Key takeaways
Host: Mike Juergens, principal, Deloitte & Touche LLP
1 Overview CPE credit | Specialized Knowledge
With digital transformation often comes interconnectedness that can significantly broaden an organization’s cyber vulnerability. How can you effectively monitor for and detect intrusions, uncover new attack vectors, remediate vulnerabilities, and proactively hunt for threat actors, all while protecting valuable data? We’ll discuss:
- An overview of cyber everywhere, including threat landscape realities, how organizations are responding, and challenges they face.
- Implications for organizations that don’t consider advanced threat defenses.
- Potential advantages of a managed services approach.
- Considerations for structuring an integrated approach to managed detection and response.
Meet the speakers

Michael Juergens
Michael (Mike) is a principal with Deloitte & Touche LLP. He joined the Deloitte US firms in 1996 and has held a wide range of leadership positions which include helping to found and build the ERP Assurance practice, and subsequently the Corporate Governance Services practice and the Information Technology and Cyber Internal Audit practice. He currently leads the Deloitte Risk & Financial Advisory Executive Accelerators Program.

Kent Cinquegrana
Kent, a managing director at Deloitte & Touche LLP, is the Managed Services & Products leader for the Cyber Risk Services Infrastructure practice of Deloitte Risk & Financial Advisory. He is also currently the practice leader for Deloitte’s Fusion Managed Services (MS&P Offering). Kent has more than 25 years of experience with information technology at Fortune 500 companies and primarily focuses on enterprise risk and security. Kent has extensive experience supporting financial services clients with strategic planning, project and product management, and system engineering strategies of security and risk solutions. His experience includes deploying enterprise-wide security information, event management systems, and security technologies, managing global IT security operations, engineering, and vulnerability management teams, and creating and managing incident response programs.
Dbriefs resources