• Share

Advisory Library

Advisory library

Title Topic Date
Under cyber attack: Global Information Security Survey 2013 As the pace of technology evolution accelerates, so do cyber risks. Find out how organizations are addressing current threats – and those on the horizon. 20131310October 2013
Beating cybercrime: Security Program Management We help board members and C-level decision-makers understand the relationship between your responsibility, the scale of cyber threat, and a suggested approach that’s sharply focused on your business structure, culture and risks. 20131310October 2013
Security Operations Centers against cybercrime A well-functioning Security Operations Center (SOC) can form the heart of effective cyber attack detection. We present 10 considerations for success. 20131310October 2013
Bring your own device: security and risk in mobile device programs Employers need to control the use of personal mobile devices for conducting work. BYOD policies help improve productivity, enable new business and satisfy employees' needs. 20131310September 2013
Matching Internal Audit talent to business needs: key findings from the Global Internal Audit Survey 2013 Corporate leaders are demanding that IA improve visibility and deliver lasting value. Our Global Internal Audit Survey finds that most IA functions currently lack the specialist skills and competencies to provide strategic business insights and anticipate traditional and emerging risks. 20131307July 2013
Identity and access management: beyond compliance Compliance is still crucial for identity and access management initiatives, but IAM is evolving into a risk-based program. Learn about this foundation of information security. 20130506June 2013
Key considerations for your internal audit plan Want to learn techniques to anticipate and identify the right risks for your internal audit plan? We outline the trends and issues to consider 20130506May 2013
Internal audit's role in strategic transactions During M&A and divestitures, internal audit provides a critical perspective – assessing and monitoring program management, reviewing controls and providing insights while maintaining independence and objectivity. 20130506May 2013
Lessons from change: Key findings from EY's 2012 Financial Services Supplier Risk Survey EY's third annual supplier risk management survey offers the latest insights into SRM programs 20130406April 2013
Unlocking the power of SAP's governance, risk and compliance technology A robust GRC technology solution can act as assurance for the entire organization. Learn about the solutions of SAP. 20130301March 2013
Smart Control: growth, reduced costs and a safe business Many organizations view their control environment as expensive, of limited value or a hindrance. Make sure to get the full potential benefit with our approach. 20130101January 2013
Privacy trends 2013 - The uphill climb continues Digital technology is transforming businesses, creating not only opportunities but also privacy risk and responsibilities. Are organizations and regulators doing enough to safeguard sensitive information? 20130101January 2013
Integrated governance: effective business continuity management Integration between business and IT is critical to business continuity and disaster recovery success. Is your organization able to effectively respond to and manage risks? 20121201December 2012
Governance, risk and compliance technology: turning risk into results A robust GRC process and technology solution can help embed risk management requirements and practices into daily business activities, streamlining processes for improved financial performance. 20121101November 2012
2012 Global Information Security Survey As the speed and complexity of technology accelerates, the gap in your information security program grows. Is your organization doing enough to close the gap? 20121001October 2012
The DNA of the COO With a bird's eye view over a company's operations and strategic know-how, COOs are ideally placed to improve its success. We explore what it takes to be a COO today. 20121001October 2012
Strategy deployment through portfolio management A risk-based portfolio management approach forces organizations to focus on projects that matter and helps manage the risk of their transformation in an integrated way. 20121001October 2012
Integrated reporting: driving value Investor reporting expectations have evolved. Leading companies use integrated reporting to provide more complete performance metrics and measurements to improve communication, processes and efficiencies. 20120201September 2012
The DNA of the CIO What makes a leading CIO? Gain insights into the aspirations of those in the job, and the skills they need to master to succeed. 20120201September 2012
Do not let your supplier take you down Procurement has an increasing role in addressing new legal and regulatory guidelines for transparency and reduced risk. Do you understand how your suppliers do business? Read more. 20120201September 2012
The future of internal audit is now We explore actions internal audit can take to realize strategic alignment, increase business relevance and achieve a risk maturity that accelerates financial performance. 20120201July 2012
Think beyond your annual audit plan Chief audit executives often lose focus on long-term strategic planning for the internal audit function. Is your plan aligned to the organization's broader business priorities? 20120201June 2012
Protecting and strengthening your brand As social media reinvents business relationships, we look at the rise of consumer media, understanding its risks, holistic social media governance, and brand protection. 20120201May 2012
Shared support services costs: are you transparent? Increasingly, regulators ask utilities to provide more rigorous justification of all operating expenses and capital investment decisions. Are your shared support services costs sufficiently transparent? 20120201May 2012
Improving business and operations planning Companies that manage sales and operations planning purely as a supply chain process are not seeing the bigger picture. 20120201May 2012
Ready for takeoff - Preparing for your journey into the cloud Organizations are looking at cloud computing to increase effectiveness of IT initiatives, reduce costs, increase operational flexibility and generate a competitive advantage. Are you prepared? 20120201 April 2012
Turn risks and opportunities into results 2013 We explore the top risks and top opportunities for businesses in light of the current economic environment. 20120201 April 2012
Power and utilities: improving safety and reducing costs Eliminating obstacles between supply chain and work management can yield significant cost savings. We identify the challenges and opportunities in improving interactions between these functions. 20120201 April 2012
This time it's personal: from consumer to co-creator Our survey shows that digital technology is altering customer behavior beyond recognition. Is your marketing flexible enough to adjust to the trends and remain relevant? 20120201February 2012
Turning risk into results Companies with more mature risk management practices outperform their peers financially. Find out how leading companies are turning risk into results. 20120201February 2012
Mobile device security We explore methods to assess and mitigate the risks related to today's most popular mobile device platforms and technologies. 20120101January 2012
Bringing IT into the fold A coordinated, strategic response that addresses the dynamic nature of cybersecurity and the rapidly changing operational technology (OT) environment demonstrates responsible risk management. 20120101January 2012
Privacy Trends 2012: The case for growing accountability To achieve greater accountability, many organizations will have to rethink their approach to privacy. 20120101January 2012

Connect with us

Bleiben Sie mit uns in Kontakt über soziale Netzwerke und Webcasts. Oder laden Sie unser EY Insights App für mobile Geräte herunter.