Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs July 14, 2023 Is Apple’s vision pro a gamechanger that will mainstream the metaverse? Tech experts weigh in. Apple’s announcement of its Vision Pro virtual reality headset earlier this month elicited some strong opinions across the board. Could it really replace the iPhone and mainstream the metaverse, as some have claimed? Or is it just another overpriced wearable for the wealthy? Newsletter July 13, 2023 The Metaverse: The Dawn of a New Generation of Capabilities The big picture: The metaverse has the potential to be a disruptive, expansive and transformative force, even to the point of spawning its own economy. Every board has a fiduciary duty to evaluate that potential for its company’s future. By the numbers: According to a survey of 250 global business leaders, the metaverse has the potential to dramatically alter the future of the human experience… Newsletter November 14, 2021 Determining the Digital Investment Question in the Boardroom In the third decade of the 21st century, smart companies and boards across all industries recognise that the pace of technological change continues to unfold at warp speed. The question in the boardroom a decade ago — “Should we invest in digital transformation?” — has transitioned to a different question today: “How much should we invest and, more important, how fast should we invest, given our… Whitepaper September 7, 2021 China's Evolving Cybersecurity Law China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for… Whitepaper August 26, 2020 China’s Cybersecurity Law: Personal Information Protection Law (PIPL) Overview As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection. Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Whitepaper August 26, 2020 Interpretations of the Updates to China’s Cybersecurity Law All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017. Podcast September 1, 2021 Podcast – Today’s Challenges and Trends for Utilities Like organisations in virtually every industry today, utilities are addressing a number of critical challenges and trends in the market, from infrastructure demands, to calls to improve the customer experience, to talent demands, and much more.How will the future for utilities evolve? In this informative podcast, Peter Tumminello and Claire Gotham offer a number of interesting insights into these… Video August 18, 2020 Video - Protiviti's 2020 Internal Audit Capabilities and Needs Survey In recent years, mammoth waves of disruption have both buffeted and ignited organisations in their drive to change and stay relevant. Not surprisingly, internal audit functions have seen the effects. It’s now time for internal audit leaders and their teams to take the initiative, stand up and ride their own wave of transformation and innovation. Watch our video to learn more Video June 22, 2020 Video - Need help to identify and prioritise pain points? Check out Protiviti's Business Resilience tool. This complimentary assessment tool helps business leaders quickly identify and prioritise their organisation’s unique pain points, threats and vulnerabilities across their core functions, and then creates an agile operating model. Create your own triage heatmap of priorities and receive a recommended suite of practical tools and processes to best… Load More