Cyber

Adobe-Stock-234634481

 

From incident management to forensic investigation, from litigation, to regulatory response, EY Cyber Response professionals assist organizations in preparing their strategy and fighting complex cyber-attacks.

What EY can do for you

Our teams are experienced in dealing with cyber investigations. Since cyber breaches often extend across international borders, procedures are tailored to the specific legal and regulatory requirements of each country involved in the investigation, using EY's global network, including working with external legal counsel.

Our multi-disciplinary teams can help organizations develop data governance models supported by appropriate policies and technology, so that data protection is always ensured. We provide a variety of services:

  • Cyber response planning: We help organizations develop plans and conduct simulation tests taking into account different types and complexities of cybercrimes, defining roles and responsibilities and identifying the necessary tools, communication methods and operational plans.
  • Investigation and incident response: Our 'cyber response team' works together to identify the root cause of the incident and carries out mitigation activities. We make use of the latest XDR technologies and are able to install and configure them very quickly.
  • Digital forensics: We rapidly deploy resources to gather investigative evidence in the event of a cyber attack. We take care of the acquisition of network traffic, system logs and the forensic image of the host system. We analyze the collected evidence to identify threats, hostile activities and the attack sources. Analyses are carried out with tools and procedures that also allow their legal use.
  • Litigation Support: We support companies in managing litigation by creating robust technical pleadings in compliance with all forensic aspects. Examples of litigation may involve abusive access to systems, malfunctioning of applications or devices, theft of intellectual property.
  • Dark Web Monitoring: We monitor the dark web to detect the presence of personal and confidential information pertaining to our clients that has been compromised and made available. Monitoring such information is crucial to prevent imminent attacks and/or detect unknown data breaches.
  • Cyber Risk Framework: In the complex world of cybersecurity, a structured risk-based approach is needed. This approach requires the definition of a framework that encompasses all phases of cybersecurity management, evaluating it in its different aspects including the relationship with third parties. This tool is fundamental to give a concise presentation of the state of security to top management (dashboards)
  • -Cyber Security Assessment: We carry out assessments on the current security status of companies through which we identify and assess potential vulnerabilities of technological systems. The objective is to identify any weaknesses that could be exploited by cyber attacks and propose a remediation plan to define a program of actions to be taken to remedy the identified criticalities.
  • Awareness & Training: We provide education and training programs that aim to increase staff awareness of various cyber threats in order to provide the necessary skills to identify and prevent possible attacks.

Contact us

Like what you’ve seen? Get in touch to learn more.