Privacy & Cyber Response
From investigation, to litigation and regulatory response, EY Cyber Response professionals help organizations navigate through complex cyber attacks.
What EY can do for you
From incident response, to forensic investigation, to litigation and regulatory response, EY Privacy and Cyber Response professionals assist organizations to fight and prepare against complex cyber-attacks.
EY teams have assisted companies in responding to a range of cyber incidents, including personal identifiable information (PII) data thefts, business email compromises, ransomware attacks and credit card theft.
EY teams combine cybersecurity and IT forensic experience with traditional investigative approaches, including interviewing witnesses, interrogating data, and examining physical and digital evidence to uncover all facts pertaining to a breach.
EY teams are experienced in helping address regulatory inquiries and liaising with law enforcement and other authorities. As cyber breaches often span international borders, procedures are tailored to the specific legal and regulatory requirements of each country involved in the investigation by using the global EY Privacy & Cyber Response network, including working work with external legal counsel.
Multidisciplinary teams can help organizations develop data governance frameworks that are supported by appropriate policies and technology so that data protection and privacy compliance is achievable and sustainable in the long run. EY teams also assist in developing GDPR and other relevant data protection and privacy compliance plans that work in conjunction with the organization’s cyber response plan to enable them to respond to a cyber breach in an effective manner within the required time window.
Our latest thinking
- That email may be infected too (pdf)
- GDPR compliance - from planning to action (pdf)
- Who and what is involved in a high-impact cyber response? (pdf)
- Important considerations for responding to ransomware attacks (pdf)
- Cybersecurity in Discovery (pdf)
- In this data-driven world, how do you protect the privacy of your data? (pdf)