Advisory Services

  • Share

Advisory Library

Advisory library

Title Topic Date
Digital intelligence for data-driven decisions Semphonic data analytics can answer the questions that traditional approaches cannot. Find how EY can assist you with your digital analytics. 20150301June 2015
IT: the game has changed The impact of digital immaturity will be felt by those who drag their heels. Find out more 20150301June 2015
The evolution of recruitment: how digital is disrupting the marketplace Pattern of mobility is changing. Employment offers can be optimised. Find out how we engage with people to attract the best talent from the market. 20150301June 2015
Get ahead of cybercrime: EY’s Global Information Security Survey 2014 Although trusted insiders are still a likely source of a cyber attack, for the first time in 17 years, an EY survey has found that external attacks by ‘hacktivists’, criminal syndicates, state and non-state sponsored attackers are the most likely source. 20141201December 2014
EY and Bravehearts collaborate to launch ChildPlace An Australian-first risk management initiative between EY and Bravehearts is set to shift the way organisations protect children from sexual assault. Read more. 20141201December 2014
Data: protecting your prized asset Data is fast becoming a wave of opportunity and has an economic value. Is your valuable data secure enough? Learn more. 20141201December 2014
Email - Fast, efficient and dangerous While email is the preferred communication method for many businesses, it is extremely popular amongst fraudsters, spammers and those wishing to distribute malicious software. Read more on how to minimise your exposure. 20141201December 2014
Data breaches - It’s not a matter of ‘if’; but 'when' Data breaches are inevitable and no system is 100% secure. Organisations must prepare for the worst. Find out how organisations can reduce the level of chaos and some of the more common mistakes to avoid 20141201December 2014
Fostering sustainable growth Chief Risk Officers are being called upon to help business bridge the gap between strategy and operational performance like never before. Read about how to find the right balance between risk, cost and reward. 20141201December 2014
Security Operations Centers against cybercrime A well-functioning Security Operations Center (SOC) can form the heart of effective cyber attack detection. Here are 10 ways to make your SOC a success. 20131101November 2013
Beating cybercrime - Security Program Management Helping board members and C-level decision-makers understand the relationship between your responsibility, the scale of cyber threat, and a suggested approach focused on your business structure, culture and risks. 20131001October 2013
Elevation to the next generation of shared services Organisations with high-performing Shared Services Centres are considerably better placed to handle the uncertainties of today’s market place and deliver better results for stakeholders. 20130530May 2013
Ten IT considerations for internal audit Want to increase confidence in your IT internal audit risk assessment? We outline the IT trends to consider. 20130301March 2013
Unlocking the power of SAP's governance, risk and compliance technology A robust GRC technology solution can act as assurance for the entire organization. Learn about the solutions of SAP. 20130301March 2013
Smart Control: growth, reduced costs and a safe business Many organizations view their control environment as expensive, of limited value or a hindrance. Make sure to get the full potential benefit with our approach. 20130101January 2013
Privacy trends 2013 - The uphill climb continues Digital technology is transforming businesses, creating not only opportunities but also privacy risk and responsibilities. Are organizations and regulators doing enough to safeguard sensitive information? 20130101January 2013
Integrated governance: effective business continuity management Integration between business and IT is critical to business continuity and disaster recovery success. Is your organization able to effectively respond to and manage risks? 20121201December 2012
Governance, risk and compliance technology: turning risk into results A robust GRC process and technology solution can help embed risk management requirements and practices into daily business activities, streamlining processes for improved financial performance. 20121101November 2012
2012 Global Information Security Survey As the speed and complexity of technology accelerates, the gap in your information security program grows. Is your organization doing enough to close the gap? 20121001October 2012
The DNA of the COO With a bird's eye view over a company's operations and strategic know-how, COOs are ideally placed to improve its success. We explore what it takes to be a COO today. 20121001October 2012
Strategy deployment through portfolio management A risk-based portfolio management approach forces organizations to focus on projects that matter and helps manage the risk of their transformation in an integrated way. 20121001October 2012
Integrated reporting: driving value Investor reporting expectations have evolved. Leading companies use integrated reporting to provide more complete performance metrics and measurements to improve communication, processes and efficiencies. 20120201September 2012
The DNA of the CIO What makes a leading CIO? Gain insights into the aspirations of those in the job, and the skills they need to master to succeed. 20120201September 2012
Do not let your supplier take you down Procurement has an increasing role in addressing new legal and regulatory guidelines for transparency and reduced risk. Do you understand how your suppliers do business? Read more. 20120201September 2012
The future of internal audit is now We explore actions internal audit can take to realize strategic alignment, increase business relevance and achieve a risk maturity that accelerates financial performance. 20120201July 2012
Think beyond your annual audit plan Chief audit executives often lose focus on long-term strategic planning for the internal audit function. Is your plan aligned to the organization's broader business priorities? 20120201June 2012
Protecting and strengthening your brand As social media reinvents business relationships, we look at the rise of consumer media, understanding its risks, holistic social media governance, and brand protection. 20120201May 2012
Shared support services costs: are you transparent? Increasingly, regulators ask utilities to provide more rigorous justification of all operating expenses and capital investment decisions. Are your shared support services costs sufficiently transparent? 20120201May 2012
Improving business and operations planning Companies that manage sales and operations planning purely as a supply chain process are not seeing the bigger picture. 20120201May 2012
Ready for takeoff - Preparing for your journey into the cloud Organizations are looking at cloud computing to increase effectiveness of IT initiatives, reduce costs, increase operational flexibility and generate a competitive advantage. Are you prepared? 20120201 April 2012
Turn risks and opportunities into results 2013 We explore the top risks and top opportunities for businesses in light of the current economic environment. 20120201 April 2012
Power and utilities: improving safety and reducing costs Eliminating obstacles between supply chain and work management can yield significant cost savings. We identify the challenges and opportunities in improving interactions between these functions. 20120201 April 2012
This time it's personal: from consumer to co-creator Our survey shows that digital technology is altering customer behavior beyond recognition. Is your marketing flexible enough to adjust to the trends and remain relevant? 20120201February 2012
Turning risk into results Companies with more mature risk management practices outperform their peers financially. Find out how leading companies are turning risk into results. 20120201February 2012
Mobile device security We explore methods to assess and mitigate the risks related to today's most popular mobile device platforms and technologies. 20120101January 2012
Bringing IT into the fold A coordinated, strategic response that addresses the dynamic nature of cybersecurity and the rapidly changing operational technology (OT) environment demonstrates responsible risk management. 20120101January 2012
Privacy Trends 2012: The case for growing accountability To achieve greater accountability, many organizations will have to rethink their approach to privacy. 20120101January 2012

Connect with us

Stay connected with us through social media, email alerts or webcasts. Or download our EY Insights app for mobile devices.