Cybersecurity

In Energy and resources

EY teams understand the business impact, technology challenges and solutions energy companies need to help manage both current and future cybersecurity risks. We help you evaluate the effectiveness and efficiency of your cybersecurity programs, and build the cybersecurity resilience you need to protect your critical energy infrastructure assets.

What EY can do for you

Energy and resources companies are rapidly accelerating their digital transformation journeys to modernize infrastructure, deliver cost and operational efficiencies, and build new revenue streams in an evolving market.

In doing so, they are exposing their critical infrastructure to significant cyber risks.

Legacy operational technology (OT) systems, designed prior to modern network and technology standards, are now being retrofitted to interface with mainstream networks and topology. This issue, combined with the introduction of the IoT, the industrial IoT, sensors and smart infrastructure, is exposing new and hybrid systems to a complex range of cyber risks, as well as expanding the attack surface. In turn, this gives more opportunities for state-sponsored threat actors and cyber criminals to find the weakest link.

To help mitigate the growing and significant cyber risks that energy and resources companies face — safety issues, loss of revenue, loss of trust, operational slowdown and increased regulatory scrutiny — cybersecurity resilience needs to be built into every facet of the organization.

The value of ‘security-by-design’

Our “security-by-design” approach gives you the confidence you need to take more risk, make transformational change and enable innovation.

Thriving in a new energy world means that companies need to both seize the opportunities of digitally driven transformative change and protect the organization from the associated risks to maintain the trust of customers, stakeholders and regulators.

EY teams understand the energy engineering and operational environments, including key aspects of availability and system safety, over and above the integrity and confidentiality of the traditional cybersecurity of IT systems. EY links cybersecurity and safety in our methods and operations, which provides a business-driven and focused approach for energy and resources clients.

We take a security-by-design approach that facilitates day-to-day resilience as well as proactive, pragmatic and strategic planning that considers risk and security from the outset.

Tailored services to build cyber-resilience

We combine our security-by-design approach with sector-specific cyber transformation solutions and competencies in cyber strategy, risk and compliance; data protection and privacy; identity and access management; architecture, engineering and emerging technology; and next-generation security operations.

Cyber strategy, risk, compliance and resilience

We help you evaluate the effectiveness and efficiency of your cybersecurity and resiliency programs in the context of business growth and operations strategies. You gain a clear picture of the current state of your cybersecurity program and capabilities, allowing you to see how, where and why to invest in managing cyber risks.

We then assist in implementing and executing a strategy and overarching cyber program that supports rigorous, structured decision-making and financial analysis of cyber risks. We also help you to meet and sustain regulatory compliance requirements and build a more risk-aware culture through education and awareness to help minimize the impact of human behaviors.

Data protection and privacy

Our data protection and privacy services are designed to help you protect your organization’s information over the full data life cycle - from acquisition to disposal. We help you stay current with data security and data privacy good practices, as well as complying with regulation, so that you can avoid costly data breaches, reduce the risk of noncompliance, and protect your organization’s brand and reputation by keeping your customer, business and other sensitive information safe.

Identity and access management (IAM)

IAM includes the processes and technologies collectively used to manage the life cycle of digital identities (profiles) for people, systems, services and users. It is a crucial part of keeping your data and key resources protected from cyber attacks and limited only to those who should have access.

We help define your access management strategy, governance, access transformation and ongoing operations, including addressing IAM in OT and IoT systems and complex environments. IAM services can also help you to improve the efficiency of existing tools and processes, and identify opportunities to reduce costs associated with maintaining identities.

Architecture, engineering and emerging technologies

Our security architecture, engineering and emerging technology capabilities help you protect your organization from adversaries that may seek to exploit weaknesses in the design, implementation and operation of your technical security controls. These adversaries include disruptive technologies in the marketplace such as cloud computing, blockchain, IoT, industrial control systems devices, connected automotive and robotic process automation.

These disruptive technologies are critical to your organization’s business strategy and embracing digital technology to gain competitive advantage, and they must be appropriately architected and protected to maximize benefit with minimal risk.

Next-generation security operations and response

Our security operations and response services, combined with our deep portfolio of consulting, implementation support and managed services, can help you build a transformation strategy and roadmap to help implement the next generation of security operations. Energy and resources organizations have complex IT, OT and industrial IoT environments for cybersecurity monitoring. These require an experienced partner to provide holistic monitoring solutions, making sure all avenues for cyber attackers are protected, in addition to providing the right amount of ongoing support to help you manage leading-class security operations in a programmatic way.

EY support includes the design, build and optimization of a leading-class security operations center. The sector cybersecurity professionals can also help to identify and prioritize capital and operational investments to help you apply effective defenses to cyber threats. EY teams can provide just-in-time on-site and remote incident response support to help quickly contain and eradicate an intruder and implement enhanced defenses to reduce the risk going forward.

EY Cybersecurity


Our latest thinking

As technology and risks evolve, how will AI tools elevate your cyber team?

Unlock your cyber team's potential with EY's four AI personas. Enhance effectiveness and prevent threats by integrating AI tools today.

04 Mar 2025 Tom Schmidt +1

How can operational technology security keep pace with an evolving manufacturing landscape?

Safeguard critical production with robust OT security. Read our insights on understanding your OT security posture and managing evolving threats.

11 Dec 2024 Roman Haltinner +1

Why CISOs must cultivate a cyber-secure workforce in the age of AI

Explore strategies for creating a cyber-secure workforce in the AI era, focusing on education, governance and operational best practices.

11 Oct 2024 Dan Mellen +1

Is OT security your shortcoming or long-term advantage?

s digital technology and physical processes converge, securing operational technology (OT) has become a business imperative.

26 Feb 2024 Roman Haltinner

Developments in global sustainability reporting from COP28

Key sustainability reporting developments from COP28 to help companies adopt new sustainability disclosure standards. Learn more

15 Dec 2023 Victor Chan

Will you see the next cyber risk coming?

We share highlights from the EY Swiss Cybersecurity Leadership Insights Study and explore how Swiss companies compare at a global level.

12 Dec 2023 Tom Schmidt +1

Balance opportunity and risk in disruptive technologies

Adopting disruptive technologies is a critical challenge for organizations seeking to drive stronger compliance strategy while embracing innovation. Learn more.

30 Nov 2023 Todd Marlin +1

Are the global winds of change sending offshore in a new direction?

Turbulent times in the offshore wind sector could change the way large-scale energy projects are built and funded in future. Read more in RECAI 62.

14 Nov 2023 Arnaud de Giovanni +1

In an evolving cyber threat landscape, how do you develop Operational Technology (OT) resilience?

As cyber risks at the intersection of IT and operational technology grow, organizations should focus on ways to build resilience now.

23 Oct 2023 Roman Haltinner

Is your operating and tax model fit for your hydrogen business strategy?

Align your operating and tax model with your hydrogen business strategy. Ensure efficiency and compliance in the evolving energy sector.

20 Oct 2023 Jeroen Truin +2

The Basel III Finalization has been approved by the Federal Council

In healthcare, good prevention and rapid action in the event of cyber attacks can prevent damage and minimize risks.

18 Oct 2023

Risks and opportunities for mining and metals in 2024

In 2024, miners face more pressure to meet expectations around ESG, climate change and license to operate. Learn more.

11 Oct 2023 Paul Mitchell

How do you balance technological progress and cyber risk in MedTech?

To benefit and protect patients in today’s healthcare landscape, we need cutting-edge technologies coupled with robust security frameworks.

05 Oct 2023 Mario Pesenti

If you can’t protect what you can’t see, how do you manage cyber risk?

Many organizations struggle to stay cyber secure because they don’t know what IT assets they have so can’t implement appropriate controls.

16 Jun 2023 Tom Schmidt

Building Resilience: Safeguarding Financial Institutions from Modern Cyber Threats

Proactive cyber risk management is crucial for modern financial institutions to help quickly respond to threats and disruptions.

13 Jun 2023 Marc Minar

EY Consumer Health Survey 2023

The EY Global Consumer Health Survey 2023 findings suggest health executives should focus on access to care, cost and experience factors. Learn more.

06 Jun 2023 Aloha McBride

How could your security operations center (SOC) reach its true potential?

You may not have control over when security incidents occur, but an effective and mature SOC can stop threats before actual damage occurs.

12 May 2023 Tom Schmidt

EY Banking Barometer 2023 – turning points

EY's Banking Barometer 2023: Swiss banks show resilience and face turning points.

10 Jan 2023 Patrick Schwaller +2

Five ways oil and gas can lead the race to decarbonization

The traditional strengths of the oil and gas sector could help fund and fast-track new energy solutions – if companies act now. Read more.

06 Dec 2022 Saulius Adomaitis

How can life sciences and healthcare thrive in the metaverse?

Enabling immutable, anonymous, encrypted data and rich experiences, Web 3.0 opens a world of opportunity for healthcare and life sciences.

22 Nov 2022 Wolter Jalink

    Contact Us
    Like what you’ve seen? Get in touch to learn more.
    You are visiting EY ch (en)
    ch en