Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper September 19, 2022 2022 IT Audit Technology Risks in Tech, Media & Telecom Survey Shows Elevated Concerns Around Cybersecurity, Privacy and Compliance for the Technology, Media and Telecom Industry For the technology, media and telecommunications (TMT) industry, the greatest IT audit concerns in 2022 lie with cybersecurity-related breaches, privacy and regulatory compliance. More than 1,000 IT audit leaders and professionals from the TMT industry provided this… Client Story January 6, 2023 Cloud-based Healthcare Analytics Company Expands Solutions and Customers d2i is a cloud-based healthcare analytics solutions firm that’s on the move. The company provides an unparalleled data analytics application that aggregates, harmonizes and enriches diverse data sources to some of the largest hospital emergency departments (ED) in the United States. The company currently extracts Electronic Health Record (EHR) data into their environment for over 240 hospitals.… Blogs January 13, 2023 The Evolution of Attacker Behavior: 3 Case Studies This blog post was authored by Mike Ortlieb, Director, Security and Privacy and Chris Porter, Associate Director, Security and Privacy on The Technology Insights Blog. Threat actors are an ever-evolving species. Portrayed in popular advertising as guys dressed in black, probably sporting a ski mask, the harsh reality is that these bad actors are everywhere and are getting more creative… Newsletter January 12, 2023 The Top Risks for 2023: A Global View The global survey of C-level executives and directors, focused on macroeconomic, strategic and operational risks, highlights the influence of the economy, people and culture issues, supply chain risks, and technology impacts on the 2023 risk landscape. The survey was conducted online in the September — October 2022 time frame to capture perspectives on 38 risks on the minds of business leaders as… Podcast January 11, 2023 Podcast | Preventing Hacking with Quantum Computing and other InfoSec Topics – with Mark Carney from Quantum Village We’ve talked about how quantum computers are enabling extraordinary use cases now, long before the machines will threaten cryptography. Some of these applications can even help companies protect against immediate security threats and vulnerabilities. We explore one such exciting experiment: Using quantum to stop kill chains that allow network exploitation and the Chinese paper causing all the… Podcast January 11, 2023 Podcast | IT Audit Perspectives on Today’s Top Technology Risks The greatest IT audit concerns lie with cybersecurity-related breaches and related risk issues. Data governance and data integrity are being scrutinised. Regulatory compliance burdens and risk are increasing rapidly. These are among the key takeaways from the results of the latest IT Audit Technology Risks Survey from ISACA and Protiviti, in which more than 7,500 IT audit leaders and… Whitepaper December 21, 2022 Internal Audit Benchmarks in Healthcare Organisations By Mike Michalowicz, CIA®, CCSA, CRMA, Bryon Neaman, CHIAP®, CIA®, CPA, and Rebecca Nilson, CIA®, CPA, CRMA Internal audit (IA) functions in organisations worldwide and throughout most industries are undergoing significant change. Changes range from embracing the use of new methodologies and technologies to reframing how their people perform day-to-day operations as the future of work… Survey January 3, 2023 ESG: A continental rift? Key findings from an Oxford-Protiviti Survey, Executive Outlook on the Future of ESG, 2032 and Beyond:Oxford-Protiviti executive survey with a 10-year outlook finds North American leaders less worried about environmental risk and ESG regulation, and less open to change.Executives in Europe and Asia-Pacific (APAC) perceive the stakes as higher and expect more change externally and within their… Blogs January 11, 2023 For $62.59, the 8 Character Password is Still Dead Five years ago, we wrote a post called “The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight-character passwords do not adequately protect organisations. In that analysis, we broke down the math and how quickly hardware purchased for under $5,000 could make an eight-character length irrelevant. Unfortunately, in just five years’ time, the… Podcast October 5, 2022 Podcast | Financial Index Tracking via Quantum Computing— with Multiverse Using cardinality constraints for portfolio optimization opens the doors to new applications for creating innovative portfolios and exchange-traded-funds (ETFs). All while providing better returns with less market risk. Host Konstantinos Karagiannis recently co-authored a paper on portfolio optimization with Sam Palmer from Multiverse Computing. Find out how the team was able to outperform… Load More