EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.
How EY can help
-
EY.ai, a platform that unifies human capabilities and artificial intelligence to help you confidently adopt AI. Learn more.
Read more
Opportunity 10
Redefine enterprise security for AI, identity and nation-state threats
AI is now both a force multiplier for attackers and a critical defensive dependency for enterprise operations. The threat landscape is escalating Nation-state actors, criminal syndicates and AI-enabled adversaries are accelerating the tempo, scale and sophistication of attacks. Identity, data and operational supply chain integrity are under continuous assault. At the same time, increased regulatory scrutiny and rising customer trust demands are driving new board-level imperatives. Companies are responding accordingly. Our recent global survey found that tech executives expect to more than double their cybersecurity spend over the next two years to respond to increasingly sophisticated AI threats.
Technology companies must move beyond “table stakes” security to more proactive, AI-powered cyber defense and identity assurance. This includes compressing patch and remediation service level agreements from weeks to hours, automating threat detection and response and embedding continuous authentication. AI systems themselves — models, data pipelines, and agentic workflows — must be secured against prompt injection, data poisoning, and jail breaking. As AI becomes the backbone of critical infrastructure, the cost of failure is systemic: Operational outages, regulatory penalties and reputational damage can cascade across markets and sectors.
With an ever-expanding attack surface due to AI, the opportunity to lead will require continuous learning models to detect issues based upon behavior-based identity management and continuous posture management of APIs and cloud-based software configurations. Ultimately, the opportunity is to lead with integrated security platforms that unify endpoint, cloud, identity and data protection — leveraging AI for both defense and governance. In a world where AI is weaponized by adversaries and demanded by regulators, cybersecurity and identity are no longer IT functions — they are strategic enablers of growth, trust, and market access.