As many organizations have learned, sometimes the hard way, cyber attacks are no longer a matter of if, but when.
For EY Advisory a better working world means solving big, complex industry issues and capitalizing on opportunities to help deliver outcomes that grow, optimize and protect our clients' businesses.
Our global mindset and collaborative culture across our diverse team of consultants and industry professionals inspire us to ask better questions about the cybersecurity challenges you face. We then team with you to co-create more innovative answers – to activate a foundation that protects the business as it is today, adapt that foundation as the organization and threats change, and anticipate attacks that may be coming.
Together, we help you deliver better outcomes and long-lasting results, from strategy to execution.Read more
- Why we exist
At EY, our purpose is to build a better working world for our clients, our people and our communities. We strive to help create a legacy of improved business performance, confidence and trust.
- How we do it
We team globally to co-create more innovative answers with our clients. The unique and ongoing collaboration between EY consultants and our clients results in better working businesses.
We work long-term with diverse organizations including businesses, governments, military forces and charities to increase confidence, and maintain vigilance to thwart the efforts of cybercriminals – whatever form they take. And we chooseexactly the right people and bring the best and newest thinking to your issue.
- What we do
We solve big, complex issues and capitalize on opportunities to help deliver better working outcomes that grow, optimize and protect our clients' businesses now and in the future.
Cybersecurity is not just a technology issue. It's much broader than that: it's a fundamental business issue. We embed ourselves deeply in your organization, get to know you and your threats inside out, and help you see that the threatsare often much broader, and the solutions needed are much deeper, than you may have realized.
We help you activate, adapt and anticipate to improve your cybersecurity on a global basis. By equipping you with knowledge and resources you can move up a trajectory of greater capability and protection.
We help you work out what you need to do by carrying out a cyber program assessment, helping you identify your most important or critical assets – whether that's IP or automated machinery. That points the way to activate the cybersecuritymeasures you need first and foremost – building a solid foundation of defense against cyber attacks.
We help you develop an organization-wide strategy based on your cybersecurity risks, vulnerabilities and needs. With a unified approach and set of measures, we help make sure that everyone within the organization is aware of cybersecurityand their role in protecting against it.
In the long term, you need to develop tactics to detect and deter potential cyber attacks, and rehearse what happens in a likely attack or accident scenarios. To do this we help you build a robust risk assessment methodology and anexperienced incident response mechanism – all to take your organization to a point where it's informed and prepared.
By implementing our cyber threat intelligence capabilities, we help you see the big, detailed picture of your vulnerabilities, understanding the full attack surface: from skilled and persistent hackers to the potential of accidentalbreaches caused by innocent mistakes internally; from employees' own mobile devices to the potential areas of exposure in technology you're implementing.
We also support you in your moves to create a cyber ecosystem that protects not only your organization, but also those that you're linked to and implicitly trust – such as supply chain partners.
Global Information Security Survey 2018/2019
Most organizations believe they are at high risk in today’s cyber-threat landscape. However, despite tools and processes to repel common attacks, many remain wide open.
Will fixing a security breach lead to future-state cybersecurity?
We helped a large medical center recover from a security breach by analyzing the cause and recommending administrative and technical changes to mitigate the impact. We then designed a multiyear cybersecurity operating model with robust processes and tools to help future-proof its security operation center (SOC).Contact us
Should you protect your infrastructure, or protect your “crown jewels”?
We helped a global life sciences company rationalize its information security operating model and governance structure into one global 24/7 cybersecurity management program, with prioritized defense for its critical intellectual property (IP), protecting against cyber attacks.Contact us
Can identifying current gaps in cybersecurity produce opportunities for long-term improvement?
We helped a global automotive company evaluate its existing security posture and risk exposure, and identify areas for improvement. We then created a multiyear road map to align its cybersecurity program to current threats and emerging technologies, its risk tolerance and its future business objectives.Contact us
When is ''good'' simply not good enough?
We helped a global equipment manufacturer build on its substantial security measures. We developed a transformation road map to upgrade its operating model, incident responses and IP protection; this helped the company better prioritize and implement initiatives to detect, respond to and defend against cyber crime.Contact us
Can you protect your business by better protecting your customers' information?
We helped a large cable and telecom service provider improve protection for its customers' credit card information through Payment Card Industry (PCI) security assessment and transformation, changing the company's attitude to the role of tools, processes and people in managing and reducing risk in the process.Contact us
Can becoming more compliant give you more security confidence?
We helped an airline that relied on online sales improve its payment processing system, knowing that a cyber breach could be catastrophic. We devised a Payment Card Industry (PCI) Data Security Standard (DSS) remediation program to reduce business risk and improve focus on delivering PCI compliance.Contact us
Can your competitors' leading practices lead you to success too?
We helped a multinational pharmaceutical company create its future cybersecurity strategy, based on that of its competitors and peers. After a maturity assessment, we identified areas for improvement, and developed a transformational road map for organizational process, people and technological change.Contact us
How we can help
At EY, we have an integrated perspective on all aspects of organizational risk, and cybersecurity is a key area of focus where EY is an acknowledged leader in the current landscape of mobile technology, social media and cloud computing.
Cyber Program Management
EY's Cyber Program Management (CPM) framework is built upon a meaningful analysis of how information security fits into your overall risk management structure.
How we can help.
Organizations are facing not only escalating risk, but also the near-certainty that they will suffer an information security breach.
A sharp focus on business structure, culture and risks will enable an organization to better safeguard the data essential to its survival and success. For many companies, this requires a fundamental transformation in how information security is understood within the business.
Creating a security program around intelligence on threats and also business risks will support resilience in a constantly shifting landscape of risk; however, few companies today have the appropriate skills and resources in-house to effectively secure their information assets and at the same time optimize business performance.
Organizations in all sectors can benefit from an objective assessment of their information security programs and structures. EY's Cyber Program Management (CPM) framework is built upon a meaningful analysis of how information security shapes and fits into an organization's overall risk management structure.
A CPM assessment assists with:
- Understanding your organization’s risk exposure
- Assessing the maturity of your current cybersecurity program and identifying areas for improvement
- Building a prioritized roadmap for project investments and organizational change initiatives
- Collecting information to create benchmarks against other organizations
- Validating that your security investments have improved your security posture
Cybersecurity Incident Simulation
Regulators worldwide, in the US, across Europe and Asia-Pacific, are specifically calling out their expectation that testing cyber resilience through thorough crisis management exercises is very much required as part of basic corporate risk management. This means that boards and senior management need to be prepared and practiced in responding to a major crisis caused by a cybersecurity incident. It’s clear that rehearsing through simulation exercises is often the best way to achieve this.
A response plan that has not been tested is as useful as having no plan at all. The midst of a cybersecurity incident is not a good time to test the plan. Scenario-based testing of your cybersecurity incident response capability is a high-impact way of engaging your response teams (which includes executive leadership and not just the IT team) in the business decision-making process that goes with reacting to a critical incident. Regular testing of your response plans will help everyone involved to be familiar with the process and prepare them to react when a critical incident occurs.
Cyber Breach Response & Investigation
The annual cost to the global economy from cybercrime is estimated to be US$445 billion.1 As businesses across every industry fall victim to cyber attack, all corporate offi cers and functions — from the board, executive management, risk functions and general counsel to business units and information technology (IT) — are being profoundly affected.
Take, for example, a Fortune 50 global retailer that disclosed a data breach in September 2014. After stealing credentials from a vendor, hackers were able to break into the retailer’s networks, install malware, and steal 56 million credit card numbers and 53 million email addresses over five months before the compromise was discovered and eradicated. This has had operational, legal and financial impacts. The retailer hired two external forensic investigation fi rms to investigate and remediate the technical aspects of the breach. In addition, fi ve outside law firms were engaged in order to address the legal ramifications of over 40 civil suits stretching across multiple countries, in which customers and financial institutions have alleged negligence in protecting consumer data. The retailer is further being investigated by several state attorneys general in the United States. As the company’s own SEC filing stated, “These claims and investigations may adversely affect how we operate our business, divert the attention of management from the operation of the business, and result in additional costs and fines.”
Cybersecurity Compromise Diagnostic
Cyber attacks make headlines on a daily basis. It’s no longer a question of if your organization will be breached, or even when, it’s likely to have happened already.
Cyber attacks are complex and motivated by a variety of factors, ranging from ideology and financial gain to commercial espionage and even nation state-driven agendas.
The threats are constantly evolving, targeting all organizations, while becoming more prevalent and high-profile. Attackers today are patient, persistent, and sophisticated, and attack not only technology, but increasingly people and processes.Criminals are targeting commercially sensitive information, intellectual property and critical network infrastructure. These threats may come from attackers both within and outside yourorganization.
Some of these may seem harmless and others far more damaging and malicious in their intent. Nevertheless, any intrusion into an organization’s computer systems can lead to operational expense, reputational damage and loss ofcompetitive advantage, not to mention regulatory fines. No organization wishes for its closely guarded secrets to be traded or leaked, or its brand to suffer from adverse media attention.
For more details, download this publication.
We are a team of consultants and industry professionals with a global mindset and a collaborative culture.
The skills and resources needed to address cybersecurity are extremely scarce within clients’ organizations, so we train, develop and deploy those resources in your organization, to embed that deep experience so you can protect yourselves in the long term.
We work hard to understand our clients’ issues and are driven to ask better questions in the pursuit of making their businesses work better.
- How do you need support with ideas or resources to design a future-state cybersecurity operating model?
- How can we help you protect your IP?
- What new internet-connected technologies will emerge and pose a threat to your organization?
- How is it that one of your competitors has beaten you to market with a new product that you secretly had in development?
- How do you roll out smart metering in developing countries and keep it secure?