Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Podcast May 4, 2022 Podcast | Securing NATO (And Your Company) Against Quantum Computing Attacks The fear of a quantum cryptographic apocalypse has been with us since the 90s and has launched quite a few careers and companies. Post-Quantum, no relation to this show, has been developing end-to-end solutions for quantum-secure communications since 2009, and they recently participated in a year-long proof of concept with NATO. Join host Konstantinos Karagiannis for a chat on practical solutions… Flash Report January 21, 2021 The Biden Administration: The First 100 Days and Winners and Losers A United States Perspective With Joe Biden’s inauguration as the 46th president of the United States and a Democrat-controlled Congress with a razor-thin majority in both the House and the Senate, what can we expect in the new administration’s first 100 days and the next two years? What sectors face the greatest impacts from the change in leadership inside the Beltway from a Biden presidency and… Newsletter June 1, 2020 What Directors Should Be Asking Right Now As companies emerge from lockdowns marked by unprecedented change and begin to look forward, boards should continue to ask the right questions. As countries across the globe emerge from lockdown, discussions tailored to the evolving marketplace and issues around employee health and safety are needed in the boardroom. While the specifics will vary depending on the circumstances, we pose 10… Whitepaper September 7, 2021 China's Evolving Cybersecurity Law China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for… Whitepaper August 26, 2020 China’s Cybersecurity Law: Personal Information Protection Law (PIPL) Overview As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection. Whitepaper August 26, 2020 Interpretations of the Updates to China’s Cybersecurity Law All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017. Survey December 8, 2022 Executive Perspectives on Top Risks for 2023 and 2032 The level of uncertainty in today’s global marketplace and the velocity of change continue to produce a multitude of potential risks that can disrupt an organisation’s business model and strategy on very short notice. Flash Report March 29, 2023 COSO Issues Supplemental Guidance on Internal Control Over Sustainability Reporting The Committee of Sponsoring Organisations of the Treadway Commission (COSO) has released supplemental guidance on how to effectively apply the 2013 Internal Control — Integrated Framework (ICIF) — which is currently applied to financial reporting — to sustainability reporting. The guidance results from a project approved by the COSO board a year ago with the objective of helping organisations “… Survey January 3, 2023 ESG: A continental rift? Key findings from an Oxford-Protiviti Survey, Executive Outlook on the Future of ESG, 2032 and Beyond:Oxford-Protiviti executive survey with a 10-year outlook finds North American leaders less worried about environmental risk and ESG regulation, and less open to change.Executives in Europe and Asia-Pacific (APAC) perceive the stakes as higher and expect more change externally and within their… Whitepaper January 29, 2018 China’s Cybersecurity Law and its Impacts - Key Requirements Businesses Need to Understand to Ensure Compliance On June 1, 2017, China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Long before the Cybersecurity Law took effect, China had already made some efforts to strengthen information security. For example, a white paper titled The Internet in China, published in 2010, served as an early guide to China’s policy… Load More