Please wait while we redirect you to our new site Skip to main navigation

Information security: Into the cloud, out of the fog | IT Risk and Advisory services | Ernst & Young - Ernst & Young - Global

  • Share

Into the cloud, out of the fog

Ernst & Young’s 2011 Global Information Security Survey

Our 2011 Global Information Security Survey confirms the importance of information security as more businesses move into the virtual world. Are you prepared for the risks? Read our survey analysis and view our webcast for discussions about technologies like social media, mobile computing and the cloud.


Our insights on Information Security

A path to making privacy count

A path to making privacy count

Technology has enabled organizations to collect and store reams of personal information electronically. But as business demands often outpace integrated IT solutions, managing the security and privacy of that information often occurs over a patchwork of existing and legacy systems. Read five steps to integrating privacy protection into IT transformations.

Data loss prevention: keeping your sensitive data out of the public domain

The blurry line between work and personal use of data can result in leaks – unintentional or malicious. Learn to identify and address these leaks.

The evolving IT risk landscape

Security risks posed by mobile computing, cloud computing, virtualization, social media and online payments are a critical issue for investors, regulators, shareholders and executives.

Business continuity management

Are you prepared for disaster? Many companies have not taken steps to address potential disruptions.

Countering cyber attacks

Countering cyber attacks

Traditional methods of providing security are not enough to protect against "Advanced Persistent Threat" attacks. Organizations should consider measures to detect and react to successful attacks.

Building confidence in IT programs

Despite increased investment, organizations fail to deliver on large IT programs. Learn how engaging independent Program Risk Management (PRM) assistance can help build and sustain confidence.

Information security in a borderless world: time for a rethink

What are the information security measures companies should take in today's hyper-connected, borderless world? Find the answers in our report.

Thought Center Webcasts On-demand

Webcast: Information security risks facing business
Watch a discussion of our 14th annual Global Information Security Survey highlighting virtual risks as cloud computing, social networking and mobile devices become more common.

Learn more about our services

black and white clouds

Information Security
Services

The new security model needs to be predictive and proactive. Our people help you develop information security programs that build trust in a borderless world.

 

waves crashing over a light house

Advanced Security Centers

See how our Global Advanced Security Centers (ASCs) can help you keep your company safe.


Advocates for cloud security

We are now a corporate member of the Cloud Security Alliance (CSA) which advocates for security in cloud computing. Read the press release.


Contact us

Wonder if your information is secure enough? Contact us. We can help.  


Why not join us?

Click here for job opportunities in our IT Risk and Assurance services.

Back to top