Advisory Services

  • Share

Advisory Library

Advisory library

Title Topic Date
Under cyber attack: Global Information Security Survey 2013 As the pace of technology evolution accelerates, so do cyber risks. Find out how organizations are addressing current threats – and those on the horizon. 20131310October 2013
Beating cybercrime: Security Program Management We help board members and C-level decision-makers understand the relationship between your responsibility, the scale of cyber threat, and a suggested approach that’s sharply focused on your business structure, culture and risks. 20131310October 2013
Security Operations Centers against cybercrime A well-functioning Security Operations Center (SOC) can form the heart of effective cyber attack detection. We present 10 considerations for success. 20131310October 2013
Bring your own device: security and risk in mobile device programs Employers need to control the use of personal mobile devices for conducting work. BYOD policies help improve productivity, enable new business and satisfy employees' needs. 20131310September 2013
Matching Internal Audit talent to business needs: key findings from the Global Internal Audit Survey 2013 Corporate leaders are demanding that IA improve visibility and deliver lasting value. Our Global Internal Audit Survey finds that most IA functions currently lack the specialist skills and competencies to provide strategic business insights and anticipate traditional and emerging risks. 20131307July 2013
Identity and access management: beyond compliance Compliance is still crucial for identity and access management initiatives, but IAM is evolving into a risk-based program. Learn about this foundation of information security. 20130506June 2013
Key considerations for your internal audit plan Want to learn techniques to anticipate and identify the right risks for your internal audit plan? We outline the trends and issues to consider 20130506May 2013
Internal audit's role in strategic transactions During M&A and divestitures, internal audit provides a critical perspective – assessing and monitoring program management, reviewing controls and providing insights while maintaining independence and objectivity. 20130506May 2013
Lessons from change: Key findings from EY's 2012 Financial Services Supplier Risk Survey EY's third annual supplier risk management survey offers the latest insights into SRM programs 20130406April 2013
Unlocking the power of SAP's governance, risk and compliance technology A robust GRC technology solution can act as assurance for the entire organization. Learn about the solutions of SAP. 20130301March 2013
Smart Control: growth, reduced costs and a safe business Many organizations view their control environment as expensive, of limited value or a hindrance. Make sure to get the full potential benefit with our approach. 20130101January 2013
Integrated governance: effective business continuity management Integration between business and IT is critical to business continuity and disaster recovery success. Is your organization able to effectively respond to and manage risks? 20121201December 2012
Governance, risk and compliance technology: turning risk into results A robust GRC process and technology solution can help embed risk management requirements and practices into daily business activities, streamlining processes for improved financial performance. 20121101November 2012
2012 Global Information Security Survey As the speed and complexity of technology accelerates, the gap in your information security program grows. Is your organization doing enough to close the gap? 20121001October 2012
The DNA of the COO With a bird's eye view over a company's operations and strategic know-how, COOs are ideally placed to improve its success. We explore what it takes to be a COO today. 20121001October 2012
Strategy deployment through portfolio management A risk-based portfolio management approach forces organizations to focus on projects that matter and helps manage the risk of their transformation in an integrated way. 20121001October 2012
Integrated reporting: driving value Investor reporting expectations have evolved. Leading companies use integrated reporting to provide more complete performance metrics and measurements to improve communication, processes and efficiencies. 20120201September 2012
The DNA of the CIO What makes a leading CIO? Gain insights into the aspirations of those in the job, and the skills they need to master to succeed. 20120201September 2012
Do not let your supplier take you down Procurement has an increasing role in addressing new legal and regulatory guidelines for transparency and reduced risk. Do you understand how your suppliers do business? Read more. 20120201September 2012
The future of internal audit is now We explore actions internal audit can take to realize strategic alignment, increase business relevance and achieve a risk maturity that accelerates financial performance. 20120201July 2012
Think beyond your annual audit plan Chief audit executives often lose focus on long-term strategic planning for the internal audit function. Is your plan aligned to the organization's broader business priorities? 20120201June 2012
Protecting and strengthening your brand As social media reinvents business relationships, we look at the rise of consumer media, understanding its risks, holistic social media governance, and brand protection. 20120201May 2012
Shared support services costs: are you transparent? Increasingly, regulators ask utilities to provide more rigorous justification of all operating expenses and capital investment decisions. Are your shared support services costs sufficiently transparent? 20120201May 2012
Improving business and operations planning Companies that manage sales and operations planning purely as a supply chain process are not seeing the bigger picture. 20120201May 2012
Ready for takeoff - Preparing for your journey into the cloud Organizations are looking at cloud computing to increase effectiveness of IT initiatives, reduce costs, increase operational flexibility and generate a competitive advantage. Are you prepared? 20120201 April 2012
Turn risks and opportunities into results 2013 We explore the top risks and top opportunities for businesses in light of the current economic environment. 20120201 April 2012
Power and utilities: improving safety and reducing costs Eliminating obstacles between supply chain and work management can yield significant cost savings. We identify the challenges and opportunities in improving interactions between these functions. 20120201 April 2012
This time it's personal: from consumer to co-creator Our survey shows that digital technology is altering customer behavior beyond recognition. Is your marketing flexible enough to adjust to the trends and remain relevant? 20120201February 2012
Turning risk into results Companies with more mature risk management practices outperform their peers financially. Find out how leading companies are turning risk into results. 20120201February 2012
Mobile device security We explore methods to assess and mitigate the risks related to today's most popular mobile device platforms and technologies. 20120101January 2012
Bringing IT into the fold A coordinated, strategic response that addresses the dynamic nature of cybersecurity and the rapidly changing operational technology (OT) environment demonstrates responsible risk management. 20120101January 2012
Privacy Trends 2012: The case for growing accountability To achieve greater accountability, many organizations will have to rethink their approach to privacy. 20120101January 2012
The Eurozone debate continues Despite the short-term gloom and uncertainties around the future, we still expect the Eurozone to stabilize in 2012. Learn why in our latest Eurozone Forecast. 20111201December 2011
Attacking the smart grid Penetration testing has become the latest trend in the ICS space; however, the cultural and technological differences between control systems and traditional IT systems have caused confusion around how to perform a penetration test safely and effectively. 20111201December 2011
Into the cloud, out of the fog In an increasingly virtual world, our 2011 Global Information Security Survey examines business risks associated with technologies like social media, mobile computing and the cloud. 20111101November 2011
A path to making privacy count Five steps to integrating privacy protection into IT transformations. 20111001October 2011
Building confidence in IT programs Key issues to blame for IT program failures are often not being properly identified until after they have occurred, and there has never been a better or more important time for organizations to review how they plan, execute and realise benefits from strategic IT programs. 20110901September 2011
Business continuity management 10 actions leading organizations take to maximise chances of success in the wake of disaster. 20110801August 2011
Turn risks and opportunities into results Regulation and compliance risks remain the most serious concern for global firms while improving strategic execution across business functions presents the most opportunity. Learn more from our latest research on the top risks and opportunities in business today. 20110601June 2011
2011 European attractiveness survey Perhaps surprisingly, Europe ranks second only to China as the world's most attractive investment region. How can it maintain its competitiveness as a region in the global economy in 2011? And which growth drivers – cleantech, digital innovation, or other ideas – will be the keys to its future? 20110501May 2011
Information security in a borderless world What are the information security measures companies should take in today's hyper-connected, borderless world? Find the answers in our report. 20110401April 2011
What insurers need to do about the medical loss ratio (MLR) The introduction of the MLR reporting and rebate provisions in Patient Protection and Affordable Care Act (PPACA) drives the need for health plans to develop new management disciplines to help minimize the effects of MLR on profitability. Find out what steps Insurers need to take now to understand their Medical loss ratio (MLR) rebate exposure. 20110401April 2011
Competing for growth: how business is growing beyond boundaries From entering new markets, developing new products and services and cultivating and retaining talent, our global survey of more than 1,400 companies reveals what successful businesses are getting right in the new economy. 20110401April 2011
Straight talk about IT performance Evidence of innovative IT solutions is everywhere. But you might be asking yourself, why can't my IT team do that? You're not alone. Our survey on IT performance explores the gap between what the C-suite expects and what IT delivers. We offer ideas for how to bridge the distance. 20110401April 2011
Building value through control efficiency The roads to increased efficiency, better returns, heightened transparency and more confident stakeholders can all intersect at control environment improvement. Learn more. 20110401April 2011
Convey the health of your internal controls instantly How can a company's Internal Audit function go deeper to help gauge the organization's overall health? Get the answer in our series, 5 insights for executives. 20110301March 2011
Five things you ought to know about ICD-10 ICD-10 will multiply and alter the codes US providers and payers use for coding medical information. The number of available codes will expand from 24,000 to 155,000. Are you ready for ICD-10? 20110301March 2011
Improve your odds with driver-based decision-making Without concrete information, leaders sometimes rely on intuition to make decisions. A driver-based approach gives leaders the insights they need for more strategic decision-making. 20110301March 2011
Is your control environment costing too much? Regulations for increased accountability continue to rise, as do calls from investors and shareholders for improved performance. Is your control environment as effective as possible? Find the balance between cost and risk to improve control efficiency. 20110101January 2011

Kontakt os

If you have any questions regarding our Advisory Services please contact us.

Connect with us

Stay connected with us through social media, email alerts or webcasts.