KnowledgeLeader Blog

    External Access Risk: Key Factors You Need to Know

    Posted by Protiviti KnowledgeLeader on Wed, Feb 19, 2020 @ 08:00 AM

    Many businesses today exchange goods, services, information and knowledge using network-enabled technologies. Within such business, the proper protection of confidential information is essential to achieve the desired benefits and mitigate the associated risks. Failure to adequately restrict access to critical business information from outsiders (intruders) may result in unauthorized knowledge and use of confidential information by inappropriate parties.

    Read More

    Topics: IT Audit, Governance, Risk & Compliance, IT Infrastructure, IT Security, IT Risk, Performance Management/Measurement

    How to Effectively Conduct Self-Assessment Meetings

    Posted by Protiviti KnowledgeLeader on Thu, Feb 13, 2020 @ 02:49 PM

    Why are we meeting? What are the objectives of the self-assessment meeting?

    Defining the meeting objectives is the most important aspect of planning a self-assessment meeting. This requires members of the audit team to meet with the auditee in advance to determine their needs and wants. For example, the auditee may ask the auditor to facilitate a self-assessment meeting at the organizational level designed to:

    Read More

    Topics: Audit Planning, Self-Assessment, Performance Management/Measurement

    How to Determine the Most Effective Budgeting Process

    Posted by Protiviti KnowledgeLeader on Thu, Feb 06, 2020 @ 04:15 PM

    A budget is a systematic method of allocating financial, physical and human resources to achieve strategic goals. Companies develop budgets in order to monitor progress toward their goals, help control spending, and predict cash flow and profit.




    Read More

    Topics: Accounting/Finance, Cash & Treasury, Performance Management/Measurement, Budgeting

    What Are the Benefits and Risks Associated With Data Integrity?

    Posted by Protiviti KnowledgeLeader on Tue, Jan 14, 2020 @ 12:00 PM

    Data integrity is the assurance that information can only be accessed or modified by those authorized to access the system. Measures taken to ensure integrity include controlling the physical environment of networked terminals and servers, restricting access to data, and maintaining rigorous authentication practices. Data integrity can also be threatened by environmental hazards, such as heat, dust and electrical surges.

    Read More

    Topics: IT Audit, IT Infrastructure, Cloud Computing, IT Risk, IT Controls, Data Security, Data Analytics, Performance Management/Measurement, Customer Satisfaction

    How Are You Monitoring Your Project Management Risk?

    Posted by Protiviti KnowledgeLeader on Fri, Dec 13, 2019 @ 08:55 AM

    Project management risk is significant because of its lasting implications. By definition, a project is a “temporary endeavor undertaken to create a unique product or service and involves doing something that has not been done before.” Thus, it is reasonable to expect projects to involve a high degree of risk, and statistics support that expectation.

    Read More

    Topics: Project Management, IT Strategy, Performance Management/Measurement

    What You Need to Know About Robotic Process Automation

    Posted by Protiviti KnowledgeLeader on Thu, Jun 20, 2019 @ 04:30 PM

    Are You Familiar With Robotic Process Automation?

    Robotic process automation (RPA) has been gaining traction as an efficient way to automate labor-intensive and repetitive tasks across a variety of business functions, including finance, accounting, technology, legal, HR, and, increasingly, audit and compliance.

    Read More

    Topics: IT Governance, IT Infrastructure, IT Strategy, IT Risk, Energy & Utilities Industry, Performance Management/Measurement, Robotic Process Automation

    Exploring the Big Picture of IT Risk Assessment

    Posted by Protiviti KnowledgeLeader on Thu, Mar 28, 2019 @ 05:26 PM

    Most, if not all, business transactions executed today touch the information technology (IT) environment at some point in their lifecycle. As organizations plan for the next calendar year, it’s logical to regard the IT risk assessment as a critical component that should be reviewed through the internal audit function.

    Read More

    Topics: Laws & Regulations, Compliance, Risk Assessment, Performance Management/Measurement

    How to Use the 5 Best Practices of Inventory Management

    Posted by Protiviti KnowledgeLeader on Fri, Mar 15, 2019 @ 02:20 PM

    Inventory planners and managers today find themselves engaged in a delicate balancing act. On one hand, they strive at all costs to stay competitive in a marketplace that continues to demand more customized products and faster delivery services. On the other hand, they are still obliged to keep the actual cost of maintaining such complex inventory down to a minimum. Despite the dilemma, however, companies that apply best practices know firsthand how an efficient inventory management system can transform a business. Some have even reported improvements of up to 90 percent in throughput times and defect levels.

    Read More

    Topics: Supply Chain, Vendor Management, Accounting/Finance, Performance Management/Measurement, Inventory & Materials Management, Accounts Payable & Purchasing

    Improving the Close-the-Books Process

    Posted by Protiviti KnowledgeLeader on Fri, Mar 01, 2019 @ 10:14 AM

    An effective business process is built on a set of well-defined and clearly stated business objectives. These key objectives articulate the ideal performance results that a company expects from that process. To monitor a business process so it stays focused on reaching the key objectives, a company chooses appropriate performance measures. Careful selection of the performance measures takes a company a long way toward improving a business process. Thus, to build and then continually improve an effective business process, a company establishes:

    Read More

    Topics: Accounting/Finance, Financial Reporting, Close the Books, Performance Management/Measurement

    Intellectual Property: Risks You Need to Know

    Posted by Protiviti KnowledgeLeader on Thu, Feb 21, 2019 @ 05:15 PM

    Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to businesses, given their increased aggressiveness towards intellectual property (IP) theft. These, and any other original creative works that have economic value and are protected by law, can be categorized as IP.

    Read More

    Topics: Enterprise Risk Management, Risk Assessment, Strategic Risk, Data Security, Performance Management/Measurement, Intellectual Property

    Add a Comment:

    About KnowledgeLeader

    KnowledgeLeader, provided by Protiviti, is the premier resource for internal audit and risk management professionals.

    With over 1,400 customizable tools and 1,300 articles by industry experts, we offer the most comprehensive service on the market.

    For more information:

     Tour the Site

    Recent Posts

    Posts by Topic

    see all