\r\n\r\n"}}" id="rich-text-b2b5d023dd0b" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Highlights
Read More Read Less
Global Business Districts Attractiveness
Global Business Districts Attractiveness Report 2025 04 Dec 2025Marc LhermitteGeostrategic Analysis
Geostrategic Analysis 10 Nov 2025Oliver JonesFutures Reimagined
Megatrends 2026 and beyond\r\nEY podcasts
\r\nEY webcasts
\r\nCase studies
\r\n\r\n"}}" id="rich-text-2fbb9aae20bb" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text">
EY podcasts
EY webcasts
Case studies
Read More Read Less Services\r\n"}}" id="rich-text-9e8c0c229fe7" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Services Read More Read Less EY helps clients create long-term value for all stakeholders. Enabled by data and technology, our services and solutions provide trust through assurance and help clients transform, grow and operate.\r\n"}}" id="rich-text-46bb51353217" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> EY helps clients create long-term value for all stakeholders. Enabled by data and technology, our services and solutions provide trust through assurance and help clients transform, grow and operate. Read More Read Less Explore \r\nSee All\r\n1||About EY-Parthenon\r\n2||About EY-Parthenon\r\n\r\n"}}" id="rich-text-6e2b2982f8da" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> See All1||About EY-Parthenon2||About EY-Parthenon Read More Read Less Spotlight\r\n"}}" id="rich-text-6e2e5bfebb6d" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Spotlight Read More Read Less Customer & Growth by EY Studio+\r\nEY.ai - A unifying platform\r\nTechnology transformation\r\nTax function operations\r\nClimate change and sustainability services\r\nEY Ecosystems\r\nEY Nexus platform\r\nEY wavespace™\r\n"}}" id="rich-text-7292536e064a" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Customer & Growth by EY Studio+ EY.ai - A unifying platform Technology transformation Tax function operations Climate change and sustainability services EY Ecosystems EY Nexus platform EY wavespace™ Read More Read Less Industries\r\n"}}" id="rich-text-f0bb09558839" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Industries Read More Read Less Discover how EY insights and services are helping to reframe the future of your industry.
\r\n\r\n"}}" id="rich-text-6f5afe2be90e" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Discover how EY insights and services are helping to reframe the future of your industry.
Read More Read Less Explore See more\r\n"}}" id="rich-text-ca58d73b1bd2" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> See more Read More Read Less Case studies\r\n"}}" id="rich-text-9f7df5124d3c" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Case studies Read More Read Less
Consulting
How AI innovation powers Microsoft’s finance journey 30 Oct 2025EY GlobalEnergy resources
How AI drove data optimization for oil and gas capital projects 06 Aug 2025EY GlobalStrategy and Transactions
Rivada is reimagining wireless internet as a commodity 11 Jul 2025EY Global See all\r\n"}}" id="rich-text-8e29348f9240" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> See all Read More Read Less Careers\r\n"}}" id="rich-text-92a13d1ebe95" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Careers Read More Read Less We bring together extraordinary people, like you, to build a better working world.\r\n"}}" id="rich-text-fcc1536cce8e" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> We bring together extraordinary people, like you, to build a better working world. Read More Read Less Explore See more\r\n"}}" id="rich-text-2fba094ec5f1" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> See more Read More Read Less Spotlight\r\n"}}" id="rich-text-abb9a57b4194" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Spotlight Read More Read Less Experienced professionals\r\nStudent and entry level programs\r\nTalent community\r\n"}}" id="rich-text-2947bfa4f483" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Experienced professionals Student and entry level programs Talent community Read More Read Less About us\r\n"}}" id="rich-text-c6e1d6c447c8" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> About us Read More Read Less At EY, our purpose is building a better working world. The insights and services we provide help to create long-term value for clients, people and society, and to build trust in the capital markets.\r\n"}}" id="rich-text-dff96ddd31d4" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> At EY, our purpose is building a better working world. The insights and services we provide help to create long-term value for clients, people and society, and to build trust in the capital markets. Read More Read Less Explore See more\r\n"}}" id="rich-text-110513799171" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> See more Read More Read Less Top news\r\n"}}" id="rich-text-f137ab6a5cae" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Top news Read More Read LessPress release
EY report indicates CFOs and tax leaders innovating with AI to manage mounting geopolitical turbulence, talent shortages and regulatory developments 18 Nov 2025Renny PopoolaPress release
EY-Parthenon practice unveils neurosymbolic AI capabilities to empower businesses to identify, predict and unlock revenue at scale 10 Sep 2025EY GlobalPress release
New era for corporate treasurers as global volatility spurs need to find fresh growth opportunities 18 Sep 2025Emile Abu-Shakra Search search close search See all results for ' 'No results have been found
Topics
See AllGeneral
See AllPeople
See AllRecent Searches
Trending
What if disruption isn't the challenge, but the chance? Transform your business and thrive in the NAVI world of nonlinear, accelerated, volatile and interconnected change. Discover how. 26 Jun 2025 EY wavespace™ Geostrategic Analysis: February 2026 edition Read the February 2026 Geostrategic Analysis for our take on geopolitical developments and the impact of these political risks on international business. 09 Feb 2026 Geostrategy How can reimagining today's workforce help banks shape their future? By focusing on four bold imperatives, banks can differentiate in the competition for top talent and drive higher returns on people investments. 09 Sep 2025 My EY My EY Select your location Local sites Cyber and privacy leaders' agenda Cyber and privacy leaders must act now to tackle today’s most pressing security challenges. Facebook Twitter LinkedIn "> Link Copied Join the conversation \r\n#TransformationRealized\r\n"}}" id="rich-text-aab50db2512c" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Join the conversation #TransformationRealized Read More Read Less Facebook Twitter LinkedIn "> Link Copied Featured Thinking Reimagine your cyber guardrails to accelerate AI value Richard Watson 21 Oct 2025 It is harder than ever to stay one step ahead of cybersecurity threats. New, more sophisticated adversaries — some operating autonomously and learning from generative AI models - are thriving in a landscape with multiple attack surfaces opened by hybrid and distributed work, cloud computing at scale, and the digitalization of everything. The stakes are high for CISOs.\r\n"Secure Creators” are redefining cybersecurity in their industries. Secure Creators have fewer cyber incidents, were quicker to respond, and provided 1.5 to 2 times more positive impact on their organization in terms of value creation, innovation and responsiveness to market opportunities when compared to their lower-performing counterparts.\r\nThey accomplished this not by simply deploying the right technology, innovating effectively, communicating across their organizations and minimizing attack surfaces, but by executing each of those practices better than their peers. \r\nHere are four actions CISOs can take to better prepare for today and tomorrow: \r\n"}}" id="rich-text-86e64696deaa" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> It is harder than ever to stay one step ahead of cybersecurity threats. New, more sophisticated adversaries — some operating autonomously and learning from generative AI models - are thriving in a landscape with multiple attack surfaces opened by hybrid and distributed work, cloud computing at scale, and the digitalization of everything. The stakes are high for CISOs. "Secure Creators” are redefining cybersecurity in their industries. Secure Creators have fewer cyber incidents, were quicker to respond, and provided 1.5 to 2 times more positive impact on their organization in terms of value creation, innovation and responsiveness to market opportunities when compared to their lower-performing counterparts. They accomplished this not by simply deploying the right technology, innovating effectively, communicating across their organizations and minimizing attack surfaces, but by executing each of those practices better than their peers. Here are four actions CISOs can take to better prepare for today and tomorrow: Read More Read Less Reduce technology complexity Emerging technology presents opportunities and challenges for cybersecurity leaders. Most organizations have an average of 44 security products that are often poorly integrated, difficult to maintain and support, and offer no overall visibility.\r\nSecure Creators embrace technology but with an eye for simplicity. They are quick to experiment with novel solutions, with 72% saying they are early adopters of new technology versus 55% of “Prone Enterprises,” the weaker group in the survey. But they are also more likely to use security orchestration, automation and response, and are late-stage adopters of robotic process automation. This indicates an eye on innovations that cohere into an orchestrated, pan-organizational defense.\r\n"}}" id="rich-text-de1c626ddd86" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Emerging technology presents opportunities and challenges for cybersecurity leaders. Most organizations have an average of 44 security products that are often poorly integrated, difficult to maintain and support, and offer no overall visibility. Secure Creators embrace technology but with an eye for simplicity. They are quick to experiment with novel solutions, with 72% saying they are early adopters of new technology versus 55% of “Prone Enterprises,” the weaker group in the survey. But they are also more likely to use security orchestration, automation and response, and are late-stage adopters of robotic process automation. This indicates an eye on innovations that cohere into an orchestrated, pan-organizational defense. Read More Read Less Reduce the attack surface As organizations pursue digital transformation, they are coming to terms with increased cyber vulnerability. Cloud applications, 5G networks and the rise of remote and hybrid work arrangements, alongside infrastructures like VPNs, increase entry points for hackers. Software and physical supply chains increase risk, especially when the security of third-party partners isn’t guaranteed.\r\nSecure Creators are more likely to be paying attention to supply chain risks than Prone Enterprises (39% vs. 20%). CISOs should be involved in vendor selection decisions and should help set partner relationships to bring higher levels of assurance to supply chains and to ensure there is a cyber lens to supply decisions.\r\n"}}" id="rich-text-7d1555c46942" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> As organizations pursue digital transformation, they are coming to terms with increased cyber vulnerability. Cloud applications, 5G networks and the rise of remote and hybrid work arrangements, alongside infrastructures like VPNs, increase entry points for hackers. Software and physical supply chains increase risk, especially when the security of third-party partners isn’t guaranteed. Secure Creators are more likely to be paying attention to supply chain risks than Prone Enterprises (39% vs. 20%). CISOs should be involved in vendor selection decisions and should help set partner relationships to bring higher levels of assurance to supply chains and to ensure there is a cyber lens to supply decisions. Read More Read Less Align everyone behind cybersecurity CISOs don’t have to advocate for budget as much as they used to. According to the survey, budget, once a top internal challenge, was only ranked sixth out of eight in a list of obstacles. With resources in hand, CISO communications have evolved to focus on cyber readiness and training.\r\nSecure Creators speak the language of the C-suite and boards in conveying the realities of the current moment and the continuous resource demands of the function. They also do a better job organizing training and designing best practices. While only half of respondents say their cyber training is effective, and only 36% are satisfied with non-IT adoption of best practices, this gap closes among Secure Creators, who are more satisfied with best practice adoption. Upskilling current cybersecurity workforces is by far the most popular tactic to prepare for future cybersecurity threats, cited nearly three times more than the next most popular tactic in the survey.\r\n"}}" id="rich-text-e9a1573e0b77" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> CISOs don’t have to advocate for budget as much as they used to. According to the survey, budget, once a top internal challenge, was only ranked sixth out of eight in a list of obstacles. With resources in hand, CISO communications have evolved to focus on cyber readiness and training. Secure Creators speak the language of the C-suite and boards in conveying the realities of the current moment and the continuous resource demands of the function. They also do a better job organizing training and designing best practices. While only half of respondents say their cyber training is effective, and only 36% are satisfied with non-IT adoption of best practices, this gap closes among Secure Creators, who are more satisfied with best practice adoption. Upskilling current cybersecurity workforces is by far the most popular tactic to prepare for future cybersecurity threats, cited nearly three times more than the next most popular tactic in the survey. Read More Read Less Unleash value Cyber-secure organizations can innovate to create value with fewer risks than their less-secure peers – Prone Enterprises. Organizations without Secure Creators may be hesitant to invest in unproven technologies that have the potential to be huge value drivers for early adopters.\r\nSecure Creators are value creators, not just value defenders. Cybersecurity leaders in these organizations are much more likely to say their cyber approach positively impacts the organization’s pace of transformation and innovation (59% vs. 16% of CISOs from Prone Enterprises), ability to rapidly respond to market opportunities (58% vs. 28%) and ability to focus on creating value rather than protecting value (57% vs. 39%).\r\n"}}" id="rich-text-347e7ad9b4a0" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Cyber-secure organizations can innovate to create value with fewer risks than their less-secure peers – Prone Enterprises. Organizations without Secure Creators may be hesitant to invest in unproven technologies that have the potential to be huge value drivers for early adopters. Secure Creators are value creators, not just value defenders. Cybersecurity leaders in these organizations are much more likely to say their cyber approach positively impacts the organization’s pace of transformation and innovation (59% vs. 16% of CISOs from Prone Enterprises), ability to rapidly respond to market opportunities (58% vs. 28%) and ability to focus on creating value rather than protecting value (57% vs. 39%). Read More Read Less Cybersecurity leaders are looking to improve capabilities in the following areas:\r\n"}}" id="rich-text-f296bd4a449d" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Cybersecurity leaders are looking to improve capabilities in the following areas: Read More Read Less Generative AI and machine learning AI is both friend and foe to CISOs. To tip the balance toward friendship, cybersecurity leaders are investing in AI- and machine learning-enabled tools to improve vulnerability testing, detect threats more quickly and build more adaptive security systems.\r\nGenerative AI models like generative adversarial networks (GANs) can create synthetic data that mimic real-word cyberattacks, making attack testing and response easier. In the real-world, generative AI-enabled threat detection tools are able to analyze large amounts of data in real time, allowing them to quickly detect anomalies and patterns that may indicate a cyberattack. If a threat is realized as a cyberattack, organizations can employ quickly-adaptive response systems that have been informed by huge datasets of historical breaches.\r\n"}}" id="rich-text-15133bc37aa9" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> AI is both friend and foe to CISOs. To tip the balance toward friendship, cybersecurity leaders are investing in AI- and machine learning-enabled tools to improve vulnerability testing, detect threats more quickly and build more adaptive security systems. Generative AI models like generative adversarial networks (GANs) can create synthetic data that mimic real-word cyberattacks, making attack testing and response easier. In the real-world, generative AI-enabled threat detection tools are able to analyze large amounts of data in real time, allowing them to quickly detect anomalies and patterns that may indicate a cyberattack. If a threat is realized as a cyberattack, organizations can employ quickly-adaptive response systems that have been informed by huge datasets of historical breaches. Read More Read Less Passwordless authentication No matter the complexity, passwords by themselves are not as secure as they used to be. Organizations are using passwordless authentication to eliminate the risks associated with traditional password-based authentication methods.\r\nPasswordless authentication replaces passwords with more secure methods, such as biometric authentication, hardware-based authentication or one-time passcodes sent via email or text message. This reduces the risk of phishing attacks, credential stuffing and password-related vulnerabilities.\r\n"}}" id="rich-text-e72a8a5d646f" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> No matter the complexity, passwords by themselves are not as secure as they used to be. Organizations are using passwordless authentication to eliminate the risks associated with traditional password-based authentication methods. Passwordless authentication replaces passwords with more secure methods, such as biometric authentication, hardware-based authentication or one-time passcodes sent via email or text message. This reduces the risk of phishing attacks, credential stuffing and password-related vulnerabilities. Read More Read Less Zero trust A growing tech stack brings an expanded attack surface. Cybersecurity leaders are building zero trust architectures to deal with the near constant threat posed by attackers.\r\nZero trust architectures use a mix of technology and protocols to identify and grant access to users within and outside an organization’s network. By default, users are not trusted and are given the least amount of privilege possible within a network. Networks are segmented to prevent widespread access if one wall is breached and barriers like multifactor authentication (MFA) are deployed to make unauthorized access more difficult.\r\nOrganizations must adopt technology, but doing so doesn’t mean they have to be less secure.\r\n"}}" id="rich-text-ba35cbf817e4" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> A growing tech stack brings an expanded attack surface. Cybersecurity leaders are building zero trust architectures to deal with the near constant threat posed by attackers. Zero trust architectures use a mix of technology and protocols to identify and grant access to users within and outside an organization’s network. By default, users are not trusted and are given the least amount of privilege possible within a network. Networks are segmented to prevent widespread access if one wall is breached and barriers like multifactor authentication (MFA) are deployed to make unauthorized access more difficult. Organizations must adopt technology, but doing so doesn’t mean they have to be less secure. Read More Read Less DevSecOps Rapid technology development can create security gaps. DevSecOps (development, security and operations) can close these gaps by building cybersecurity into the development lifecycle, from design to production.\r\nDevSecOps encourages collaboration and communication between developers, security professionals, and operations teams, allowing for a more holistic approach to cybersecurity. Building these practices into technology governance enables rapid deployment of security updates and patches, ensuring that systems are always up to date and protected against the latest threats.\r\n"}}" id="rich-text-f12e107ccfb7" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Rapid technology development can create security gaps. DevSecOps (development, security and operations) can close these gaps by building cybersecurity into the development lifecycle, from design to production. DevSecOps encourages collaboration and communication between developers, security professionals, and operations teams, allowing for a more holistic approach to cybersecurity. Building these practices into technology governance enables rapid deployment of security updates and patches, ensuring that systems are always up to date and protected against the latest threats. Read More Read Less EY teams are helping a national electricity company reinforce its legacy power infrastructure for a trusted, cyber-safe future. Read more EY enabled a large global bank to lead the fight against FinCrime in a way that also helped it improve efficiency and increase compliance. Read moreHow EY can help
Discover how EY's Cybersecurity Transformation solution can help your organization design, deliver, and maintain cybersecurity programs.
Read moreService Leader
Richard WatsonEY Global Consulting Cybersecurity Leader
Cyber Incident Resilience and Response Solution
The EY Cyber Incident Resilience and Response solution provides ongoing incident management and uplift services across business lines. Learn more.
Read moreCyber threat management, detection and response
Discover how EY's Next generation security operations & response team can help your organization manage leading-class security operations in a programmatic way.
Read moreCyber architecture, operational technology and engineering services
Discover how EY's services & offerings can help your business across multiple aspects of its cybersecurity portfolio.
Read moreData protection and privacy services
Discover how EY's data protection and privacy team can help your organization protect its information over the full data lifecycle.
Read moreDigital identity and privileged access management services
Discover how EY's identify and access management (IAM) team can help your organization manage digital identities for people, systems, services and users.
Read moreCybersecurity Managed Services
EY Cybersecurity Managed Services offer seamless, strategic security that gives you the confidence to focus on innovation and growth. Find out more.
Read moreEY Cybersecurity Benchmarking Assessment tool
The EY Cybersecurity Benchmarking Assessment tool helps drive more value from your cybersecurity function by identifying its strengths, weaknesses and areas for investment.
Read moreOur latest thinking
Three strategic priorities for banking CROs in 2026
The EY/IIF bank risk management survey highlights the need for increased agility against diversifying risks. Find out more.
Nigel Moden + 2Reimagine your cyber guardrails to accelerate AI value
In a nonlinear, accelerated, volatile and interconnected cybersphere, enterprise-wide AI adoption is safer and faster with cybersecurity guardrails.
Richard Watson + 1How can cybersecurity go beyond value protection to value creation?
The 2025 EY Global Cybersecurity Leadership Insights Study found that CISOs account for US$36m of each strategic initiative they are involved in. Read more.
Richard Watson + 1Top 10 risks for the government and public sector in 2025
The risk landscape for governments is complex and interconnected. Discover the top 10 risks and how mitigating them will build trust and prove value.
Catherine Friday + 1Why CISOs must cultivate a cyber-secure workforce in the age of AI
Explore strategies for creating a cyber-secure workforce in the AI era, focusing on education, governance and operational best practices.
Dan Mellen + 1How to navigate cybersecurity in the AI world
In this webcast, panelists discuss the transformative role of AI in cybersecurity. Register and learn more.
Six steps to confidently manage data privacy in the age of AI
Concerns raised by AI emphasize the importance of managing data privacy proactively. Consider six steps to prepare. Learn more.
Matt WhalleyIs your greatest risk the complexity of your cyber strategy?
Organizations face mounting cybersecurity challenges. The EY 2023 Global Cybersecurity Leadership Insights Study reveals how leaders respond. Read more.
Richard Watson + 1 Previous Next The team Richard Watson EY Global Consulting Cybersecurity Leader Public speaker. Trusted advisor on cyber risk and digital trust. Golfer, traveler and dad. Sydney, Australia Piotr Ciepiela EY Global Advisory Cyber Architecture, Engineering & Emerging Technology Leader Industry leader in business-oriented technology innovations. Believer of the “from thought to finish” approach. Father of two. Warszawa, Poland Kevin Janes EY Americas Cybersecurity, Privacy and Trusted Technology Market Leader Trusted technology professional. Transformation leader. Volunteer. Patron of the arts. Wine connoisseur. Chicago, IL, United States Kanika Seth EY EMEIA Financial Services Consulting Cybersecurity Leader Passionate about diversity and inclusivity across EY. Lives in London. Enjoys watching cricket. Likes to travel the world with her husband and family. London, United Kingdom Angela Saverice-Rohan EY Americas Privacy Leader Promotes cross-functional teamwork. Calm and steady in crisis. Wicked sense of humor. Mother of two. Los Angeles, CA, United States Tom Schmidt EY EMEIA Financial Services Cybersecurity Competency Leader; EY Switzerland Financial Services Cybersecurity Leader; Partner, Technology Consulting, Ernst & Young AG Focusing on all aspects of information security, cybersecurity, and IT risk management. Passionate about traveling the world and engaging in various sports. Berne, Switzerland Andy Deprez EY Belgium Cybersecurity Leader; EY EMEIA Cybersecurity Competency Leader Cybersecurity and technology enthusiast. Passionate about empowering people to succeed. Cycling buff. Diegem, Belgium Rudrani Djwalapersad EY Global Cybersecurity Risk and Resilience Lead; EY Netherlands Technology Consulting Lead Passionate about cybersecurity resilience. Conceptual thinker with realization power. Driven, results-oriented and entrepreneurial. Focused on high-performing teams. Amsterdam, Netherlands Jatin Sehgal EY Global ISO Leader and EY CertifyPoint Managing Director ISO management systems guru and subject matter professional for ISO implementation, training and certifications. Go-getter and entrepreneurial. Growth hacker, well-traveled and sport lover. Amsterdam, Netherlands Matthias Bandemer EY Germany Cybersecurity Services Leader A passionate builder of a cyber-secure working world — protecting value and creating trust. Munich, Germany Matt Hynes EY Global Cyber Transformation Leader Passionate advocate of cybersecurity. Natural translator of “cyber speak” to plain English. Part-time fighter of bad guys. Full-time husband and father. Occasional DIY handyman. Minneapolis, MN, United States Rob Belk Principal, Cybersecurity Consulting, Ernst & Young LLP Strategic cyber leader for whole of enterprise. Driven by amazing experiences of meaning and consequence. Father, husband, self-proclaimed musician. San Diego, CA, United States Shawn Fohs EY Americas Forensic & Integrity Services Privacy & Cyber Response Leader Cybersecurity and digital forensics leader. Father of two daughters. Automotive enthusiast. Neurodiversity at work supporter. New York, NY, United States Ayan Roy EY Americas Cybersecurity Competency Leader Building a secure and trusted working world combined with my philosophy to enable the business is my guiding principle in identity management. Photographer. Traveler and explorer. Father. Irvine, CA, United States John Hauser EY-Parthenon Americas Transaction Support – Cyber Due Diligence Leader Experienced cyber due diligence advisor. Certified Information Privacy Professional. Former FBI Special Agent. Two-time marathon runner. Tysons, VA, United States Dr. Naoto Morishima EY Japan Consulting Senior Manager Pioneer in cybersecurity governance. All-round cybersecurity consultant. PADI Advanced Open Water Diver. Tokyo, Japan Show more Skip west Technology Featured: How EY is unlocking the next iteration of GenAI advancement with EYQ Discover east Cybersecurity Cybersecurity Discover east Risk leaders’ agenda Featured: What if the difference between adversity and advantage is a resilient board? Discover east east Contact us Like what you’ve seen? Get in touch to learn more. EY logo \r\nConnect with us\r\n\r\nOur locations\r\nMy EY\r\nSite map\r\nLegal and privacy\r\n\r\n"}}" id="rich-text-ebac9709ade4" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Connect with us
Our locationsMy EYSite mapLegal and privacy Read More Read Less Open Facebook profile Open X profile Open LinkedIn profile Open Youtube profile EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.\r\n"}}" class="cmp-text"> EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. Welcome to EY main (en) You are visiting EY main (en) main en
智能索引记录
-
2026-03-02 19:07:29
综合导航
成功
标题:灵寄囚羽目录最新章节_灵寄囚羽全文免费阅读_全本小说网
简介:灵寄囚羽目录最新章节由网友提供,《灵寄囚羽》情节跌宕起伏、扣人心弦,是一本情节与文笔俱佳的全本小说网,全本小说网免费提供
-
2026-03-02 19:31:48
教育培训
成功
标题:FRM报名注册环节详细的说明,包含图文流程-高顿教育
简介:考生注册FRM考试是需要交纳注册费400美元,这笔费用是和首先报名FRM考试一起收取的。单纯的注册个GARP协会FRM账
-
2026-03-02 18:41:43
综合导航
成功
标题:Nicholas Udall (1505-1556). Library of Literary Criticism. 1901-05
简介:Nicholas Udall (1505-1556). Charles Wells Moulton, ed. Libra
-
2026-03-02 12:57:38
图片素材
成功
标题:夏雨的作文30字 描写夏雨的作文 关于夏雨的作文-作文网
简介:作文网精选关于夏雨的30字作文,包含夏雨的作文素材,关于夏雨的作文题目,以夏雨为话题的30字作文大全,作文网原创名师点评
-
2026-03-02 12:34:04
综合导航
成功
标题:Hear how Anchor 41 Moved to the Cloud and Ditched the Stone Age with hh2 Remote Payroll
简介:Discover how Anchor 41 Construction streamlined payroll with
-
2026-03-02 13:06:44
综合导航
成功
标题:From 1G to 10G: A Switch-Centric Upgrade Guide for Campus Networks
简介:Discover how Singapore enterprises can eliminate 1G bottlene
-
2026-03-02 19:31:44
综合导航
成功
标题:å·§å¦çæ¼é³_å·§å¦çææ_å·§å¦çç¹ä½_è¯ç»ç½
简介:è¯ç»ç½å·§å¦é¢é,ä»ç»å·§å¦,å·§å¦çæ¼é³,巧妿¯
-
2026-03-02 15:22:20
游戏娱乐
成功
标题:602《烈焰》二十服 六大活动震撼来袭! - 开服活动 - 602游戏平台 - 做玩家喜爱、信任的游戏平台!cccS
简介:602《烈焰》二十服 六大活动震撼来袭!
-
2026-03-02 16:15:34
综合导航
成功
标题:Cecco d'Ascoli (1269-1327). The Reader's Biographical Encyclopaedia. 1922
简介:Cecco d
-
2026-03-02 18:55:17
综合导航
成功
标题:Ped Shoes - AU79 Alchimia
简介:Alchimia began in 1965 as a family business in Italy and now
-
2026-03-02 16:32:59
综合导航
成功
标题:Gangsta Duel - Free Arcade Game
简介:Begin the tough duels in the arcade game! Use your fight ski
-
2026-03-02 13:26:43
综合导航
成功
标题:関西電力エリアにおける「auでんき」の料金値下げについて
简介:関西電力エリアにおける「auでんき」の料金値下げについてのご紹介ページです。
-
2026-03-02 18:48:14
综合导航
成功
标题:Clara Osteuropa im Eroscenter Stetten [Archiv] - BW7 Forum
简介:Clara Osteuropa Zimmer 07 9261 stuttgart-laufhaus.de
-
2026-03-02 15:29:55
综合导航
成功
标题:公路工程定额应用精讲 - jz.docin.com豆丁建筑
简介:[信息与通信]第六章 公路工程定额第六章 公路工程定额第一节 定额概述一、定额的定义1、定额属于计价依据的主要内容之一
-
2026-03-02 19:19:32
综合导航
成功
标题:神级奴隶系统最新章节_神级奴隶系统全文免费阅读_恋上你看书网
简介:得了一套奴隶系统,终于可以混吃等死了!死不了?那就一直混着吧!
-
2026-03-02 16:43:15
数码科技
成功
标题:LEM莱姆电子美国隐私声明附录 加州消费者隐私权与数据处理说明
简介:了解LEM莱姆电子在美国市场,特别是加州地区如何收集、使用与保护您的个人信息。页面涵盖CCPA相关权利、数据访问与删除请
-
2026-03-02 16:34:17
教育培训
成功
标题:高兴的事作文300字
简介:在学习、工作乃至生活中,大家都经常看到作文的身影吧,作文是从内部言语向外部言语的过渡,即从经过压缩的简要的、自己能明白的
-
2026-03-02 19:26:27
综合导航
成功
标题:Watch HR & Payroll Built for Construction
简介:Discover hh2’s People Platform, a complete HR and payroll so
-
2026-03-02 15:18:41
图片素材
成功
标题:誓师大会的作文150字 描写誓师大会的作文 关于誓师大会的作文-作文网
简介:作文网精选关于誓师大会的150字作文,包含誓师大会的作文素材,关于誓师大会的作文题目,以誓师大会为话题的150字作文大全
-
2026-03-02 19:31:56
综合导航
成功
标题:Luna Sunglasses – Eagle Eyes Optics
简介:The Luna is where versatility and elegance join forces to cr
-
2026-03-02 12:46:12
综合导航
成功
标题:MP Women's Tempo Ruched Front Shorts - Desert Sand
简介:Shop MP Women
-
2026-03-02 12:27:43
综合导航
成功
标题:100319716 Bored Blank Flange
简介:The 100319716 Bored Blank ISO-KF Flange features a size NW50
-
2026-03-02 16:25:01
综合导航
成功
标题:XS: Forex Trading & CFDs Broker Online FX Trading Platform
简介:Discover the leading online forex trading platform at XS. Tr
-
2026-03-02 13:15:49
图片素材
成功
标题:小学作文550字 小学550字美文 550字优秀作文大全-作文网
简介:作文网优秀小学550字作文大全,包含小学550字作文素材,小学550字作文题目、美文范文,作文网原创名师点评,欢迎投稿!
-
2026-03-02 12:31:08
游戏娱乐
成功
标题:众神大陆官服,众神大陆礼包,开服表,新服-重要提醒:防范电信网络诈骗公告
简介:03游戏众神大陆,众神大陆传奇,零三游戏,正版传奇,官方正版授权,绿色服,网页游戏新服礼包,游戏攻略,开服表,网页游戏平
-
2026-03-02 15:29:02
综合导航
成功
标题:American Eagle Outfitters
简介:Magasinez à American Eagle Outfitters pour y trouver des jea
-
2026-03-02 19:30:15
综合导航
成功
标题:First Time Autocross in Supercharged AW11 [Archive] - Toyota MR2 Message Board
简介:I had been wanting to autocross for a while and went to a fe
-
2026-03-02 19:30:26
综合导航
成功
标题:心碎失望的句子说说心情,句句伤感,痛彻心扉!-励志一生
简介:心碎失望的句子说说心情,句句伤感,痛彻心扉! 1、该要有多大的一场雨才能冲刷掉内心的委屈。 2、懵懂的年纪付
-
2026-03-02 16:44:13
游戏娱乐
成功
标题:感恩节农庄逃生,感恩节农庄逃生小游戏,4399小游戏 www.4399.com
简介:感恩节农庄逃生在线玩,感恩节农庄逃生下载, 感恩节农庄逃生攻略秘籍.更多感恩节农庄逃生游戏尽在4399小游戏,好玩记得告
-
2026-03-02 18:41:11
综合导航
成功
标题:åºç¼©çæ¼é³_åºç¼©çææ_åºç¼©çç¹ä½_è¯ç»ç½
简介:è¯ç»ç½åºç¼©é¢é,ä»ç»åºç¼©,åºç¼©çæ¼é³,åºç¼©æ¯