EY and Information Security: Governance, Trust and Regulatory Alignment

When observing the Big Four through the lens of information security, it quickly becomes clear that the real differences between the firms are not found in their service portfolios but in how they position security within organizations. On paper, all of them offer cyber advisory, risk, compliance, and security services. In practice, however, the way […]
Deloitte’s Cyber Practice: Where Strategy and Technical Depth Converge

Anyone observing the Big Four through the lens of information security quickly notices that, while all firms speak about governance, risk, compliance, and cyber advisory, the actual nature of the work feels very different depending on the firm. On paper, the portfolios may look similar. In practice, the experience for security professionals and for clients […]
PwC and Information Security: Where Risk Meets Business Transformation

There is a moment in large transformation programs that outsiders almost never see. Not in the kick-off meetings, not in the beautifully designed roadmaps, and not in the steering committees. It happens later. The point where everyone involved realizes that the real challenge is not SAP, not the cloud, and not even the new processes. […]
Why Information Security at KPMG Is Driven by Audit DNA

When information security is discussed today, the spotlight usually turns toward system integrators, security boutiques or large technology vendors. Hardly anyone initially thinks of an audit and advisory firm. Yet KPMG has become one of the most influential players in this field. Not because the firm suddenly decided to “do cyber,” but because information security […]