Insight Search

Sort by:
  • Survey

    September 10, 2024
    Explore key findings from our finance survey on CFO transformations and global trends, emphasising tech's role in strategic growth and security.
  • Whitepaper

    July 14, 2022
    Recently, chief information officers, chief data officers and other leaders got together to discuss how data analytics programmes can help organisations achieve transformation, and how that contribution of value can be measured. We joined to share our insights at this CIO Online virtual roundtable event, which included leaders from organisations in healthcare, financial services,…
  • Whitepaper

    September 7, 2021
    China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for…
  • Whitepaper

    August 26, 2020
    In part one of our Point of View (POV) series Interpretations of the updates to China’s Cybersecurity Law, we highlighted the updated legal requirements that impact organisations looking to do business in mainland China. 
  • Whitepaper

    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection.
  • Whitepaper

    August 26, 2020
    According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction.
  • Whitepaper

    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this fifth installment focuses on the cross-border transfer of data — or data localisation — that is outlined in Article 37. 
  • Whitepaper

    August 26, 2020
    All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017. 
  • Whitepaper

    January 4, 2018
    The internal audit (IA) profession has undergone remarkable growth since 2004, when we published the first edition of our Guide to Internal Audit. At that time, we determined guidance was needed to address a number of pivotal regulatory developments, most notably the revised listing requirements from the New York Stock Exchange (NYSE) that stated for the first time, “Every listed company…
  • Blogs

    September 7, 2021
    I’m a professional hacker, or as we are referred to in the security industry, a penetration tester. As a penetration tester, I am hired by organisations to attack their systems, networks, applications, and employees in the same fashion that a malicious attacker would. It is my job to find and exploit weaknesses before malicious attackers can. These weaknesses include application and network-…
Loading...