-
The purpose of security analytics in an organisation
Security metrics and the analysis of security information can be challenging concepts even for leading organisations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organisation’s security capabilities. If policies are the…
-
The Financial Action Task Force (FATF) has long warned that criminals leverage virtual assets not only for predicate or money-laundering offenses but also to evade financial sanctions and raise funds to support terrorism. Even so, the number of recent headlines about criminal activity and sanctions evasion in the crypto industry is alarming. Cryptocurrency-based crime hit an all-time high of $20.…
-
Technology leaders are exploring new ways to drive innovation and maximise the value of IT in a changing world driven by disruption and a need for acceleration
Executive Summary
Innovation is the name of the game in today’s global market. Recognising this new reality, CIOs, CTOs, CISOs and other technology executives and leaders are exploring new ways to fuel innovation throughout their…
-
By Carol Beaumier and Bernadine Reese
Sharing information and lessons learned has become increasingly critical for the effective management of cybercrime and related financial crime. This need requires financial institutions to rethink how they have historically managed these risks.
-
Data privacy has become a strategic priority as companies adapt to comply with rapidly proliferating data privacy laws. Recent years have seen the adoption of the European Union’s General Data Protection Regulation (GDPR), the more recent California Consumer Protection Act (CCPA), and similar regulations. These safeguards require companies to document the types of protected personal data used in…
-
Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit.
The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt…
-
The news of the cyber attacks being experienced by government agencies and an expanding list of organisations continues to grow and change on almost an hourly basis. This is proving to be potentially one of the most significant cyber breaches in recent times. Following up on our December 14, 2020, Flash Report on the CISA advisory, and in response to numerous questions and inquiries we…
-
On December 13, 2020, the Cybersecurity & Infrastructure Security Agency (CISA) issued an emergency directive detailing required action for federal agencies to mitigate the threat of the recently discovered compromise involving SolarWinds® Orion® Network Management products that are currently being exploited by malicious actors. (Read the SolarWinds Security…
-
In this issue of Private Equity Insights, we take a deep dive into the top risk issues facing companies owned by private equity (PE) in 2022 and over the next 10 years. These insights were obtained from our 10th annual survey of top risks by Protiviti and NC State University’s ERM Initiative.Of the global boards of directors and executives surveyed, respondents from PE-owned company…
-
Like any enterprisewide organisational change, implementing an operational resilience programme across an organisation requires a careful and collaborative effort to be successful. Whether implementation has been in the works for several years or is just beginning, turning the resilience programme from concept to reality is hard work.
Except for the most dynamic and change-…