Advisory Services
Advisory Library
Advisory library
| Title | Topic | Date |
|---|---|---|
| Do not let your supplier take you down | Procurement has an increasing role in addressing new legal and regulatory guidelines for transparency and reduced risk. Do you understand how your suppliers do business? Read more. | September 2012 |
| The future of internal audit is now | We explore actions internal audit can take to realize strategic alignment, increase business relevance and achieve a risk maturity that accelerates financial performance. | 20120201July 2012 |
| Think beyond your annual audit plan | Chief audit executives often lose focus on long-term strategic planning for the internal audit function. Is your plan aligned to the organization's broader business priorities? | 20120201June 2012 |
| Protecting and strengthening your brand | As social media reinvents business relationships, we look at the rise of consumer media, understanding its risks, holistic social media governance, and brand protection. | 20120201May 2012 |
| Shared support services costs: are you transparent? | Increasingly, regulators ask utilities to provide more rigorous justification of all operating expenses and capital investment decisions. Are your shared support services costs sufficiently transparent? | 20120201May 2012 |
| Improving business and operations planning | Companies that manage sales and operations planning purely as a supply chain process are not seeing the bigger picture. | 20120201May 2012 |
| Ready for takeoff - Preparing for your journey into the cloud | Organizations are looking at cloud computing to increase effectiveness of IT initiatives, reduce costs, increase operational flexibility and generate a competitive advantage. Are you prepared? | 20120201 April 2012 |
| Turn risks and opportunities into results 2013 | We explore the top risks and top opportunities for businesses in light of the current economic environment. | 20120201 April 2012 |
| Power and utilities: improving safety and reducing costs | Eliminating obstacles between supply chain and work management can yield significant cost savings. We identify the challenges and opportunities in improving interactions between these functions. | 20120201 April 2012 |
| This time it's personal: from consumer to co-creator | Our survey shows that digital technology is altering customer behavior beyond recognition. Is your marketing flexible enough to adjust to the trends and remain relevant? | 20120201February 2012 |
| Turning risk into results | Companies with more mature risk management practices outperform their peers financially. Find out how leading companies are turning risk into results. | 20120201February 2012 |
| Mobile device security | We explore methods to assess and mitigate the risks related to today's most popular mobile device platforms and technologies. | 20120101January 2012 |
| Bringing IT into the fold | A coordinated, strategic response that addresses the dynamic nature of cybersecurity and the rapidly changing operational technology (OT) environment demonstrates responsible risk management. | 20120101January 2012 |
| Privacy Trends 2012: The case for growing accountability | To achieve greater accountability, many organizations will have to rethink their approach to privacy. | 20120101January 2012 |
| The Eurozone debate continues | Despite the short-term gloom and uncertainties around the future, we still expect the Eurozone to stabilize in 2012. Learn why in our latest Eurozone Forecast. | 20111201December 2011 |
| Plugging the $100 million gap | Economic challenges and aggressive performance promises require operations executives to play a larger role in broader business strategy development. Improving performance requires a focus on reliability and predictability, a more customer-centric approach and planning for the unexpected. Are you ready for the supply chain's new era? | 20111201December 2011 |
| Attacking the smart grid | Penetration testing has become the latest trend in the ICS space; however, the cultural and technological differences between control systems and traditional IT systems have caused confusion around how to perform a penetration test safely and effectively. | 20111201December 2011 |
| Avoiding supply chain stumbles | A stumble at any point in the supply chain lifecycle could result in a deterioration of shareholder value and damage to the brand. Through standardizing their operating processes, IT systems and data management, companies can minimize operating stumbles and improve service level performance by focusing on simplicity and reliability. | 20111101November 2011 |
| Into the cloud, out of the fog | In an increasingly virtual world, our 2011 Global Information Security Survey examines business risks associated with technologies like social media, mobile computing and the cloud. | 20111101November 2011 |
| SOX function transformation | Many organizations still treat the SOX function as a difficult compliance exercise. The results of our survey show that there is opportunity to channel inventive approaches and practices with automation, off shoring, IT investment and innovation. These are new ways for your SOX function to add value across the organization. | 20111001October 2011 |
| A path to making privacy count | Five steps to integrating privacy protection into IT transformations. | 20111001October 2011 |
| Building confidence in IT programs | Key issues to blame for IT program failures are often not being properly identified until after they have occurred, and there has never been a better or more important time for organizations to review how they plan, execute and realise benefits from strategic IT programs. | 20110901September 2011 |
| How to respond to catastrophic events | The unexpected and catastrophic nature of a "black swan" event requires a flexible response to minimize impact and enable an effective recovery. Read principles and protocols to assist your organization in responding proactively to these unpredictable events. | 20110801August 2011 |
| Business continuity management | 10 actions leading organizations take to maximise chances of success in the wake of disaster. | 20110801August 2011 |
| Turn risks and opportunities into results | Regulation and compliance risks remain the most serious concern for global firms while improving strategic execution across business functions presents the most opportunity. Learn more from our latest research on the top risks and opportunities in business today. | 20110601June 2011 |
| 2011 European attractiveness survey | Perhaps surprisingly, Europe ranks second only to China as the world's most attractive investment region. How can it maintain its competitiveness as a region in the global economy in 2011? And which growth drivers – cleantech, digital innovation, or other ideas – will be the keys to its future? | 20110501May 2011 |
| Information security in a borderless world | What are the information security measures companies should take in today's hyper-connected, borderless world? Find the answers in our report. | 20110401April 2011 |
| What insurers need to do about the medical loss ratio (MLR) | The introduction of the MLR reporting and rebate provisions in Patient Protection and Affordable Care Act (PPACA) drives the need for health plans to develop new management disciplines to help minimize the effects of MLR on profitability. Find out what steps Insurers need to take now to understand their Medical loss ratio (MLR) rebate exposure. | 20110401April 2011 |
| Competing for growth: how business is growing beyond boundaries | From entering new markets, developing new products and services and cultivating and retaining talent, our global survey of more than 1,400 companies reveals what successful businesses are getting right in the new economy. | 20110401April 2011 |
| Straight talk about IT performance | Evidence of innovative IT solutions is everywhere. But you might be asking yourself, why can't my IT team do that? You're not alone. Our survey on IT performance explores the gap between what the C-suite expects and what IT delivers. We offer ideas for how to bridge the distance. | 20110401April 2011 |
| Building value through control efficiency | The roads to increased efficiency, better returns, heightened transparency and more confident stakeholders can all intersect at control environment improvement. Learn more. | 20110401April 2011 |
| Convey the health of your internal controls instantly | How can a company's Internal Audit function go deeper to help gauge the organization's overall health? Get the answer in our series, 5 insights for executives. | 20110301March 2011 |
| Five things you ought to know about ICD-10 | ICD-10 will multiply and alter the codes US providers and payers use for coding medical information. The number of available codes will expand from 24,000 to 155,000. Are you ready for ICD-10? | 20110301March 2011 |
| Improve your odds with driver-based decision-making | Without concrete information, leaders sometimes rely on intuition to make decisions. A driver-based approach gives leaders the insights they need for more strategic decision-making. | 20110301March 2011 |
| Is your control environment costing too much? | Regulations for increased accountability continue to rise, as do calls from investors and shareholders for improved performance. Is your control environment as effective as possible? Find the balance between cost and risk to improve control efficiency. | 20110101January 2011 |
| Five actions to avoid losing customers or their profitability | Global economic uncertainty has caused consumers to think twice before they make a purchase and they also expect more for their money. Is your company able to sustain market share and maintain profitability in this challenging environment? | 20110101January 2011 |
| Internal audit case study: Is cosourcing the right move? | Four leaders of XYZ Group consider cosourcing as part of their Internal Audit strategy. Get their perspectives on whether cosourcing is the right move for XYZ. | 20101001October 2010 |
| New information technology is both friend and foe | In a world of anytime, anywhere access to information, traditional security efforts are not enough. Our survey explores the risks and obligations you face to keep information secure. | 20100901September 2010 |
| Throwing money at your risk problems | Companies are haphazardly spending big on governance, risk and compliance programs but seeing little return. What does a cohesive risk strategy look like? Find the answer in our report. | 20100901September 2010 |
| Countering cyber attacks | Businesses need to instill a new mind-set and approach toward the organization's information security strategy which involves several layers of defense. Are you keeping your intellectual property safe enough. | 20100801August 2010 |
| Does your Internal Audit function have a seat at the table? | To be the strategic advisor executives want, Internal Audit has to have a seat at the table. Read our report to learn why Internal Audit should be involved in all strategic decision-making. | 20100801August 2010 |
Contact us
Connect with us
Stay connected with us through social media, email alerts or webcasts. Or download our EY Insights app for mobile devices.
Business risks fuse with IT risks
Managing IT risks today is more about managing business risks as a whole. What can you do to help minimize IT risks?
Short, snappy and to the point,
5's innovative format provides analysis of today's issues.
Make an impact
Work with multi-disciplinary teams, on multi-faceted projects, helping our clients to manage risk and improve performance.
Consider joining us.
