Cybersecurity

In Technology Consulting

Our cybersecurity team provides clients with a clear view of their current cybersecurity risk posture as well as the means to create, improve and operate the capabilities needed by the business. We offer specialist services across cybersecurity strategy and transformation, data privacy, digital identity, cloud security architecture, operational technology (OT) security, next generation threat detection and response, and penetration testing.

What EY can do for you?

Our cybersecurity strategy and transformation team helps clients design, execute and embed their core cybersecurity risk management processes in an effective way, thereby improving risk culture and enabling the business to thrive in the face of disruptive cyber threats. 

Our data privacy and protection (DPP) team provides services and solutions to help clients make informed decisions about their information over the full data lifecycle from a security, legal and ethics perspective. 

Our digital identity team collaborates with clients to create innovative solutions, designing a trusted digital identity and access management (IAM) ecosystem from strategy to execution across on-premise and cloud estates. We deliver scalable, flexible full lifecycle identity solutions from assessments to managed identity services.

Our cybersecurity architecture, engineering and emerging technologies team helps clients protect their enterprises from adversaries that seek to exploit weaknesses in the design and operation of the technical security controls. Our services are particularly focussed on enabling a safe journey from traditional IT to cloud technologies.

Our next generation managed security operations and response team help clients design, build and run the next generation of security operations centres and offensive cyber capabilities.

Core Client Service Offerings:

  • Cyber, strategy, risk, compliance and resilience

    • Cyber maturity assessment (IT/OT)
    • Strategy and governance definition
    • Cybersecurity programme delivery
    • Cybersecurity framework review and refresh
    • Cybersecurity training and awareness
    • Chief Information Security Officer (CISO) labs and Cybersecurity for board members
    • Virtual "CISO As a Service"
    • Third-party cybersecurity risk management review
    • Cyber resilience planning, business continuity and disaster recovery (BC/DR) planning
    • Incident response - readiness and response
    • Scenario ("war-gaming") design and delivery

    Learn more

  • Data protection and privacy

    • Privacy gap and maturity assessment and audit
    • Data classification, categorisation and security controls
    • Privacy strategy definition and target operating model
    • Privacy programme implementation and management
    • Data privacy impact assessments (DPIAs)
    • Data discovery, data flow mapping and data inventory mapping
    • Data governance assessment and strategy definition
    • Data protection controls assessment and implementation

    Learn more  

  • Identity and access management

    • Digital identity strategy and  governance
    • Digital identity design and implementation
    • Privileged access management
    • Identity as a service
    • Digital identity innovation

    Learn more

  • Next generation security operations centre

    • SOC advisory services
    • SOC tranformation services
    • "Security Orchestrator As a Service"
    • Threat detection and response
    • Advanced incident response
    • Cyber threat intelligence
    • Threat and vulnerability management
    • "Red teaming" 
    • Penetration testing

    Learn more

  • Security architecture, engineering and emerging technologies

    • Security architecture strategy and governance
    • Security architecture design and implementation
    • Cloud security 
    • Cybersecurity Mesh Architecture (CSMA)
    • Security automation
    • DevSecOps
    • Identity and Access Management (IAM) and "Zero Trust" network architecture
    • Operational Technology/"Internet of Things" (OT/IoT) security
    • SOC implementation services

    Learn more

Download the report

Technology Consulting brochure

Our Technology Consulting teams provide strategic advisory, full stack implementation and managed services across emerging and established technologies.

Download

How EY Technology Consulting can help

Contact us

Interested in the changes we have made here? 

Contact us to find out more.