-
This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organisations can take to implement the changes introduced. There have been significant advancements in technology, as well as an increase in the complexity of security threats since the last iteration of ISO 27001 was published on September 25, 2013. The changes introduced in…
-
On November 4, 2021, the U.S. Department of Defense (DoD or Department) published a proposed update to its Cybersecurity Maturity Model Certification (CMMC) and defined a path forward that has Defense Industrial Base (DIB) contractors eager to understand impacts to their business and anticipated next steps in the evolution of the CMMC programme.
In addition to simplifying and consolidating the…
-
The quality and, in some cases, the existence of the CISO/CFO relationship varies by company. In organisations where the CISO role is positioned and promoted as a source of value, CISOs and CFOs tend to collaborate more often and more meaningfully than in companies that treat information security as a cost center (and typically struggle with cybersecurity as a result).
Protiviti’s 2021…
-
As CEOs and boards become more informed about the extreme threats that cybersecurity lapses pose, their expectations are growing. CFOs’ expanding contributions to fortifying organisational data security, the highest priority identified in Protiviti’s latest Global Finance Trends Survey, play a pivotal role in satisfying those high expectations. Board members demand coherent, relevant and…
-
In coding, libraries make developers’ lives easier, sparing them thousands of lines of code, while also increasing performance and security. And everyone’s concerned with security as fault-tolerant quantum computing approaches. Geometry Labs has released the “lattice-algebra” library to bring a high-performance cryptographic library to developers interested in using post-quantum cryptography in…
-
Introduction
Most technology companies today understand that ensuring data privacy and protection is an imperative for their business; however, few manage this process well or even invest enough resources in that effort. As governments and consumers around the world continue to raise their expectations of how technology businesses should handle and process private and sensitive data,…
-
Quantum machine learning, or QML, is one of the three major application categories for quantum computing, along with optimisation and simulation. As we’re working with customers at Protiviti to find advantageous use cases in QML, we rely daily on a tool called PennyLane from Xanadu. Join host Konstantinos Karagiannis, and special cohost Emily Stamm, for a chat with Nathan Killoran from Xanadu to…
-
The holy grail of quantum computing in the near term is a use case that provides advantage. We believe it’s only a matter of time, but major companies have to plan and prepare now so that they are not left behind when these applications arrive. Join host Konstantinos Karagiannis for a chat about quantum computing use cases with Pranav Gokhale from Super.tech. We cover mostly financial customer…
-
Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and…
-
We’re getting close to practical advantage with quantum computing when running optimisation algorithms. Companies interested in being leaders in their industry should already be considering how to harness this promised power with use cases that solve their business problems. But some companies want a better solution that’s advantageous today, even if it’s only quantum-inspired. Join host…