Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper June 1, 2022 How can an enterprise use access management to establish a Zero Trust environment? A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management programme is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based… Blogs May 5, 2023 Creating a resilient cybersecurity strategy: The governance lifecycle approach Cybersecurity governance should do more than manage cyber risk. Good cybersecurity governance creates efficiencies by clarifying the outcomes expected from its processes and establishing boundaries of responsibility among cybersecurity practitioners, frontline operational areas, senior leaders and board members. Recently, numerous crises have drawn senior leaders and board members down… Blogs April 12, 2023 Australia’s Privacy Act is fundamentally changing: What this means for your organisation Background On 16 February 2023, the Attorney-General’s Department released its Privacy Act Review Report (the Report) following a two-year review of the Privacy Act 1988 (Cth) (the Act). The Report contains 116 recommended amendments to the existing Act to strengthen the protection of personal information and the control individuals have over their information. If accepted and adopted, the… Blogs April 21, 2023 Enhancing cyber capabilities using a threat-driven strategy Senior leaders focused on cybersecurity recognise there is considerable guidance, best practices, frameworks, regulations and varied opinions on how programmes should design defensive capabilities. In addition, depending on the day, the various pressures in the organisation’s macro-environment may be greater or lesser and invite different priorities for time, team and budget. Despite… Blogs April 19, 2023 Achieving Diversity’s Benefits in Cybersecurity Could any security organisation benefit from greater innovation? Or from responding more effectively to diverse internal customers? How about benefitting by retaining the talent its leaders have so carefully nurtured, by accessing more diverse capabilities, or by improving problem-solving capabilities within the team? Podcast November 30, 2022 Podcast | Quantum-Inspired Applications with Icosa Computing We’re getting close to practical advantage with quantum computing when running optimisation algorithms. Companies interested in being leaders in their industry should already be considering how to harness this promised power with use cases that solve their business problems. But some companies want a better solution that’s advantageous today, even if it’s only quantum-inspired. Join host… Flash Report March 9, 2023 New White House Cybersecurity Strategy Creates Additional Concerns for Businesses The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well as private businesses. The Biden-Harris Administration has been percolating a comprehensive cybersecurity strategy for some time and in early March released the aptly named “National Cybersecurity Strategy.” The 35-page document was created to help… Podcast March 23, 2022 Podcast | Quantum Machine Learning Using PennyLane with Xanadu Quantum machine learning, or QML, is one of the three major application categories for quantum computing, along with optimisation and simulation. As we’re working with customers at Protiviti to find advantageous use cases in QML, we rely daily on a tool called PennyLane from Xanadu. Join host Konstantinos Karagiannis, and special cohost Emily Stamm, for a chat with Nathan Killoran from Xanadu to… Whitepaper July 22, 2021 The adoption of "Zero Trust" The future of organisations will be built on the ability to work securely from anywhere, using any device at any time. This was made clear during the COVID-19 pandemic, which forced millions of workers to work from home using company-owned or personal devices. As the velocity and persistence of cybersecurity attacks increase daily and digital transformation continues to be a priority for… Load More