to streamline their processes to gain efficiency and adopt a more agile approach to risk management. The internal […]

Security Advisory: Meltdown and Spectre – Processor Flaws Expose Networks to New Class of Vulnerabilities

Understand the GDPR legitimate interest vs. consent dilemma

Security researchers have identified a flaw, present in most computer processors, that allows unauthorized disclosure of information. The flaw, which affects most major processor manufacturers, is the first known instance of a security vulnerability at the processor level, and could be exploited in servers, workstations (including laptops), network infrastructure, mobile devices, IoT devices and consumer […]

Perception vs Reality: What Is Procurement’s True Value When It Comes to Savings?

In Protiviti’s Procurement Survey, conducted in the first quarter of last year, two findings stood out: Half of finance function respondents reported that only 20 percent of the savings procurement claims to achieve fall to the bottom line, and Only one-third of respondents, from both finance and procurement, agreed that there was a collaborative relationship […]

Search