Solutions
Cyber Center Solutions
Deloitte Cyber Center is part of the firm’s global network of cyber centers that offers a wide range of services to clients across various industries, both domestically and globally.
As the business landscape continues to evolve, we provide guidance and support to a diverse array of stakeholders – starting from managers and information security and cyber security units, IT and information systems managers, development bodies, internal auditors, audit committees, risk managers, C-level managers, to board directors.
Deloitte’s professional cyber experts leverage standard-based methodologies and combine them with extensive industry knowledge and experience in various sectors of the industry in Israel and around the world. This approach enables us to assist our clients in understanding the cyber risks relevant to their business, as well as providing insight into the operational architecture, necessary technological solutions, and regulatory requirements.
With a staff of over 70 cyber experts, our center in Israel boasts a wealth of diverse capabilities in their respected field of technology, regulation, strategy, risk management, and much more, thus, enabling us to tailor our services to the unique needs of each client. The team works closely with other cyber teams worldwide to ensure that our global clients receive the necessary support across different countries.
Among our solutions
Defining the company's cyber threat
Building work and cyber strategy plans
Cyber risk management
Assisting organizations inmeeting compliance and regulatory standards, including ISO27001, 270017/8, and others
Privacy
- GDPR requirements
- Compliance with the regulations of the Israeli Privacy Protection Law
- Requirements specific to different countries
Identity management
Planning the concept and architecture of identity and access management in the organization (cloud and on-prem)
Implementing identity management solutions - Sailpoint, Cyberark, Okta
Monitoring cyber incidents
- Designing monitoring systems (cloud and on-prem)
- Implementing automation solutions and writing Playbooks
- Devising scenarios for monitor systems
- Examining and assisting in choosing a solution
- Establishing SOC systems or guiding through the process of selecting managed services
Cyber war-gaming and incident simulation
Cyber resilience
- Forming business continuity plans – BCP
- Surveying an existing situation and setting up backup and recovery systems (cloud and on-prem)
Cloud
- Writing a corporate cyber policy for the Cloud
- Writing a cyber strategy for the Cloud
- Planning migration processes in cyber aspects
- Architecture review – once or continued
- Performing penetration testing for cloud environments
- Information security review for SaaS systems (Salesforce and others)
- Automating information security processes in the cloud
Penetration Testing and Red Team Exercises
- Performing Penetration Testing - infrastructure, application, web, mobile, cloud
- Performing Red Team / Purple
- Team exercises
- Building automation systems (BAS)
Supply Chain
- Carrying out supplier surveys
- Planning the concept of the supplier survey and its management process
- End-to-end managed service of supplier and supply chain surveys
- CISO as a Service – appointing a chief information security officer for organizations