\r\n\r\n"}}" id="rich-text-f7d2770f9eb6" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Discover how EY insights and services are helping to reframe the future of your industry.
Read More Read Less Explore See more\r\n"}}" id="rich-text-91febc7556cf" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> See more Read More Read Less Case studies\r\n"}}" id="rich-text-503b113aefb4" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Case studies Read More Read Less
Workforce
How Microsoft built a new mobility model for cross-border talent 14 May 2024EY GlobalPrivate equity
How GenAI is empowering talent at a PE-backed consumer brand 09 May 2024EY GlobalStrategy and Transactions
How carve-outs positioned an automotive giant for future growth 12 Apr 2024EY Global See all\r\n"}}" id="rich-text-268e3dc79320" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> See all Read More Read Less Careers\r\n"}}" id="rich-text-8bbbcf849607" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Careers Read More Read Less We bring together extraordinary people, like you, to build a better working world.\r\n"}}" id="rich-text-df0f3f04a173" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> We bring together extraordinary people, like you, to build a better working world. Read More Read Less Explore See more\r\n"}}" id="rich-text-555a88445119" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> See more Read More Read Less Spotlight\r\n"}}" id="rich-text-beac5ada0727" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Spotlight Read More Read Less Experienced professionals\r\nEY-Parthenon careers\r\nStudent and entry level programs\r\nTalent community\r\n"}}" id="rich-text-7139765f715f" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Experienced professionals EY-Parthenon careers Student and entry level programs Talent community Read More Read Less About us\r\n"}}" id="rich-text-97afda7dcb69" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> About us Read More Read Less At EY, our purpose is building a better working world. The insights and services we provide help to create long-term value for clients, people and society, and to build trust in the capital markets.\r\n"}}" id="rich-text-bd4b72b5e438" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> At EY, our purpose is building a better working world. The insights and services we provide help to create long-term value for clients, people and society, and to build trust in the capital markets. Read More Read Less Explore See more\r\n"}}" id="rich-text-4aeb1da0739a" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> See more Read More Read Less Top news\r\n"}}" id="rich-text-d82008834d36" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Top news Read More Read LessPress release
Vellayan Subbiah from India named EY World Entrepreneur Of The Year™ 2024 07 Jun 2024Eric J. MinuskinPress release
Extreme E and EY publish Season 3 report, recording 8.2% carbon footprint reduction as female-male performance gap continues to narrow 09 Apr 2024Michael CurtisPress release
EY announces acceleration of client AI Business Model adoption with NVIDIA AI 20 Mar 2024Barbara Dimajo Search search close search See all results for ' 'No results have been found
Topics
See AllGeneral
See AllPeople
See AllRecent Searches
Trending
How do CEOs reimagine enterprises for a future that keeps rewriting itself? EY-Parthenon CEO Outlook 2026 explores how leaders use AI, transformation and portfolio strategy to navigate uncertainty and drive sustainable growth. 20 Jan 2026 CEO agenda Is your organization upholding its integrity standards? Standards of integrity in emerging markets are improving, but the appetite and opportunity for wrongdoing continues. Learn more. 19 Sep 2022 Assurance Why human interaction remains essential to the car buying journey The dealership retains a crucial role for buyers of EVs and ICE cars. Learn four key themes that emerged from the latest EY Mobility Consumer Index. Read more. 19 Dec 2023 Automotive My EY My EY Select your location Local sites Cyber and privacy leaders' agenda Cyber and privacy leaders must act now to tackle today’s most pressing security challenges. Facebook Twitter LinkedIn "> Link Copied Join the conversation \r\n#TransformationRealized\r\n"}}" id="rich-text-5e2f98c03a8f" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Join the conversation #TransformationRealized Read More Read Less Facebook Twitter LinkedIn "> Link Copied Featured Thinking It is harder than ever to stay one step ahead of cybersecurity threats. New, more sophisticated adversaries — some operating autonomously and learning from generative AI models - are thriving in a landscape with multiple attack surfaces opened by hybrid and distributed work, cloud computing at scale, and the digitalization of everything. The stakes are high for CISOs.\r\n"Secure Creators” are redefining cybersecurity in their industries. Secure Creators have fewer cyber incidents, were quicker to respond, and provided 1.5 to 2 times more positive impact on their organization in terms of value creation, innovation and responsiveness to market opportunities when compared to their lower-performing counterparts.\r\nThey accomplished this not by simply deploying the right technology, innovating effectively, communicating across their organizations and minimizing attack surfaces, but by executing each of those practices better than their peers. \r\nHere are four actions CISOs can take to better prepare for today and tomorrow: \r\n"}}" id="rich-text-97d3d7633c9b" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> It is harder than ever to stay one step ahead of cybersecurity threats. New, more sophisticated adversaries — some operating autonomously and learning from generative AI models - are thriving in a landscape with multiple attack surfaces opened by hybrid and distributed work, cloud computing at scale, and the digitalization of everything. The stakes are high for CISOs. "Secure Creators” are redefining cybersecurity in their industries. Secure Creators have fewer cyber incidents, were quicker to respond, and provided 1.5 to 2 times more positive impact on their organization in terms of value creation, innovation and responsiveness to market opportunities when compared to their lower-performing counterparts. They accomplished this not by simply deploying the right technology, innovating effectively, communicating across their organizations and minimizing attack surfaces, but by executing each of those practices better than their peers. Here are four actions CISOs can take to better prepare for today and tomorrow: Read More Read Less Reduce technology complexity Emerging technology presents opportunities and challenges for cybersecurity leaders. Most organizations have an average of 44 security products that are often poorly integrated, difficult to maintain and support, and offer no overall visibility.\r\nSecure Creators embrace technology but with an eye for simplicity. They are quick to experiment with novel solutions, with 72% saying they are early adopters of new technology versus 55% of “Prone Enterprises,” the weaker group in the survey. But they are also more likely to use security orchestration, automation and response, and are late-stage adopters of robotic process automation. This indicates an eye on innovations that cohere into an orchestrated, pan-organizational defense.\r\n"}}" id="rich-text-e9871b03f362" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Emerging technology presents opportunities and challenges for cybersecurity leaders. Most organizations have an average of 44 security products that are often poorly integrated, difficult to maintain and support, and offer no overall visibility. Secure Creators embrace technology but with an eye for simplicity. They are quick to experiment with novel solutions, with 72% saying they are early adopters of new technology versus 55% of “Prone Enterprises,” the weaker group in the survey. But they are also more likely to use security orchestration, automation and response, and are late-stage adopters of robotic process automation. This indicates an eye on innovations that cohere into an orchestrated, pan-organizational defense. Read More Read Less Reduce the attack surface As organizations pursue digital transformation, they are coming to terms with increased cyber vulnerability. Cloud applications, 5G networks and the rise of remote and hybrid work arrangements, alongside infrastructures like VPNs, increase entry points for hackers. Software and physical supply chains increase risk, especially when the security of third-party partners isn’t guaranteed.\r\nSecure Creators are more likely to be paying attention to supply chain risks than Prone Enterprises (39% vs. 20%). CISOs should be involved in vendor selection decisions and should help set partner relationships to bring higher levels of assurance to supply chains and to ensure there is a cyber lens to supply decisions.\r\n"}}" id="rich-text-5ba5edfdf9f4" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> As organizations pursue digital transformation, they are coming to terms with increased cyber vulnerability. Cloud applications, 5G networks and the rise of remote and hybrid work arrangements, alongside infrastructures like VPNs, increase entry points for hackers. Software and physical supply chains increase risk, especially when the security of third-party partners isn’t guaranteed. Secure Creators are more likely to be paying attention to supply chain risks than Prone Enterprises (39% vs. 20%). CISOs should be involved in vendor selection decisions and should help set partner relationships to bring higher levels of assurance to supply chains and to ensure there is a cyber lens to supply decisions. Read More Read Less Align everyone behind cybersecurity CISOs don’t have to advocate for budget as much as they used to. According to the survey, budget, once a top internal challenge, was only ranked sixth out of eight in a list of obstacles. With resources in hand, CISO communications have evolved to focus on cyber readiness and training.\r\nSecure Creators speak the language of the C-suite and boards in conveying the realities of the current moment and the continuous resource demands of the function. They also do a better job organizing training and designing best practices. While only half of respondents say their cyber training is effective, and only 36% are satisfied with non-IT adoption of best practices, this gap closes among Secure Creators, who are more satisfied with best practice adoption. Upskilling current cybersecurity workforces is by far the most popular tactic to prepare for future cybersecurity threats, cited nearly three times more than the next most popular tactic in the survey.\r\n"}}" id="rich-text-13af01c3882a" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> CISOs don’t have to advocate for budget as much as they used to. According to the survey, budget, once a top internal challenge, was only ranked sixth out of eight in a list of obstacles. With resources in hand, CISO communications have evolved to focus on cyber readiness and training. Secure Creators speak the language of the C-suite and boards in conveying the realities of the current moment and the continuous resource demands of the function. They also do a better job organizing training and designing best practices. While only half of respondents say their cyber training is effective, and only 36% are satisfied with non-IT adoption of best practices, this gap closes among Secure Creators, who are more satisfied with best practice adoption. Upskilling current cybersecurity workforces is by far the most popular tactic to prepare for future cybersecurity threats, cited nearly three times more than the next most popular tactic in the survey. Read More Read Less Unleash value Cyber-secure organizations can innovate to create value with fewer risks than their less-secure peers – Prone Enterprises. Organizations without Secure Creators may be hesitant to invest in unproven technologies that have the potential to be huge value drivers for early adopters.\r\nSecure Creators are value creators, not just value defenders. Cybersecurity leaders in these organizations are much more likely to say their cyber approach positively impacts the organization’s pace of transformation and innovation (59% vs. 16% of CISOs from Prone Enterprises), ability to rapidly respond to market opportunities (58% vs. 28%) and ability to focus on creating value rather than protecting value (57% vs. 39%).\r\n"}}" id="rich-text-6a6720a743d1" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Cyber-secure organizations can innovate to create value with fewer risks than their less-secure peers – Prone Enterprises. Organizations without Secure Creators may be hesitant to invest in unproven technologies that have the potential to be huge value drivers for early adopters. Secure Creators are value creators, not just value defenders. Cybersecurity leaders in these organizations are much more likely to say their cyber approach positively impacts the organization’s pace of transformation and innovation (59% vs. 16% of CISOs from Prone Enterprises), ability to rapidly respond to market opportunities (58% vs. 28%) and ability to focus on creating value rather than protecting value (57% vs. 39%). Read More Read Less Cybersecurity leaders are looking to improve capabilities in the following areas:\r\n"}}" id="rich-text-d2e11bb72b99" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Cybersecurity leaders are looking to improve capabilities in the following areas: Read More Read Less Generative AI and machine learning AI is both friend and foe to CISOs. To tip the balance toward friendship, cybersecurity leaders are investing in AI- and machine learning-enabled tools to improve vulnerability testing, detect threats more quickly and build more adaptive security systems.\r\nGenerative AI models like generative adversarial networks (GANs) can create synthetic data that mimic real-word cyberattacks, making attack testing and response easier. In the real-world, generative AI-enabled threat detection tools are able to analyze large amounts of data in real time, allowing them to quickly detect anomalies and patterns that may indicate a cyberattack. If a threat is realized as a cyberattack, organizations can employ quickly-adaptive response systems that have been informed by huge datasets of historical breaches.\r\n"}}" id="rich-text-65ee7aeee153" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> AI is both friend and foe to CISOs. To tip the balance toward friendship, cybersecurity leaders are investing in AI- and machine learning-enabled tools to improve vulnerability testing, detect threats more quickly and build more adaptive security systems. Generative AI models like generative adversarial networks (GANs) can create synthetic data that mimic real-word cyberattacks, making attack testing and response easier. In the real-world, generative AI-enabled threat detection tools are able to analyze large amounts of data in real time, allowing them to quickly detect anomalies and patterns that may indicate a cyberattack. If a threat is realized as a cyberattack, organizations can employ quickly-adaptive response systems that have been informed by huge datasets of historical breaches. Read More Read Less Passwordless authentication No matter the complexity, passwords by themselves are not as secure as they used to be. Organizations are using passwordless authentication to eliminate the risks associated with traditional password-based authentication methods.\r\nPasswordless authentication replaces passwords with more secure methods, such as biometric authentication, hardware-based authentication or one-time passcodes sent via email or text message. This reduces the risk of phishing attacks, credential stuffing and password-related vulnerabilities.\r\n"}}" id="rich-text-d4d31a04dcd4" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> No matter the complexity, passwords by themselves are not as secure as they used to be. Organizations are using passwordless authentication to eliminate the risks associated with traditional password-based authentication methods. Passwordless authentication replaces passwords with more secure methods, such as biometric authentication, hardware-based authentication or one-time passcodes sent via email or text message. This reduces the risk of phishing attacks, credential stuffing and password-related vulnerabilities. Read More Read Less Zero trust A growing tech stack brings an expanded attack surface. Cybersecurity leaders are building zero trust architectures to deal with the near constant threat posed by attackers.\r\nZero trust architectures use a mix of technology and protocols to identify and grant access to users within and outside an organization’s network. By default, users are not trusted and are given the least amount of privilege possible within a network. Networks are segmented to prevent widespread access if one wall is breached and barriers like multifactor authentication (MFA) are deployed to make unauthorized access more difficult.\r\nOrganizations must adopt technology, but doing so doesn’t mean they have to be less secure.\r\n"}}" id="rich-text-b179228cb3bc" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> A growing tech stack brings an expanded attack surface. Cybersecurity leaders are building zero trust architectures to deal with the near constant threat posed by attackers. Zero trust architectures use a mix of technology and protocols to identify and grant access to users within and outside an organization’s network. By default, users are not trusted and are given the least amount of privilege possible within a network. Networks are segmented to prevent widespread access if one wall is breached and barriers like multifactor authentication (MFA) are deployed to make unauthorized access more difficult. Organizations must adopt technology, but doing so doesn’t mean they have to be less secure. Read More Read Less DevSecOps Rapid technology development can create security gaps. DevSecOps (development, security and operations) can close these gaps by building cybersecurity into the development lifecycle, from design to production.\r\nDevSecOps encourages collaboration and communication between developers, security professionals, and operations teams, allowing for a more holistic approach to cybersecurity. Building these practices into technology governance enables rapid deployment of security updates and patches, ensuring that systems are always up to date and protected against the latest threats.\r\n"}}" id="rich-text-da740839cdbc" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Rapid technology development can create security gaps. DevSecOps (development, security and operations) can close these gaps by building cybersecurity into the development lifecycle, from design to production. DevSecOps encourages collaboration and communication between developers, security professionals, and operations teams, allowing for a more holistic approach to cybersecurity. Building these practices into technology governance enables rapid deployment of security updates and patches, ensuring that systems are always up to date and protected against the latest threats. Read More Read Less EY teams are helping a national electricity company reinforce its legacy power infrastructure for a trusted, cyber-safe future. Read more EY enabled a large global bank to lead the fight against FinCrime in a way that also helped it improve efficiency and increase compliance. Read moreHow EY can Help
Discover how EY's Cybersecurity Transformation solution can help your organization design, deliver, and maintain cybersecurity programs.
Read moreCyber risk, compliance and resilience services
Discover how EY's cybersecurity, strategy, risk, compliance & resilience teams can help your organization with its current cyber risk posture and capabilities.
Read moreCyber threat management, detection and response
Discover how EY's Next generation security operations & response team can help your organization manage leading-class security operations in a programmatic way.
Read moreCyber architecture, operational technology and engineering services
Discover how EY's services & offerings can help your business across multiple aspects of its cybersecurity portfolio.
Read moreData protection and privacy services
Discover how EY's data protection and privacy team can help your organization protect its information over the full data lifecycle.
Read moreDigital identity and privileged access management services
Discover how EY's identify and access management (IAM) team can help your organization manage digital identities for people, systems, services and users.
Read moreCybersecurity Managed Services
EY Cybersecurity Managed Services offer seamless, strategic security that gives you the confidence to focus on innovation and growth. Find out more.
Read more Consulting at EY is building a better working world by realizing business transformation through the power of people, technology and innovation. Discover moreOur latest thinking
Six steps to confidently manage data privacy in the age of AI
Concerns raised by AI emphasize the importance of managing data privacy proactively. Consider six steps to prepare. Learn more.
Matt Whalley2023 EY Global Third-Party Risk Management Survey
The 2023 EY Global Third-Party Risk Management Survey highlights a growing demand for data-driven third-party risk assessment. Read more.
Michael Giarrusso + 2Is your greatest risk the complexity of your cyber strategy?
Organizations face mounting cybersecurity challenges. The EY 2023 Global Cybersecurity Leadership Insights Study reveals how leaders respond. Read more.
Richard Watson + 1Why organizations should prepare for quantum computing cybersecurity now
This technology is finding its way out of research labs and into commercial applications, upending the norms of cryptography. Learn how to be ready.
Previous Next Richard Watson EY Global Consulting Cybersecurity Leader Public speaker. Trusted advisor on cyber risk and digital trust. Golfer, traveler and dad. Sydney, Australia Piotr Ciepiela EY Global Advisory Cyber Architecture, Engineering & Emerging Technology Leader Industry leader in business-oriented technology innovations. Believer of the “from thought to finish” approach. Father of two. Warszawa, Poland EY Global Multidisciplinary professional services organization Kevin Janes EY Americas Cybersecurity, Privacy and Trusted Technology Market Leader Trusted technology professional. Transformation leader. Volunteer. Patron of the arts. Wine connoisseur. Chicago, IL, United States Kanika Seth EY EMEIA Financial Services Consulting Cybersecurity Leader Passionate about diversity and inclusivity across EY. Lives in London. Enjoys watching cricket. Likes to travel the world with her husband and family. London, United Kingdom Angela Saverice-Rohan EY Americas Privacy Leader Promotes cross-functional teamwork. Calm and steady in crisis. Wicked sense of humor. Mother of two. Los Angeles, CA, United States Tom Schmidt EY EMEIA Financial Services Cybersecurity Competency Leader; EY Switzerland Financial Services Cybersecurity Leader; Partner, Technology Consulting, Ernst & Young AG Focusing on all aspects of information security, cybersecurity, and IT risk management. Passionate about traveling the world and engaging in various sports. Berne, Switzerland Andy Deprez EY Belgium Cybersecurity Leader; EY EMEIA Cybersecurity Competency Leader Cybersecurity and technology enthusiast. Passionate about empowering people to succeed. Cycling buff. Diegem, Belgium Rudrani Djwalapersad EY Global Cybersecurity Risk and Resilience Lead; EY Netherlands Technology Consulting Lead Passionate about cybersecurity resilience. Conceptual thinker with realization power. Driven, results-oriented and entrepreneurial. Focused on high-performing teams. Amsterdam, Netherlands EY Global Multidisciplinary professional services organization EY Global Multidisciplinary professional services organization Jatin Sehgal EY Global ISO Leader and EY CertifyPoint Managing Director ISO management systems guru and subject matter professional for ISO implementation, training and certifications. Go-getter and entrepreneurial. Growth hacker, well-traveled and sport lover. Amsterdam, Netherlands Matthias Bandemer EY Germany Cybersecurity Services Leader A passionate builder of a cyber-secure working world — protecting value and creating trust. Munich, Germany Matt Hynes EY Global Cyber Transformation Leader Passionate advocate of cybersecurity. Natural translator of “cyber speak” to plain English. Part-time fighter of bad guys. Full-time husband and father. Occasional DIY handyman. Minneapolis, MN, United States Rob Belk Principal, Cybersecurity Consulting, Ernst & Young LLP Strategic cyber leader for whole of enterprise. Driven by amazing experiences of meaning and consequence. Father, husband, self-proclaimed musician. San Diego, CA, United States Shawn Fohs EY Americas Forensic & Integrity Services Privacy & Cyber Response Leader Cybersecurity and digital forensics leader. Father of two daughters. Automotive enthusiast. Neurodiversity at work supporter. New York, NY, United States Ayan Roy EY Americas Cybersecurity Competency Leader Building a secure and trusted working world combined with my philosophy to enable the business is my guiding principle in identity management. Photographer. Traveler and explorer. Father. Irvine, CA, United States EY Global Multidisciplinary professional services organization John Hauser EY-Parthenon Americas Transaction Support – Cyber Due Diligence Leader Experienced cyber due diligence advisor. Certified Information Privacy Professional. Former FBI Special Agent. Two-time marathon runner. Tysons, VA, United States Dr. Naoto Morishima EY Japan Consulting Senior Manager Pioneer in cybersecurity governance. All-round cybersecurity consultant. PADI Advanced Open Water Diver. Tokyo, Japan Show more Skip west Global Information Security Survey (GISS) Global Information Security Survey (GISS) Discover east Technology Featured: How can AI help us accelerate the pace of change the world needs Discover east Cybersecurity Cybersecurity Discover east east Contact us Like what you’ve seen? Get in touch to learn more. EY logo \r\nConnect with us\r\n\r\nOur locations\r\nMy EY\r\nSite map\r\nLegal and privacy\r\n\r\n"}}" id="rich-text-395ecb7b8a6b" data-up-is="rich-text" data-up-translation-read-more="Read More" data-up-translation-read-less="Read Less" data-up-translation-aria-label-read-more="Read more button, press enter to activate, or use Up arrow key to learn more about this content" data-up-translation-aria-label-read-less="Read less button, press enter to activate, or use Up arrow key to learn more about this content" class="up-rich-text cmp-text" data-up-analytics="rich-text"> Connect with us
Our locationsMy EYSite mapLegal and privacy Read More Read Less Open Facebook profile Open X profile Open LinkedIn profile Open Youtube profile EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.\r\n"}}" class="cmp-text"> EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. Welcome to EY it (en) You are visiting EY it (en) it en
智能索引记录
-
2026-03-02 18:11:43
综合导航
成功
标题:18luck新利官网利app-你玩乐的的好帮手
简介:18luck新利官网专注于为玩家打造无忧的游戏环境。其官方应用程序以简洁流畅的设计、便捷的操作体验和丰富的游戏内容,成为
-
2026-03-02 18:18:19
综合导航
成功
标题:人族鎮守使-第九百九十八章 興師問罪最新章節-台灣小說網
简介:台灣小說網整理人族鎮守使全集無彈窗在線閱讀,當前章節:第九百九十八章 興師問罪
-
2026-03-02 12:35:23
综合导航
成功
标题:JustLend DAO Ecosystem Rewards Continue to Amplify: Two Rounds of Cumulative Burn Exceed 1 Billion JST, Deflation Proces Bee Network
简介:According to the official announcement, the number of JST to
-
2026-03-02 16:13:22
综合导航
成功
标题:Links 5RB Barristers Media and Communications Law Experts
简介:Useful links and information from 5RB Barristers - media and
-
2026-03-02 10:27:16
综合导航
成功
标题:Structural Choices Amid Continued Volatility: Bitcoin Range Trading and HYPE Swing Opportunities Invited Analysis Bee Network
简介:Judging from the market performance, the market trend this w
-
2026-03-02 16:17:19
综合导航
成功
标题:Nestorius (fl. 428). The Reader's Biographical Encyclopaedia. 1922
简介:Nestorius (fl. 428). The Reader
-
2026-03-02 12:10:35
综合导航
成功
标题:Avatar World - Free Management Game
简介:You can create your world. The game has 7 scenarios for you
-
2026-03-02 18:05:10
综合导航
成功
标题:Henri Murger (1822-1861). The Reader's Biographical Encyclopaedia. 1922
简介:Henri Murger (1822-1861). The Reader
-
2026-03-02 14:38:45
综合导航
成功
标题:From Terra’s Collapse to the “10 AM Smash”: How Jane Street Played Both Continents’ Markets? Bee Network
简介:Compiled by|Odaily; Translator| Ethan(@ethanzhang_web 3)
-
2026-03-02 11:46:54
教育培训
成功
标题:珍贵作文600字精华(3篇)
简介:在学习、工作乃至生活中,大家都写过作文,肯定对各类作文都很熟悉吧,借助作文可以提高我们的语言组织能力。怎么写作文才能避免
-
2026-03-02 12:14:08
综合导航
成功
标题:游玩白鹭岛
简介:我抱着愉悦的心情,期待着第二天快快的降临,因为我知道我即将要迎来自己梦寐以求多年的地方——白鹭岛。在很小的时候我就常听爷
-
2026-03-02 12:51:14
汽车交通
成功
标题:四年级读后感:读《爱之链》有感_700字_作文网
简介:今天,我读了《爱之链》。课文主要写了一个严寒的冬夜中充满爱的故事:下岗的乔依无偿帮老妇人修好汽车,老妇人在用餐时又得到了
-
2026-03-02 14:48:40
游戏娱乐
成功
标题:产品展示-122cc太阳集成游戏
简介:122cc太阳集成游戏【2026世 · 界 · 杯 · 指 · 定 · 平 · 台】从属于122cc太阳集成游戏有限公司
-
2026-03-02 12:14:56
教育培训
成功
标题:狗小学生作文
简介:在学习、工作、生活中,大家都有写作文的经历,对作文很是熟悉吧,作文是由文字组成,经过人的思想考虑,通过语言组织来表达一个
-
2026-03-02 12:33:15
综合导航
成功
标题:GTN Global Mobility Tax Blog - News and Notes Transition
简介:Transition No matter where you are in your mobility tax jo
-
2026-03-02 15:39:24
综合导航
成功
标题:AI智能索引 - AI智能索引
简介:AI智能索引 - 提供全网公开链接智能索引服务,快速访问目标内容,支持分类筛选和智能导航
-
2026-03-02 16:20:04
图片素材
成功
标题:道歉的作文350字 描写道歉的作文 关于道歉的作文-作文网
简介:作文网精选关于道歉的350字作文,包含道歉的作文素材,关于道歉的作文题目,以道歉为话题的350字作文大全,作文网原创名师
-
2026-03-02 13:51:23
综合导航
成功
标题:WTB Gen2 or Gen 3 swap [Archive] - Toyota MR2 Message Board
简介:I
-
2026-03-02 18:40:23
法律咨询
成功
标题:提示信息 - 学法网 - 学法网 xuefa.com 与法律人共成长!
简介:,学法网
-
2026-03-02 10:15:44
综合导航
成功
标题:Tinting [Archive] - Toyota MR2 Message Board
简介:anyone know any good tinting stores around atlanta =] ?? an
-
2026-03-02 10:07:35
综合导航
成功
标题:Заявка на услугу «Доменный брокер» Рег.ру
简介:Отправить заявку на услугу «Доменный брокер».
-
2026-03-02 12:35:51
教育培训
成功
标题:有你的日子真好作文(3篇)
简介:在平凡的学习、工作、生活中,许多人都写过作文吧,借助作文可以提高我们的语言组织能力。还是对作文一筹莫展吗?下面是小编收集
-
2026-03-02 16:53:36
视频影音
成功
标题:她在民国当军阀在现代当祖宗第65集红豆剧场_在线播放[高清流畅]_爽文短剧
简介:爽文短剧_她在民国当军阀在现代当祖宗剧情介绍:她在民国当军阀在现代当祖宗是由内详执导,内详等人主演的,于2025年上映,
-
2026-03-02 18:27:14
综合导航
成功
标题:Baxter Public Relations Executives & Employees List: Last Name Starting with R - PR.com
简介:View Baxter Public Relations executives and employees in the
-
2026-03-02 12:38:25
教育培训
成功
标题:高考作文指导:如何准备高考作文材料
简介:在平日的学习、工作和生活里,大家都写过作文,肯定对各类作文都很熟悉吧,作文根据体裁的不同可以分为记叙文、说明文、应用文、
-
2026-03-02 13:45:43
综合导航
成功
标题:FTIR Gas Analyzer
简介:MultiGas FTIR Spectroscopy gas analyzers are capable of ppb
-
2026-03-02 14:38:03
综合导航
成功
标题:FGS Global - the world’s leading stakeholder strategy firm
简介:Helping organisations, lead, influence and win in decisive m
-
2026-03-02 12:32:46
综合导航
成功
标题:属兔女与属羊男婚姻配对详解_一世迷命理网
简介:生肖配对是一种常见的婚姻预测方式。生肖不仅代表着一个人的出生年份,还蕴含着丰富的文化内涵和命运寓意。今天,我们将深入解析
-
2026-03-02 12:18:30
图片素材
成功
标题:蚂蚁的作文750字 描写蚂蚁的作文 关于蚂蚁的作文-作文网
简介:作文网精选关于蚂蚁的750字作文,包含蚂蚁的作文素材,关于蚂蚁的作文题目,以蚂蚁为话题的750字作文大全,作文网原创名师
-
2026-03-02 15:39:30
游戏娱乐
成功
标题:打篮球,打篮球小游戏,4399小游戏 www.4399.com
简介:打篮球在线玩,打篮球下载, 打篮球攻略秘籍.更多打篮球游戏尽在4399小游戏,好玩记得告诉你的朋友哦!