Cybersecurity

What we do

Assessing risk and resilience
Securing the digital transformation
Establishing crisis response and preparedness
Building long-term cyber capabilities

Examples of our work

Uncovering weaknesses in a global bank’s cybersecurity approach
Helping an oil and gas company with its cybersecurity maturity transformation
Establishing cloud security for a major pharma company
Responding to a tech company’s cyber crisis

Featured experts

Venky Anant
PartnerBay Area
Helps leading high-tech institutions solve their most challenging strategic, digital infrastructure, and security problems
Lamont Atkins
PartnerDallas
A former senior military leader specializing in driving strategic cybersecurity transformations for industry-leading organizations....
Tucker Bailey
PartnerWashington DC
As a leader in cybersecurity, digital, and advanced analytics, empowers senior leaders in governments, public-sector organizations,...
Ida Kristensen
Senior Partner and Managing Partner, Northeast Region and New York officeNew York
Advises leading organizations on building resilience, strengthening risk management, and driving operational improvement
Jim Boehm
PartnerLondon
Technology risk expert with a deep spike in enterprise cybersecurity, serving mainly financial services institutions
Jan Shelly Brown
PartnerNew Jersey
Helps financial institutions modernize technology to unlock significant cost savings and speed to market while enhancing risk...
Rich Isenberg
PartnerAtlanta
Leads enterprise-wide cybersecurity strategy and operations, with a keen focus on risk management and digital transformation
James Kaplan
PartnerNew York
Helps organizations transform their technology, infrastructure, and cybersecurity for lasting impact
Charlie Lewis
PartnerConnecticut – Darien
Helps leading institutions transform the approach to cybersecurity to protect what matters most and create a secure and sustainable...
Marc Sorel
PartnerBoston
Advises private, public, and not-for-profit clients on technology, digital transformation, and cybersecurity topics
David Ware
PartnerWashington DC
Supports digital and analytics transformations in the defense sector, and brings cybersecurity expertise to both private and...

Featured Report

An abstract digital landscape made of glowing blue dots and flowing grid-like waves, resembling a data-driven ocean or network. Small floating geometric shapes and light particles hover above the surface, creating a futuristic, high-tech atmosphere.

McKinsey named a Leader in Cybersecurity Consulting Services by Forrester

Featured Video

Making Cyber Risk a Strategic Priority

Featured insights

A lone figure in an overcoat and holding an umbrella stands on a rooftop gazing out at a futuristic cityscape with glowing lines and abstract buildings. The color palette is dominated by shades of blue, with the sun's rays piercing through the misty atmosphere.
Taking a business-critical approach to supplier nth-party IT risk management
-
Abstract plexus heart on a black background.
Rewiring healthcare payers: A guide to digital and AI transformation
-
A glowing digital shield at the center of a circuit board, symbolizing cybersecurity and data protection.
Securing the agentic enterprise: Opportunities for cybersecurity providers
-
The sun is setting on workers in glass-walled boardroom
Competitive advantage through cybersecurity: A board-level perspective
-
A glowing particle and light network communication on a black background.
Quantum communication growth drivers: Cybersecurity and quantum computing
-
Medical professionals discussing the security system in front of an array of screens in a control room.
Tech resilience for healthcare providers: Inaction has a heavy toll
-
Smooth, gray river stones on a black background.
Europe’s next cybersecurity hub: What makes Spain a leading contender?
-
A grid of dark blue cubes with a mix of glowing blue and magenta binary numbers and orange padlock icons.
The cybersecurity provider’s next opportunity: Making AI safer
-
Big waves breaking against a seawall on the coast
A board-level view of cyber resilience
-
Abstract image of digital network space cross section.
Boards of directors: The final cybersecurity defense for industrials
-
Image of digital light shaped like intricate clockworks.
The cyber clock is ticking: Derisking emerging technologies in financial services
-
Thin metallic wires of different lengths with small lights at their ends bending together against a dark background for added drama.
New-business building: Six cybersecurity and digital beliefs that can create risk
-
A wall composed of repeating metal triangular pyramids.
Cracking the code on enhanced digital and cyber risk maturity
-
A view of Washington Monument from the Tidal Basin during daytime and full cherry blossom bloom.
Making the case: How the mid-Atlantic region can become a leading cybersecurity hub
-
Multicolored glowing data over digital landscape.
Product security: Navigating regulations and customer expectations
-
Engineer wearing safety helmet using laptop with oil refinery background
How to enhance the cybersecurity of operational technology environments
-
""
Managing a cyber risk event: ‘Be a student of a crisis’
-
Gary Steele headshot
Resiliency and leadership in uncertain times: An interview with Splunk’s CEO
-
Man watching abundance of glowing computer monitors
New survey reveals $2 trillion market opportunity for cybersecurity technology and service providers
-
Digital generated image of glowing glass fingerprint icon on black surface. - stock photo
Building a cybersecurity culture from within: An interview with MongoDB
-
" "
Perspectives on model risk management of cybersecurity solutions in banking
-
" "
Localization of data privacy regulations creates competitive opportunities
-
Candidate is having a conversation at a job interview
Securing your organization by recruiting, hiring, and retaining cybersecurity talent to reduce cyberrisk
-
""
Cybersecurity legislation: Preparing for increased reporting and transparency
-
""
Cybersecurity trends: Looking over the horizon
-
Pipe metal texture inside
Ransomware prevention: How organizations can fight back
-
key
The unsolved opportunities for cybersecurity providers
-
Cyber resilience: Protecting America’s digital infrastructure
Cyber resilience: Protecting America’s digital infrastructure
-
Cybersecurity Podcast
Podcast
Cyber Resilience
-
Organizational cyber maturity: A survey of industries
Organizational cyber maturity: A survey of industries
-
Security as code
Security as code: The best (and maybe only) path to securing cloud applications and systems
-
Building cyber resilience in national critical infrastructure
Building cyber resilience in national critical infrastructure
-
Enterprise cybersecurity: Aligning third parties and supply chains
Enterprise cybersecurity: Aligning third parties and supply chains
-
Cybersecurity in Iberia Aligning business and the board
Cybersecurity in Iberia: Aligning business and the board
-
Securing small and medium-size enterprises: What's next?
Securing small and medium-size enterprises: What’s next?
-
Strengthening the  IT security posture in corporates and industrials
Strengthening the IT security posture in corporates and industrials
-
The Latin American energy sector: How to address cybersecurity
The Latin American energy sector: How to address cybersecurity
-
Derisking digital and analytics transformations
Derisking digital and analytics transformations
-
Cybersecurity: Emerging challenges and solutions for the boards of financial-services companies
Cybersecurity: Emerging challenges and solutions for the boards of financial-services companies
-
How CIOs and CTOs can accelerate digital transformations through cloud platforms
How CIOs and CTOs can accelerate digital transformations through cloud platforms
-
Reaching for the cloud: A CEO’s guide
McKinsey Quarterly
Three actions CEOs can take to get value from cloud computing
-
COVID-19 crisis shifts cybersecurity priorities and budgets
COVID-19 crisis shifts cybersecurity priorities and budgets
-
A dual cybersecurity mindset for the next normal
A dual cybersecurity mindset for the next normal
-
Safeguarding against cyberattack in an increasingly digital world
Safeguarding against cyberattack in an increasingly digital world
-
Building security into the customer experience
Building security into the customer experience
-
Cybersecurity in a digital era
Collection
Cybersecurity in a digital era
-
Agile, reliable, secure, compliant IT Fulfilling the promise of DevSecOps
Agile, reliable, secure, compliant IT: Fulfilling the promise of DevSecOps
-
The consumer-data opportunity and the privacy imperative
The consumer-data opportunity and the privacy imperative
-
Cybersecurity tactics for the coronavirus pandemic
Cybersecurity tactics for the coronavirus pandemic
-
Cybersecurity’s dual mission during the coronavirus crisis
Cybersecurity’s dual mission during the coronavirus crisis
-
The cybersecurity posture of financial-services companies: IIF/McKinsey Cyber Resilience Survey
Report
The cybersecurity posture of financial-services companies: IIF/McKinsey Cyber Resilience Survey
-
Protecting the business Views from the CIO's and CISO's offices
Protecting the business: Views from the CIO’s and CISO’s offices
-
Enhanced cyberrisk reporting: Opening doors to risk-based cybersecurity
Enhanced cyberrisk reporting: Opening doors to risk-based cybersecurity
-
The risk-based approach to cybersecurity
The risk-based approach to cybersecurity
-
Financial crime and fraud in the age of cybersecurity
Financial crime and fraud in the age of cybersecurity
-
Securing software as a service
Securing software as a service
-
How cybersecurity can best support the digital enterprise
Cybersecurity: Linchpin of the digital enterprise
-
Critical infrastructure companies and the global cybersecurity threat
Critical infrastructure companies and the global cybersecurity threat
-
Perspectives on transforming cybersecurity
Collection
Perspectives on transforming cybersecurity
-
Defense of the cyberrealm: How organizations can thwart cyberattacks
Defense of the cyberrealm: How organizations can thwart cyberattacks
-
Critical resilience: Adapting infrastructure to repel cyber threats
Critical resilience: Adapting infrastructure to repel cyberthreats
-
Cyberrisk measurement and the holistic cybersecurity approach
Cyber risk measurement and the holistic cybersecurity approach
-
Cybersecurity and the risk function
Cybersecurity and the risk function
-
Insider threat: The human element of cyberrisk
Insider threat: The human element of cyberrisk
-

Related Insights

Critical infrastructure protection more vital than ever, though organizations still lack an understanding of its importance
4 steps to tackling ransomware
Security-as-Code Gains More Support, but Still Nascent
The Wall Street Journal: Hackers May Be Coming for Your City’s Water Supply
CSO Magazine: 6 new ways threat actors will attack in 2021
POWER Magazine: The Energy-Sector Threat: How to Address Cybersecurity Vulnerabilities
CSO Magazine: 7 things to look for in a security awareness training provider