Research & Insight

Function

Cyber Security

Cybersecurity and Maritime Port and Maritime Survey – Fortifying Our Nation’s Ports with Comprehensive Cybersecurity Assessment

Outsourcing Center

Welcome to the Port and Maritime Cybersecurity Survey, an essential part of the Department of Homeland Security 2023 Public-Private Analytic Exchange Program (AEP). This survey distributed by the Outsourcing Center aims to conduct a comprehensive cybersecurity assessment, analyze risks, and identify opportunities to enhance cybersecurity within the U.S. Port Supply Chain. This initiative is a …

Cybersecurity Oversight for Boards

Ben Trowbridge

Cybersecurity has become a critical concern for organizations across all industries. Boards of directors have a vital role in overseeing their organization’s cybersecurity posture, ensuring that the necessary measures are in place to protect sensitive data, maintain compliance, and mitigate cyber risks. Here are some guidelines for boards of directors to use as a guideline …

Expanding Regional Accounting Firms’ Offerings with Managed Cybersecurity Services

Ben Trowbridge

Based on my experience in leading the launch of EY’s Cybersecurity Managed Services business and helping dozens of managed services providers enter new service lines, I thought it might be helpful to share a few ideas on how a regional accounting firm can think about the steps required to launch a managed cybersecurity services business …

Compliance and Cybersecurity Market Explode

Ben Trowbridge

Terror, anxiety, bewilderment, and even boredom. These are the range of emotions many executives feel when they sit down to discuss their organization’s cybersecurity and compliance strategies. Then the realities of their budget and competing priorities kick in, and often the result, even after a significant industry breach, is they give faint attention to meaningful …

How a Consulting Firm Builds a Successful Managed Services Practice

Ben Trowbridge

Consulting firms including Big4 and Regional Accounting firms have the amazing ability to frame a problem, develop a process, gather data, and develop a fact-based solution that can be a real boost for leadership teams that need an unbiased external perspective. However, when a consulting firm is asked to build a managed services practice, the …

Deloitte acquires Cybersecurity firm

Outsourcing Center

17 March 2020: Deloitte acquires Cybersecurity firm. Cybersecurity announced that the founders and 50 team members of leading Australian security architecture specialists, Zimbani, will join the firm from April. By combining Zimbani with its existing Australia cyber practice, Deloitte intends to build on its recognition as a leader in professional security services in Asia Pacific1. …

Ben Trowbridge Innovator of the Year

Outsourcing Center

Ben Trowbridge, EY Global Cybersecurity Managed Services Leader was awarded the 2019 Innovator of the year award.  Now in its third year, the CIO/CTO Awards program honors chief information officers, chief technology officers, and Senior Executives across Texas. These executives are playing an increasingly pivotal role in their companies, at a time when well-leveraged technology …

Mycroft Team Joins EY to expand cybersecurity capabilities through Identity and Access Management

Angie Wilson

Acquisition will enhance EY’s ability to quickly and efficiently deliver critical cybersecurity services EY has announced the Mycroft team, a leading provider of cloud-based identity-as-a-service (IDaaS) and identity and access management (IAM) services designed to help protect digital assets and enhance business productivity, has joined Ernst & Young LLP in the US. The deal will …

CyberSecurity Professionals and Compliance Officers at Odds Over Cloud Security

Outsourcing Center, Staff Writer

Enterprise IT and compliance groups agree on one thing for certain: their cloud environments could use some work on the security front. Less than half of the 1,018 IT security practitioners and enterprise compliance officers surveyed by the Ponemon Institute, which conducts independent research on privacy, data protection and information security policy, believe their organizations …

Legal Voice: If There’s a Data Security Breach, Who’s Responsible and Who Pays the Fine?

Outsourcing Center, Beth Ellyn Rosenthal, Senior Writer

Data security has become the number one issue in outsourcing contract negotiations, reports John Delaney of Morrison & Foerster. Buyers believe suppliers have superior processes, so they should be responsible for security breaches. But suppliers know no system is immune. Here’s how to handle the conflict.

Connect with a Sourcing Advisor at Outsourcing Center

"*" indicates required fields

Let’s talk more

Consult Form

"*" indicates required fields

This field is for validation purposes and should be left unchanged.