Detect and Respond

Early Warning

Deloitte Early Warning monitors IT/OT security-related threats (global and industry-specific) by correlating and verifying them across various data sources to provide actionable intelligence.

Challenges

Who has got the time and staff? Are we vulnerable? How to prioritise? Can we respond to threats more quickly?

More and more companies get hit by various types of attacks, most of them with the unfortunate impact of high financial losses and a damaged reputation. This requires companies to detect, prioritise and respond more quickly than before.

While companies often have a couple of security solutions implemented to mitigate some areas, risk in other areas is not always mitigated

Vulnerability scanning provides good insight into a system’s vulnerabilities and hence an indication of weaknesses in the system landscape. Mitigating these vulnerabilities often poses challenges, such as few service windows to boot systems, and a long process of patching leads to a very long period of exposure to threats.

Threat intelligence through various trustworthy sources can give information on threat actors, new attacks seen “in the wild”, etc.. This would be combined with threat forensics reports that can give the indicators of compromised details, all of which require attention. Unfortunately, correlation of all such data often takes a manual effort.

Another issue is the cost of these technologies and the cost of the threat feeds themselves. This is a challenge, as the cost is often quite high, but it also requires staffing to implement and operate these technologies. Such resources require specific skillsets and maintenance of those skillsets.

Some companies have the staff required, but simply do not have enough time to perform this task, which reduces their ability to detect current threats identified by relevant threat analyses which can provide mitigation recommendations.

It takes time to go through the threat data, analyse which of the company’s assets that might be vulnerable to a particular threat, and assess whether the asset is a company-critical asset.

Our approach

We ensure successful implementation with our three-step model for our Early Warning service.

Deloitte’s Early Warning service covers the challenges referred to above. However, to ensure successful service implementation, there are some steps to go through.

  1. Assessment

    Firstly, a workshop is held with you and your IT/IT Security team. The workshop will identify the prerequisites of what needs to be implemented and what data are required from you, as this needs to be identified and handled prior to the service engagement.

  2. Implementation

    Deloitte supports the implementation where local implementation is required, and Deloitte performs the remaining activities at our backend. This covers technology used, network integration, configuration and verification upon completion.

  3. Operation

    Once the implementation has been mutually verified and agreed, we move on to the operational service. Immediate actionable notifications of threats which have been identified on your system to help you prioritise mitigating actions. All within the agreed service time frame.

  1. Assessment
  2. Implementation
  3. Operation

Firstly, a workshop is held with you and your IT/IT Security team. The workshop will identify the prerequisites of what needs to be implemented and what data are required from you, as this needs to be identified and handled prior to the service engagement.

Deloitte supports the implementation where local implementation is required, and Deloitte performs the remaining activities at our backend. This covers technology used, network integration, configuration and verification upon completion.

Once the implementation has been mutually verified and agreed, we move on to the operational service. Immediate actionable notifications of threats which have been identified on your system to help you prioritise mitigating actions. All within the agreed service time frame.

Why Deloitte?

Awarded market leaders

We strive to continuously lead the market in the area of cyber risk and security services. We are awarded and acknowledged by some of the most renowned institutions within the area of cyber, e.g. Gartner, ALM Intelligence and Forrester. In 2020, we were named global leader in Security Consulting Services for the 9th year in a row by Gartner.

Leading-edge technologies

We are committed to investing in innovation and emerging technologies to ensure that we are equipped with the latest tools to solve current and future challenges for our clients. Alliances with market-leading cyber vendors and groundbreaking startups around the world offer our clients access to a wide range of cyber-risk technologies and leading-edge technology innovation.

Global intelligence delivered locally

We have the largest professional services network in the world. Diversity across our cyber teams helps us work across the globe with a local and personal lens. We have over 8,600 dedicated cyber-risk service practitioners of which 1,300 are dedicated to Europe and the Middle East alone, ready to help our clients everywhere with any challenge.

End-to-end cyber-risk services

We cover every aspect of cyber risk — from advisory and implementation of strategic transformations to managed security services, product solutions and incident management. This enables us to deliver more resilient and silo-breaking solutions, taking the whole business chain into account. This helps our clients to leverage their potential and growth even more.

Reach out

If you do not have the budget to buy the tools and have a resource spending all their time protecting your company, let us help you by adding this layer of detection and early warning to your company.

Søren Tillebæk Jensen

Senior Manager

Afshin Mir

Director

$(document.head).append(''); $(document.head).append('