Cybersecurity
Collection
![Cybersecurity collection](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_solution_hero/public/2022-09/US_Sol_CyberSecurityConsulting_HERO.png?itok=mlNsFXYY)
Cyber resilience is an organization’s ability to detect, prevent, respond, recover and learn from cybersecurity disruptions. Our cybersecurity collection explores common issues, trends and what organizations must do to prepare proactive and reactive solutions to and keep your assets safe.
![Cybersecurity collection](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_solution_hero/public/2022-09/US_Sol_CyberSecurityConsulting_HERO.png?itok=mlNsFXYY)
Featured Insights
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2023-02/6_tips_to_survive_life_after_schrems_ii.jpg?h=f7d9296c&itok=28z2XXNu)
Survey Finds Internal Audit Leaders See Urgent Need to Confront Skills Gaps in AI and Cybersecurity
In today’s turbulent business landscape, boards of directors and senior leaders are looking to internal audit to be a trusted adviser that can help...
![Managing Data Privacy, Localization and Sovereignty](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2024-03/mastering_data_dilemmas.jpg?h=59cb1d18&itok=zyJQgPAP)
Mastering Data Dilemmas: Navigating Privacy, Localization and Sovereignty
In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape...
![NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organization](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2024-02/nist-releases-version-2.0-cybersecurity-framework-csf.jpg?h=c21c76d1&itok=_NkQAwRo)
NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organization
On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity...
![Data Sovereignty: Impact on Privacy Programs](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2024-01/data-sovereignty.jpg?h=56286a81&itok=3iF_mUTL)
How data sovereignty and data localization impact your privacy programs
The concepts of data sovereignty and data localization stem from a desire to keep data within a country’s borders for greater control. While the broad...
Managed Security Services
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2023-02/getty_1284041267_hires_rf_rgb.jpg?h=deaec4b9&itok=sG_PjteF)
New SEC Cybersecurity Disclosure Rules: Key Takeaways From Companies’ Responses
While the ink is still drying on many 2023 Form 10-Ks, Protiviti has reviewed a subset of the filings to gauge how firms are responding to the U.S....
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2022-10/getty_1148533686_HiRes_RF_RGB.jpg?h=9dd951d5&itok=vUe_sy37)
How Offloading Vulnerability Management Enhances Security
The obstacles cybersecurity organizations face may often seem insurmountable. From dealing with a competitive labor market, to the rapid pace at which...
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2023-02/getty_1284041267_hires_rf_rgb.jpg?h=deaec4b9&itok=sG_PjteF)
A Guide to Pen Testing and Red Teaming: What to Know Now
Penetration testing and red teaming are essential cybersecurity practices that bolster an organization's security posture by uncovering...
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2022-10/Blog-Generic-6.jpg?h=19520d09&itok=A8e0ihnv)
Common Frameworks for Maturing Security Programs
Every cybersecurity organization, through its program maturity journey, grapples with the challenge of choosing and aligning with a security framework...
Data Protection
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2023-02/quantitative_cyber_risk_management_101.jpg?h=f7d9296c&itok=ODdtpm2h)
The Impact of New Evidence Requirements for HITRUST Assessments
The HITRUST Alliance Common Security Framework (HITRUST CSF) is a cybersecurity framework that helps organizations manage risk and meet regulatory...
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2023-02/getty_1284041267_hires_rf_rgb.jpg?h=deaec4b9&itok=sG_PjteF)
Building a Better Mousetrap for Telco Fraud Detection Begins with Data Monetization, Strong Analytics
Over the last three years, the telecommunications industry has experienced a significant rise in fraud incidents. In recent months, a major wireless...
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2022-10/Blog-Generic-5.jpg?h=19520d09&itok=AbzSsZeU)
Securing Large Language Models: Unique Challenges and Rethinking Traditional Security Approaches
Large Language Models (LLMs) are computational systems that process and generate text by learning from vast datasets. These advanced models, which can...
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2023-02/california_attorney_general_to_investigate_mobile_applications.jpg?h=f7d9296c&itok=mi1fgNdh)
Protecting Controlled Unclassified Information Across Data Ecosystems
Companies that work with the Department of Defense (DoD) know that it is critical to store data properly and are constantly on guard against...
Security Resilience
![SIFMA’s Quantum Dawn VII After-Action Report](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2024-05/240516-sifma-hero.jpg?h=c21c76d1&itok=mF6gC__4)
Infographic | SIFMA’s Quantum Dawn VII
Quantum Dawn VII is the latest iteration of SIFMA's biannual cybersecurity exercise focused on the outage of a critical third-party service provider ...
![DORA Compliance: Untangling Key Hurdles to Implementation](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2024-05/afme-hero.jpg?h=c21c76d1&itok=5IOM3Ykp)
DORA Compliance: Untangling Key Hurdles to Implementation
The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final...
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2022-10/Blog-Generic-7.jpg?h=19520d09&itok=UxbT_b5f)
Building Technology Resilience: Aspects and Actions
This is the second in a two- part series exploring the benefits of technology resilience , its aspects and the steps involved to implement a...
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2022-10/Blog-Generic-8.jpg?h=19520d09&itok=mkVny2cM)
Why Care about Technology Risks and Building Resilience?
This is the first post in a two-part series exploring the benefits of technology resilience. It defines technology resilience and describes its value...
Security Architecture
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2023-02/getty-562425839-rf-rgb.jpg?h=a1e1a043&itok=kTLKLGiE)
Strengthening Security Against AI-Powered Attacks
Generative AI (GenAI) technologies, such as ChatGPT, have demonstrated substantial advantages across multiple industries, including the field of...
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2023-02/getty_1284041267_hires_rf_rgb.jpg?h=deaec4b9&itok=sG_PjteF)
IAM in Operational Technology: How and Where to Make it Work
By now, it is understood that effective identity and access management (IAM) is critical to an organization’s cybersecurity program and is now...
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2023-02/getty_1284041267_hires_rf_rgb.jpg?h=deaec4b9&itok=sG_PjteF)
Emerging Trends in IAM Part 4: Going Passwordless with the FIDO Use Case
The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their...
![Blog](https://cdn.statically.io/img/www.protiviti.com/sites/default/files/styles/is_featured_insight/public/2022-10/Blog-Generic-5.jpg?h=19520d09&itok=AbzSsZeU)
Cybersecurity Risk Assessments vs. Gap Assessments: Why Both Matter
As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s...