Cybersecurity and Privacy Consulting

Organizations must increasingly rely on new and disruptive technologies to help them grow and differentiate in the evolving cybersecurity marketplace.

Related topics
AI version of Women using Mobile

What EY can do for you

EY offers a Security by Design approach that can infuse cybersecurity, privacy and business resilience into every part of any organization and ecosystem. The demonstrable knowledge, well designed frameworks and approaches support us to design the leading solution for our client's most complex cybersecurity and privacy challenges. We help design, implement and run solutions that are on the Cyber and Privacy leaders' agenda.

EY Cybersecurity enables trust in systems, process design and data, so organizations can

  • Take more risk,
  • Make transformational change and
  • Enable innovation with confidence.

EY teams accomplish the mission by developing solutions that can be used to bridge and balance between needs of the business and security. We achieve this by combining our deep technical skills along with the strategic business acumen to look at security holistically across the enterprise.

Read more about our specific services below!



Why EY Cybersecurity and Privacy Consulting services?

  • We are a Trusted advisor: Building trust with our clients, co-innovating and co-creating.
  • We have a Broad scope of services and solutions that are fit for purpose.
  • We bring Global capabilities with local delivery: More than 12 000 Cyber and Technology Risk consultantscovering 150 countries, with 63 global security centers and over 20 years of experience.
  • In the Nordics, we have 160+ people working with Cybersecurity and Technology Risk across 5 cities. Our Helsinki team works in close collaboration especially with our Oslo team, where we have concentrated our technical capabilities as an Advanced Security Center. We collaborate closely with our 1200 Cybersecurity consultant colleagues across Europe.
  • We Act as a bridge between the business and security organization.

EY Cybersecurity teams support the CISO, the technologists, the innovators, the DPO, and the cybersecurity and privacy professionals in our client’s organizations as they seek to achieve maximum benefit from their cybersecurity and resilience investments and infrastructure. EY teams support the c-suite as they explore their risk landscape and appetite and consider the cybersecurity solutions for their current strategy and future state. The aim is to achieve trust and confidence across the organization and build and maintain trust with EY client’s customers and stakeholders.


Our latest thinking

How AI navigates third-party risk in a rapidly changing risk landscape

Learn what the 2025 EY Third-Party Risk Management survey reveals about new AI-driven approaches to managing risks in a more volatile environment.

24 Apr 2025 Chris Watson +1

How to avoid cyber pitfalls in M&A by rebooting diligence practices

Low maturity of cybersecurity due diligence practices present risks to deals – myths and outdated practices remain challenging to scrap

17 Jan 2024 Niko Marjomaa

Evolution of cybersecurity strategies: implications for business

In strategic transformations, cybersecurity becomes a leadership and board topic, yet few cyber strategies meet needs of today’s business.

17 Jan 2024 Niko Marjomaa

How can cybersecurity sow the seeds for competitive business growth?

Companies in the forestry industry must focus their efforts on five key cybersecurity priorities to stay successful in 2023 and beyond.

30 Nov 2023 Jukka Lauhia +1

How to get more for your security dollars

In this episode of the EY Microsoft Tech Directions podcast, we discuss the benefits of simplifying security and how best to spend money doing so. Learn more.

28 Apr 2023 37m 19s

How will DORA impact financial services in the Nordics?

EY consultants met with Leaders from the Swedish Bankers’ Association and Insurance Sweden to discuss potential challenges with the Digital Operational Resilience Act (DORA).

24 Mar 2023 David Dymmel David Dymmel +1

Top 10 opportunities for technology companies in 2023

In a volatile business environment, will the bold be rewarded? Now is the time to invest and test the waters with new business models. Read more.

07 Dec 2022

How to gain confidence and value from cybersecurity in transactions

Movement to highly connected world requires rethinking how cybersecurity supports strategic transformations and transactions practices

14 Oct 2022 Niko Marjomaa

Decoding DORA and NIS2: how can your organization prepare?

The final publication of DORA and NIS2, planned for release by the end of 2022, calls for careful preparation from organizations.

26 Aug 2022 EY Denmark

How do you stay on course when the direction keeps changing?

Learn what technology companies need to do to create an agile operating model in today’s unpredictable world.

25 Jul 2022 Channing Flynn +2

How can connected trucks press the gear on cybersecurity?

As we welcome the era of connected trucks, cybersecurity concerns around the large set of data managed by them remain.

22 Jun 2022 Ulrika Eklöf +1

Seven ways telecom operators can power the metaverse

For telecom operators, the metaverse presents two distinct roles: an ecosystem for them to participate in and an ecosystem for them to enable. Read more.

10 May 2022 Adrian Baschnonga

How to land a successful operational technology security transformation

Are you preparing for an OT security transformation? Here’s what you need to know.

29 Jul 2021 Piotr Ciepiela

How digital forensics is defined in litigation and investigation

In this webcast, panelists discuss the nuances of digital forensics in a range of use cases. Learn more.

14 Apr 2021 | 12.30 your local time

How to navigate the next data frontier in eDiscovery

Growing communication channels present challenges to collecting, preserving, reviewing and processing data. Learn more.

15 Feb 2021 Todd Marlin +1

How location tracking is raising the stakes on privacy protection

Managing and securing personal data takes more cross-functional collaboration throughout businesses than ever before.

18 Sept 2020 Meribeth Banaschik

How to manage the risks of phishing and ransomware attacks

In this webcast, panelists will discuss how to prevent, detect and respond to phishing and ransomware attacks.

05 Jun 2020 | 2.30 your local time

    Our latest webcasts

    How to get more for your security dollars

    In this episode of the EY Microsoft Tech Directions podcast, we discuss the benefits of simplifying security and how best to spend money doing so. Learn more.

    28 Apr 2023 37m 19s

    How digital forensics is defined in litigation and investigation

    In this webcast, panelists discuss the nuances of digital forensics in a range of use cases. Learn more.

    14 Apr 2021 | 12.30 your local time

    How to manage the risks of phishing and ransomware attacks

    In this webcast, panelists will discuss how to prevent, detect and respond to phishing and ransomware attacks.

    05 Jun 2020 | 2.30 your local time
      Contact us
      Like what you’ve seen? Get in touch to learn more.
      You are visiting EY nordics (en)
      nordics en