Business Performance ImprovementData and AnalyticsEnergy & UtilitiesRegulatory Compliance Sustainable Operations: How Facilities Managers Can Achieve ESG Goals Tony Abel and Debjani Mallick December 13, 2022 Tony AbelDebjani MallickOctober 26, 2022
Manufacturing & DistributionTechnology and Cyber Security Vulnerability Management for Manufacturers: Don’t Wait for an Event to Trigger a Response; Start Building a Program Today Sharon Lindstrom and Mike Alessi January 4, 2023 Sharon LindstromMike AlessiMay 19, 2021
HealthcareTechnology and Cyber Security There’s a Culture Shift Happening in Medical Device Manufacturing. Are CISOs Ready? Chris Manning and Geoff Weathersby May 18, 2021 Chris ManningGeoff WeathersbyMay 18, 2021
Manufacturing & DistributionTechnology and Cyber Security As Manufacturing Is Transforming, Data Privacy Is a Key Risk – And One to Be Addressed Sooner Rather Than Later Sharon Lindstrom and Katie Stevens January 4, 2023 Sharon LindstromKatie StevensApril 27, 2021
Technology and Cyber Security Managing Connected Devices in Today’s Evolving Business Environment Scott Laliberte November 6, 2020 Scott LaliberteNovember 6, 2020
Technology and Cyber Security Major Security Vulnerabilities Could Expose Thousands of IoT Devices to Cyberattacks (Flash Report) The Protiviti View March 4, 2020 The Protiviti ViewMarch 4, 2020
Digital Transformation Is Your Company Approaching Digital Transformation in the Right Way? The Protiviti View June 27, 2018 The Protiviti ViewJune 27, 2018
Finance/Internal AuditTechnology and Cyber Security IT Governance in the Age of Digitalization Ari Sagett June 20, 2018 Ari SagettJune 20, 2018
Digital TransformationTechnology and Cyber Security On the Road to Digital Transformation, One Map Does Not Fit All Ed Page June 4, 2018 Ed PageJune 4, 2018
Regulatory ComplianceTechnology and Cyber Security Hidden Vulnerability: GDPR Data in Unexpected Places Scott Laliberte and Katie Stevens May 23, 2018 Scott LaliberteKatie StevensMay 23, 2018