With the proliferation of Internet-enabled devices, cyber culture is growing more rapidly than cyber security. Everything that depends on cyberspace is potentially at risk.
Private data, intellectual property, cyber infrastructure, and even military and national security can be compromised by deliberate attacks, inadvertent security lapses, and the vulnerabilities of a relatively immature, unregulated global Internet. Working hand-in-hand with member firm clients, Deloitte helps organisations plan and execute an integrated cyber approach to harness the power of information networks to enhance business operations, increase mission performance, and improve customer support, without compromising security or privacy.
- Deloitte named a global leader in cyber security consulting
- Cyber Security. Evolved. video
- Changing the Game on Cyber Risk
- Cyber crime fighting
- Networked Medical Device Cybersecurity and Patient Safety
Identity and Access Management is a highly complex business issue that goes far beyond the IT department. It encompasses the entire organisation, including business units, individual locations, systems, access points, business partners and customers. Complicating matters further, is the growing number of mobile employees, joint ventures and other business activities that expose IT systems to potential threats.
Deloitte’s Identity & Access Management (IAM) framework addresses all aspects of the identity and access management lifecycle. It is a holistic, business-focused approach that incorporates Deloitte’s experience related to processes, control, technology and security, with in-depth vendor software knowledge, to deliver a comprehensive and sustainable identity management solution.
Deloitte named a global leader in cyber security consulting by Kennedy
Deloitte Touche Tohmatsu Limited (DTTL) is pleased to announce that Kennedy Consulting Research and Advisory, a leading analyst firm, has named Deloitte a global leader in cyber security consulting.
Kennedy’s recently released report, entitled Cyber Security Consulting 2013, addresses clients’ increasing need to seek help from consulting firms to guide them through the complexities of cyber security. As such, the report provides an assessment of cyber security consulting providers in terms of the relative breadth and depth of their cyber security consulting capabilities.
Changing the Game on Cyber Risk
Most reports on cyber security revolve around a common theme: despite heightened attention and unprecedented levels of security investment, the number of cyber incidents — and their associated costs — continues to rise. They typically point to the growing sophistication of hackers and other adversaries as a particularly intractable problem and some deliberate over whether being secure is even possible in today’s rapidly evolving landscape of cyber attacks. Important questions, though, remain unaddressed. In particular: what are the underlying reasons for this trend and how can organizations actually reverse it to start winning the cyber risk battle?
Cyber crime fighting
Enterprises have to go on the offense to protect themselves from a rising tide of cyber crime. Collective intelligence and human judgment supported by advanced security analytics can help.
As personal, commercial, and government activities continue to migrate to the digital realm, so do criminals. Large-scale cyber attacks are becoming more frequent and more costly for businesses in the United States. Attackers are better funded, more sophisticated, and better organised than in the past, often representing criminal networks or states. Dozens of US banks have suffered cyber attacks over the last year at the hands of foreign attackers.
As enterprises and government agencies increasingly adopt cloud, mobile, and social computing, information technology (IT) environments are becoming more difficult to defend. Increasingly, organisations need to accept that security breaches are inevitable.
Networked Medical Device Cybersecurity and Patient Safety
Perspectives of Health Care Information Security Executives
Networked medical devices and other mobile health (mHealth) technologies are a double-edged sword: They have the potential to play a transformational role in health care but also may be a vehicle that exposes patients and health care providers to safety and cybersecurity risks such as being hacked, being infected with malware and being vulnerable to unauthorised access.
Patient safety issues—injury or death—related to networked medical device security vulnerabilities are a critical concern; compromised medical devices also could be used to attack other portions of an organisation’s network. Click to read more.
The world and the environment in which decisions are made are experiencing profound transformations. Consequently, new risks appear, old ones are changing - and the ability to cleverly understand and manage risks will be crucial.
Thus, one year after the last governance, risk management & compliance edition of Inside, this first issue of 2015 points out key topics in these areas. It focuses on the roles and challenges of Boards of Directors, Board Committees, Chief Risk Officers, Chief Information Security Officers, Chief Compliance Officers and Chief Internal Auditors. We hope you will find this publication insightful.