archive-com.com » COM » E » EY.COM

Total: 2294

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • EY - Global Information Security Survey 2015 - EY - Global
    Trade Global Compliance and Reporting Human Capital Private Client Services Law Tax Accounting Tax Performance Advisory Tax Policy and Controversy Transaction Tax VAT GST and Other Sales Taxes Transfer Pricing and Operating Model Effectiveness Strategic Growth Markets How we help Entrepreneurship EY SGM Initial public offering Venture capital Family business services Transactions About Transaction Advisory Services Corporate Development Divestiture Advisory Services Lead Advisory Operational Transaction Services Restructuring Strategy Services Transaction Support Transaction Tax Valuation Business Modelling Specialty Services Climate Change and Sustainability Services CertifyPoint China Overseas Investment Network Family Business Services French Business Network Global Business Network Japan Business Services Careers Students The EY difference Your role here Your development Life at EY Joining EY Global Delivery Network Experienced Advisory Assurance Tax Transactions Industries The EY difference Your development Life at EY Joining EY Global Delivery Network Alumni Home Services Advisory Creating trust in the digital world Creating trust in the digital world Global Information Security Survey 2015 Inside Creating trust in the digital world Today s attacks How attacks unfold Why are you still so vulnerable The shift to Active Defense Survey methodology and demographics Will your brand survive in a digital world Sales and marketing leaders can t ignore cybersecurity By collaborating they can help their organization protect its most valuable data and get ahead of cybercrime Share Our 2015 Global Information Security Survey GISS provides insights from 1755 participants and investigates the most important cybersecurity issues facing business today Last year we identified the ways organizations could get ahead of cybercrime by following a three stage journey Activate Adapt and Anticipate This concept still applies but as cyber attackers are continuously changing tactics increasing in their persistence and expanding their capabilities the nature of the cyber threats has evolved Understanding the challenges for cybersecurity The digital world

    Original URL path: http://www.ey.com/GL/en/Services/Advisory/ey-global-information-security-survey-2015-1 (2016-02-10)
    Open archived version from archive

  • EY - 2014 Global Fraud Survey - Reinforcing the commitment to ethical growth - EY - Global
    Experienced Advisory Assurance Tax Transactions Industries The EY difference Your development Life at EY Joining EY Global Delivery Network Alumni Home Services Assurance Fraud Investigation Dispute Services Overcoming compliance fatigue 2014 Global Fraud Survey Overcoming compliance fatigue Reinforcing the commitment to ethical growth Navigation Financial statement fraud risk still prevalent New challenges Cybercrime Compliance efforts running out of steam Strong engagement required of leadership Six key elements of leading practices About the survey Between December 2014 and January 2015 our researchers the global market research agency Ipsos conducted 3 800 interviews with employees of large companies in 38 countries online or in person The sample was designed to target those from shop floor to C suite in a wide range of industry sectors Share Our 13th Global Fraud Survey provides new insights into perceived levels of fraud bribery and corruption across the world and offers recommendations to companies to effectively manage long standing and emerging risk Financial statement fraud risk still prevalent Our survey shows that the risks businesses are facing are not receding The incidence of fraud and reported levels of corruption are not declining Six percent of respondents stated that misstating financial performance is justifiable in order to survive an economic downturn This is an increase from 5 two years ago and is driven by responses from emerging markets where in some jurisdictions a significantly higher proportion of respondents stated that they could justify such actions in Singapore 28 thought misstating performance is justifiable in India 24 and in South Africa 10 More than 1 in 10 executives surveyed reported their company as having experienced a significant fraud in the past two years Calls for increased scrutiny Following the financial downturn consumers and investors have become more aware and increasingly intolerant of corporate conduct they perceive as unethical As a result regulators are expected to broaden their remit to enforce good corporate conduct Businesses appear more likely now to be challenged on any activities that are considered to have been detrimental to consumers or the effective operation of the financial markets In this increasingly scrutinized environment it is clear that fraud at any level of the organization needs to be tackled What our survey results show however is that executives at senior levels are as likely to justify certain questionable or unethical acts as their more junior colleagues This should be a significant concern given their ability to override internal controls Leading in the wrong direction willingness to misstate financial performance Q Which if any of the following do you feel can be justified if they help a business survive an economic downturn Misstating company s financial performance Leading in the wrong direction willingness to misstate financial performance Q Which if any of the following do you feel can be justified if they help a business survive an economic downturn Misstating company s financial performance Base All respondents 2 719 CEO 155 CFO and other finance 1 384 general counsel 181 CCO 95 In general C suite respondents

    Original URL path: http://www.ey.com/GL/en/Services/Assurance/Fraud-Investigation---Dispute-Services/EY-reinforcing-the-commitment-to-ethical-growth (2016-02-10)
    Open archived version from archive

  • Global Information Security Survey 2014 - How EY can help – cybersecurity contacts - EY - Global
    Services Country Tax Advisory Cross Border Tax Advisory Global Trade Global Compliance and Reporting Human Capital Private Client Services Law Tax Accounting Tax Performance Advisory Tax Policy and Controversy Transaction Tax VAT GST and Other Sales Taxes Transfer Pricing and Operating Model Effectiveness Strategic Growth Markets How we help Entrepreneurship EY SGM Initial public offering Venture capital Family business services Transactions About Transaction Advisory Services Corporate Development Divestiture Advisory Services Lead Advisory Operational Transaction Services Restructuring Strategy Services Transaction Support Transaction Tax Valuation Business Modelling Specialty Services Climate Change and Sustainability Services CertifyPoint China Overseas Investment Network Family Business Services French Business Network Global Business Network Japan Business Services Careers Students The EY difference Your role here Your development Life at EY Joining EY Global Delivery Network Experienced Advisory Assurance Tax Transactions Industries The EY difference Your development Life at EY Joining EY Global Delivery Network Alumni Home Services Advisory Let s talk cybersecurity Let s talk cybersecurity Inside Get ahead of cybercrime Activate establish foundations Adapt take a dynamic approach Anticipate a proactive state of readiness Survey methodology and demographics Share At EY we have an integrated perspective on all aspects of organizational risk and cybersecurity is a key area of focus where EY is an acknowledged leader in the current landscape of mobile technology social media and cloud computing Cybersecurity is regularly discussed in the board room we know the business impact and technical details and how to present these to C level executives resulting in deeper risk insights and more in depth executive level discussions We aim to be a trusted advisor to our clients as they face the challenge of protecting and securing their assets We help our clients with Aligning their information security strategy with business needs Investigating complex cyber breaches and remediating detect and respond approaches Optimizing their information security spending and making their Cyber Program Management CPM more cost effective and sustainable Improving Security Operations Center capabilities Helping monitor maintain and enforce compliance with access management policies as well as addressing legal and regulatory compliance related issues Assessing adequacy of resources and skills for implementing technology and processes Contact us Our Risk leaders are Global Risk Leader Paul van Kessel 31 88 40 71271 paul van kessel nl ey com Area Risk Leaders Americas Amy Brachio 1 612 371 8537 amy brachio ey com EMEIA Jonathan Blackmore 971 4 312 9921 jonathan blackmore ae ey com Asia Pacific Iain Burnet 61 8 9429 2486 iain burnet au ey com Japan Yoshihiro Azuma 81 3 3503 1100 azuma yshhr shinnihon or jp Our Cybersecurity leaders are Global Cybersecurity Leader Ken Allan 44 20 795 15769 kallan uk ey com Area Cybersecurity Leaders Americas Bob Sydow 1 513 612 1591 bob sydow ey com EMEIA Ken Allan 44 20 795 15769 kallan uk ey com Asia Pacific Paul O Rourke 65 6309 8890 paul o rourke sg ey com Japan Shinichiro Nagao 81 3 3503 1100 nagao shnchr shinnihon or jp Our FIDS Forensic Technology

    Original URL path: http://www.ey.com/GL/en/Services/Advisory/EY-global-information-security-survey-2014-how-EY-can-help (2016-02-10)
    Open archived version from archive

  • EY - Los Alamos National Laboratory - Overview - EY - Global
    Tax About Our Global Tax Services Country Tax Advisory Cross Border Tax Advisory Global Trade Global Compliance and Reporting Human Capital Private Client Services Law Tax Accounting Tax Performance Advisory Tax Policy and Controversy Transaction Tax VAT GST and Other Sales Taxes Transfer Pricing and Operating Model Effectiveness Strategic Growth Markets How we help Entrepreneurship EY SGM Initial public offering Venture capital Family business services Transactions About Transaction Advisory Services Corporate Development Divestiture Advisory Services Lead Advisory Operational Transaction Services Restructuring Strategy Services Transaction Support Transaction Tax Valuation Business Modelling Specialty Services Climate Change and Sustainability Services CertifyPoint China Overseas Investment Network Family Business Services French Business Network Global Business Network Japan Business Services Careers Students The EY difference Your role here Your development Life at EY Joining EY Global Delivery Network Experienced Advisory Assurance Tax Transactions Industries The EY difference Your development Life at EY Joining EY Global Delivery Network Alumni Home Services Advisory EY Los Alamos National Laboratory Overview Navigation Overview About Los Alamos National Laboratory Collaboration with the Los Alamos PathScan Securing your organization Video Contacts Stan Brown 1 513 612 1836 stan brown ey com Chip Tsantes 1 703 747 1309 chip tsantes ey com For press inquiries John La Place 1 201 872 1951 john laplace ey com Download our full report Share Constantly under cyber attack In today s cyber threat environment attackers approaches to targeting victims have significantly matured Breaches are inevitable where threat actors are highly sophisticated strategic and agile and when their targets are growing in complexity and size Traditional defense mechanisms perimeter controls and end point antivirus protection cannot keep pace with these increasingly innovative and sophisticated adversaries Because it is no longer a matter of if but a question of when an intelligent complementary approach is necessary to quickly

    Original URL path: http://www.ey.com/GL/en/Services/Advisory/ey-los-alamos-national-laboratory---overview (2016-02-10)
    Open archived version from archive

  • EY - Global Information Security Survey 2015 - EY - Global
    Services Lead Advisory Operational Transaction Services Restructuring Strategy Services Transaction Support Transaction Tax Valuation Business Modelling Specialty Services Climate Change and Sustainability Services CertifyPoint China Overseas Investment Network Family Business Services French Business Network Global Business Network Japan Business Services Careers Students The EY difference Your role here Your development Life at EY Joining EY Global Delivery Network Experienced Advisory Assurance Tax Transactions Industries The EY difference Your development Life at EY Joining EY Global Delivery Network Alumni Home Services Advisory Today s attacks Global Information Security Survey 2015 Today s attacks Inside Creating trust in the digital world Today s attacks How attacks unfold Why are you still so vulnerable The shift to Active Defense Survey methodology and demographics Will your brand survive in a digital world Sales and marketing leaders can t ignore cybersecurity By collaborating they can help their organization protect its most valuable data and get ahead of cybercrime Share Organizations have no choice but to operate in this evolving environment so inevitably there is a growing focus within governments and the media on what is going wrong where cyberspace meets the physical world Customers having their personal details stolen and used is unacceptable and the theft of intellectual property is understood to be detrimental to prosperity as is the burden of the losses and the subsequent costs of remediation The hacking and manipulation of media communications government administration and defense systems is seen as a significant threat to national security So how well do you understand what surviving in the digital world means for you and your organization What are the threats and vulnerabilities you should fear For your organization to move to a safer and more sustainable place in the digital world it is necessary to apply a cyber risk lens to everything you do The view for managing risk will look different for the Board and the C suite than employees just as it will appear different again for partners suppliers vendors and other 3rd parties The problem is managing how not to drown in all this data and create more work and risks than it is worth Instead you should prioritize streamline and map out what a comprehensive and efficient cybersecurity approach means for your particular organization To efficiently guide your organization through the layers of risks and threats leaders must have the confidence to set the risk appetite and be prepared to swing into decisive action to handle any incidents For example one clear theme emerging from the last couple of years is that the impact of an incident is greatly reduced by the leadership ensuring there is intelligent and appropriate handling of cyber incidents and effective communication both internally and externally to manage the outcome Only when the risk appetite is set at a level the Board is comfortable with and that the organization can achieve will your digital transformations be sustainable Can you stop the attacks Your organization will suffer cyber incidents This is integral to the digital world

    Original URL path: http://www.ey.com/GL/en/Services/Advisory/ey-global-information-security-survey-2015-2 (2016-02-10)
    Open archived version from archive

  • EY - Global Information Security Survey 2015 - EY - Global
    Life at EY Joining EY Global Delivery Network Experienced Advisory Assurance Tax Transactions Industries The EY difference Your development Life at EY Joining EY Global Delivery Network Alumni Home Services Advisory How attacks unfold Global Information Security Survey 2015 How attacks unfold Inside Creating trust in the digital world Today s attacks How attacks unfold Why are you still so vulnerable The shift to Active Defense Survey methodology and demographics Will your brand survive in a digital world Sales and marketing leaders can t ignore cybersecurity By collaborating they can help their organization protect its most valuable data and get ahead of cybercrime Share To identify that things are not quite right it is first necessary to know your environment inside and out to identify what is critical to your organization s success determine what some critical cyber business risk scenarios could be and to build a picture of what would hurt the most if it was lost or compromised Then you can prioritize your precautions and create counter measures around those most critical areas and likely attack scenarios For example Since cybercriminals can spend months inside your organization finding information that they will store for a future attack or piecing information together that will get them to the prize they are after they will also create measures to protect themselves from your detection Sometimes they create diversionary tactics to draw your attention away from what they are doing and where they have succeeded Often the criminals will keep the stolen information and not use it for a while at other times they will share it amongst the cybercriminal community perhaps for a fee spreading the direct threats to you even further How to detect the small subtle signs Placing the most attention prevention and counter measures around your areas of most value and highest risk is one key step in minimizing harm from cyber incidents Being able to detect cyber incidents as early as possible is the next crucial step and is only possible with a comprehensive radar that covers a variety of indicators and can raise alerts when a certain threshold is crossed There are many ways into an organization and cyber attackers will find the most vulnerable entry points Some of these will be obvious and therefore easier to fortify and they should be monitored but from thinking creatively in a scenario about how the attackers could operate additional barriers and monitors can be added in the not so obvious places such as Public facing websites Third party systems that connect into yours Connecting industrial systems The cloud Once in the attackers will make their way to the value points This is where knowing your business priorities what could hurt you the most and what has value to another party is essential where they intersect is where more subtle indicators or signs may be detectable Why high alert must be your constant state The digital world does not allow any organization to feel comfortable in the area

    Original URL path: http://www.ey.com/GL/en/Services/Advisory/ey-global-information-security-survey-2015-3 (2016-02-10)
    Open archived version from archive

  • EY - Global Information Security Survey 2015 - EY - Global
    Pricing and Operating Model Effectiveness Strategic Growth Markets How we help Entrepreneurship EY SGM Initial public offering Venture capital Family business services Transactions About Transaction Advisory Services Corporate Development Divestiture Advisory Services Lead Advisory Operational Transaction Services Restructuring Strategy Services Transaction Support Transaction Tax Valuation Business Modelling Specialty Services Climate Change and Sustainability Services CertifyPoint China Overseas Investment Network Family Business Services French Business Network Global Business Network Japan Business Services Careers Students The EY difference Your role here Your development Life at EY Joining EY Global Delivery Network Experienced Advisory Assurance Tax Transactions Industries The EY difference Your development Life at EY Joining EY Global Delivery Network Alumni Home Services Advisory Why are you still so vulnerable Global Information Security Survey 2015 Why are you still so vulnerable Inside Creating trust in the digital world Today s attacks How attacks unfold Why are you still so vulnerable The shift to Active Defense Survey methodology and demographics Will your brand survive in a digital world Sales and marketing leaders can t ignore cybersecurity By collaborating they can help their organization protect its most valuable data and get ahead of cybercrime Share In our GISS 2014 report we identified three stages of the journey to cybersecurity maturity that need to be executed in tight sequence with the aim of achieving ever more advanced and comprehensive cybersecurity measures at each stage These three As Activate Adapt and Anticipate are still relevant and our 2015 survey findings show that there is still progress to be made in all three stages However in the face of today s threats many of the actions we identified as more advanced actions have now become more foundational Activate This is where an organization achieves a solid foundation of cybersecurity for the current environment comprising a set of cyber security measures which will provide basic defense Today with the cyber risks and threats having become more sophisticated there are now two additional foundational tasks Define the organization s ecosystem Introduce cybersecurity awareness training for employees We found There is not enough action in the current environment for businesses in 2015 47 do not have an Security Operations Center SOC compared with 42 in 2014 18 do not have an IAM program which represents a serious drop from 2014 56 of responders say an employee is a likely source of attack second only to criminal syndicates Adapt Accepting that foundational information security measures will become less effective over time this stage focuses on the changing environment and highlights the actions necessary to ensure that organizations can continue to adapt to keep pace and match the changing business requirements and dynamics We found there is not enough adaptation to change for businesses in 2015 54 of organizations do not currently have a role or department in their information security function that is focusing on emerging technology and its impact this includes 36 who have no plans to implement one 57 say that lack of skilled resources is challenging Information Security

    Original URL path: http://www.ey.com/GL/en/Services/Advisory/ey-global-information-security-survey-2015-4 (2016-02-10)
    Open archived version from archive

  • EY - Global Information Security Survey 2015 - EY - Global
    Advisory Assurance Tax Transactions Industries The EY difference Your development Life at EY Joining EY Global Delivery Network Alumni Home Services Advisory The shift to Active Defense Global Information Security Survey 2015 The shift to Active Defense Inside Creating trust in the digital world Today s attacks How attacks unfold Why are you still so vulnerable The shift to Active Defense Survey methodology and demographics Will your brand survive in a digital world Sales and marketing leaders can t ignore cybersecurity By collaborating they can help their organization protect its most valuable data and get ahead of cybercrime Share Cybersecurity is an inherently defensive capability for organizations However that does not mean that organizations have to be passive and wait to become victims Understanding your critical cyber business risks and knowing what attackers may want from your organization enables you to establish targeted defense through prioritization and hardening vulnerabilities And assessing the threat landscape particular to your organization allows you to understand the most likely threat actors and methods they may use which can be played out in scenarios to gauge readiness This all informs your Security Operations Center SOC and should be the basis on which they will support your organization By putting in place a more advanced SOC and using cyber threat intelligence to effectively align operations you can conduct Active Defense by sending out intelligent feelers to look for potential attackers analyze and assess the threat and neutralize the threat before it can damage your organization s critical assets Similarly you can use an advanced SOC to operate in the same way and actively hunt down unwanted anomalies visitors or confirmed attackers already in your systems How to build Active Defense Active Defense extends traditional security operations capability in two key ways More than just receiving feeds actual analysis of threat intelligence allows Active Defense practitioners to identify likely attackers infer their most likely targets within your business and develop hypotheses about likely ways those attacks will unfold This insight enables the implementation of tailored countermeasures By iterating through a defined and disciplined process to analyze available information draw relevant conclusions and take action Active Defense practitioners can add a dynamic and proactive component to the organization s existing security operations Active Defense integrates and enhances the enterprise s existing security capabilities to achieve greater effectiveness against persistent attackers By implementing and executing an iterative cycle with built in mechanisms for continuous learning and improvement the organization realizes gains in efficiency accountability and governance capabilities These gains translate directly to an improved return on investment for security programs by increasing the effectiveness of security operations which in turn reduces the effectiveness of targeted attacks Is Active Defense appropriate for your organization If the answer to any of these questions is Yes you should consider an Active Defense approach We have a SOC but are still not finding evidence of advanced attackers We have a SOC but we still had a major breach We have an outsourced SOC

    Original URL path: http://www.ey.com/GL/en/Services/Advisory/ey-global-information-security-survey-2015-5 (2016-02-10)
    Open archived version from archive



  •