Deloitte Insights and our research centers deliver proprietary research designed to help organizations turn their aspirations into action.

DELOITTE INSIGHTS

  • Home
  • Spotlight
    • Weekly Global Economic Outlook
    • Top 10 Reading Guide
    • Diversity, Equity, & Inclusion
    • Cyber Risk
    • Digital Transformation
  • Topics
    • Strategy
    • Economy & Society
    • Operations
    • Workforce
    • Technology
  • Industries
    • Consumer
    • Energy, Resources, & Industrials
    • Financial Services
    • Government & Public Services
    • Life Sciences & Health Care
    • Technology, Media & Telecom
  • More from Deloitte Insights
    • About
    • Deloitte Insights Magazine
    • Press Room Podcasts

DELOITTE RESEARCH CENTERS

  • Cross-Industry
    • Home
    • Workforce Trends
    • Enterprise Growth & Innovation
    • Technology & Transformation
    • Environmental & Social Issues
  • Economics
    • Home
    • Consumer Spending
    • Housing
    • Business Investment
    • Globalization & International Trade
    • Fiscal & Monetary Policy
    • Sustainability, Equity & Climate
    • Labor Markets
    • Prices & Inflation
  • Consumer
    • Home
    • Automotive
    • Consumer Products
    • Food
    • Retail, Wholesale & Distribution
    • Hospitality
    • Airlines & Transportation
  • Energy & Industrials
    • Home
    • Aerospace & Defense
    • Chemicals & Specialty Materials
    • Engineering & Construction
    • Mining & Metals
    • Oil & Gas
    • Power & Utilities
    • Renewable Energy
  • Financial Services
    • Home
    • Banking & Capital Markets
    • Commercial Real Estate
    • Insurance
    • Investment Management
  • Government & Public Services
    • Home
    • Defense, Security & Justice
    • Government Health
    • State & Local Government
    • Whole of Government
    • Transportation & Infrastructure
    • Human Services
    • Higher Education
  • Life Sciences & Health Care
    • Home
    • Hospitals, Health Systems & Providers​
    • Pharmaceutical Manufacturers​
    • Health Plans & Payers​
    • Medtech & Health Tech Organizations
  • Tech, Media & Telecom
    • Home
    • Technology
    • Media & Entertainment
    • Telecommunications
    • Semiconductor
    • Sports
Deloitte.com
Deloitte Insights logo
  • SPOTLIGHT
    • Weekly Global Economic Outlook
    • Top 10 Reading Guide
    • Diversity, Equity, & Inclusion
    • Cyber Risk
    • Digital Transformation
  • TOPICS
    • Strategy
    • Economy & Society
    • Operations
    • Workforce
    • Technology
  • INDUSTRIES
    • Consumer
    • Energy, Resources & Industrials
    • Financial Services
    • Government & Public Services
    • Life Sciences & Health Care
    • Technology, Media & Telecom
  • MORE FROM DELOITTE INSIGHTS
    • About
    • Deloitte Insights Magazine
    • Press Room Podcasts
  • Welcome!

    For personalized content and settings, go to your My Deloitte Dashboard

    Latest Insights

    In a competitive labor market for retail workers, sustainability programs could give employers an edge

    Article
     • 
    5-min read

    A framework for managing an extended and connected workforce

    Article
     • 
    2-min read

    Recommendations

    Government Trends 2023

    Article

    Navigating toward a new normal: 2023 Deloitte corporate travel study

    Article
     • 
    17-min read

    About Deloitte Insights

    About Deloitte Insights

    Deloitte Insights Magazine, Issue 31

    Magazine

    Topics for you

    • Business Strategy & Growth
    • Leadership
    • Operations
    • Marketing & Sales
    • Diversity, Equity, & Inclusion
    • Emerging Technologies
    • Economy

    Watch & Listen

    Dbriefs

    Stay informed on the issues impacting your business with Deloitte's live webcast series. Gain valuable insights and practical knowledge from our specialists while earning CPE credits.

    Deloitte Insights Podcasts

    Join host Tanya Ott as she interviews influential voices discussing the business trends and challenges that matter most to your business today. 

    Subscribe

    Deloitte Insights Newsletters

    Looking to stay on top of the latest news and trends? With MyDeloitte you'll never miss out on the information you need to lead. Simply link your email or social profile and select the newsletters and alerts that matter most to you.

Welcome back

To join via SSO please click on the key button below
Still not a member? Join My Deloitte

Rediscovering your identity

by Michael Wyatt, David Mapgaonkar, David Jarvis
  • Save for later
  • Download
  • Share
    • Share on Facebook
    • Share on Twitter
    • Share on Linkedin
    • Share by email
12 minute read 11 November 2019

Rediscovering your identity How a comprehensive approach to digital identity management can empower everyone

12 minute read 11 November 2019
  • Michael Wyatt United States
  • David Mapgaonkar United States
  • David Jarvis United States
  • Save for later
  • Download
  • Share
    • Share on Facebook
    • Share on Twitter
    • Share on Linkedin
    • Share by email
  • Digital identity management: The challenges
  • A steady shift toward managed services and AI
  • Two sides of the same coin: Consumer and enterprise identity
  • A holistic solution to digital identity management

With traditional digital walls gone and consumer expectations rising, companies are struggling to find effective digital identity management solutions. It is critical to approach enterprise and consumer identity with equal vigor, explore managed services, and integrate new technologies.

From wax seals and stamps to passports and fingerprints to biometrics and behavioral analysis—humans have always looked for foolproof ways to validate that those they deal with are who they claim to be and can be trusted. In these times of increased concern over data breaches, fraud, and privacy, trust is paramount. And in our digital society, trust is determined through digital identity—the corpus of data about an individual, an object, or an organization that helps identify them through unique qualities and use patterns.

Learn more

Explore the Technology industry collection

Subscribe to receive related content

Download the Deloitte Insights and Dow Jones app

Effective digital identity practices are more important to business success than ever. They are vital for presenting a compelling first contact point to customers, protecting sensitive data, enabling secure transactions, and transforming business processes. They can enable new ways to engage with consumers via social media, improve collaboration within the enterprise, and automate and simplify cybersecurity practices.

However, companies are having to deal with increasing challenges in enterprise and consumer identity management. One of the reasons for this is the breakdown of traditional digital walls, which has blurred the distinction between the inside and outside of an organization. This shift, along with changing user expectations, emerging technologies, a shift to cloud-based services, growing business needs, and evolving privacy regulations, is giving rise to a digital identity crisis of sorts.

Breakdown of digital walls, changing user expectations, and emerging technologies are giving rise to a digital identity crisis of sorts.

Companies should reexamine, and rapidly evolve, their digital identity strategies—internally, for their enterprise, and externally, for consumers. Only by looking at digital identity management holistically and approaching both enterprise and consumer identities with a similar philosophy can organizations get the outcomes they desire. In this article, we take you through a unified strategy to help improve digital identity practices across the organization.

Digital identity management: The challenges

There are many emerging trends and challenges shaping the evolution and management of digital identity—both enterprise and consumer. Our research revealed some of the top ones:

Digital identity management can be overshadowed by more urgent concerns. It is not that companies don’t think it is important—they may be dealing with other pressing cybersecurity issues. They also may need to show immediate progress and return on investment on cybersecurity initiatives. However, it takes some patience to implement digital identity projects as they tend to be more of a marathon than a sprint. This challenge shows up in how much time and money companies are spending on the problem. In Deloitte’s 2019 Future of cyber survey, which surveyed 500 C-level executives responsible for cybersecurity, more than half of the respondents (54 percent) said they dedicated 10 percent or less of their cyber budget to identity solutions, with 95 percent committing 20 percent or less. Additionally, 88 percent of all respondents spend 10 percent or less of their time on identity and access management.1

Companies are wary of outsourcing identity management. Most cybersecurity leaders are protective of their systems and hesitant to let others manage them. According to Deloitte’s 2019 Future of cyber survey, the top preferred way to procure, implement, and provide ongoing delivery of identity capabilities is on-premise implementations, with 36 percent of respondents selecting this option. This is especially true of chief information security officers (CISOs), with 60 percent preferring on-premise solutions. Cloud-based identity-as-a-service (IDaaS) implementations were selected by just 24 percent of all respondents, and only 32 percent outsource their identity and access management to third parties.

Why this reluctance? The CISO of a major telecommunications company explains, “I have had applications that are many years—if not decades—old; a lot of in-house, homegrown applications that none of the cloud providers could easily integrate without making changes to their cloud infrastructure.”2 Such worries about integration, flexibility, getting specialized support, and a lack of faith in available capabilities are quite reasonable and likely hold back companies from opting for IDaaS.

Rising global data privacy regulations pose compliance challenges. Governments across the world are exploring—and implementing—new legislation and regulations to protect personal data privacy and digital identity. Executives and cybersecurity leaders have to address mandates such as the EU’s General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and Canada’s updated Personal Information Protection and Electronic Documents Act (PIPEDA). They also are expected to follow many other guidelines including the Cybersecurity Framework from the National Institute of Standards and Technology (NIST).3 This increases the burden on cybersecurity leaders and executives as they’re required to develop a more comprehensive view of their consumers to comply with legal and audit-related mandates.

A steady shift toward managed services and AI

Challenges aside, approaches to digital identity management are starting to change quickly. Organizations are increasingly living in cloud-centric environments and there is a general shift to managed services and consumption-based models. Deloitte’s 2018 study, Accelerating agility with everything-as-a-service, found evidence of this shift.4 Seventy-one percent of companies report that as-a-service (XaaS) now makes up more than half of their organization’s enterprise IT (with the remainder being traditional, nonservice-based IT).

Some companies have moved their identity stacks to the cloud and others are consuming identity-as-a service.

As part of this shift, some companies have moved their identity stacks to the cloud and others are consuming identity-as-a service. Gartner says that by 2022, “Forty percent of global midsize and larger enterprises will use identity and access management as a service (IDaaS) capabilities to fulfill most of their identity and access management (IAM) needs, which is up from 5 percent today.”5 One of the reasons for this is that cloud providers and third-party cloud operators are likely to have much more sophisticated capabilities than what a company may have in-house, which eliminates the need for updates and upgrades to both software and infrastructure. Also, with many companies facing a shortage of skilled cybersecurity professionals, using managed services helps eliminate the need to attract, train, and/or retain this hard-to-find talent.

Many organizations are also experimenting with and integrating a number of new technologies to improve their digital identity capabilities. Moving beyond simple logins and passwords, they’re increasingly using advanced authentication methods such as physical biometrics and behavioral monitoring as standard practices in digital identity management. In today’s “zero trust” environment, companies continuously monitor and authenticate users—constantly determining their level of risk based on who they are, what they access, and when and where they do it. To facilitate this, they are increasingly turning to AI technologies that help them automatically detect anomalies and identify behavior that doesn’t fit a particular pattern. Twenty percent of respondents from Deloitte’s 2019 Future of cyber survey are prioritizing AI-driven threat identification and assessment as a transformational capability in digital identity management.

In today’s “zero trust” environment, organizations have to continuously monitor and authenticate users to determine their level of risk.

However, there are mixed opinions on the use and maturity of AI in identity management. A CEO of a US-based cybersecurity and risk advisory company is optimistic about AI, and says, “AI or machine learning is going to be a capability that’s associated with risk assessment—not just identifying the user but also identifying the device and the health of that device, whether that’s been compromised or not. It has to be more than just ID and authentication.”6 On the more pragmatic side, Alex Beigelman, chairman of the National Cybersecurity Society, says, “The authentic stuff is very much in its infancy. It is being used, but in limited ways and only by a limited number of companies that have the resources to do some experimentation and take some risks.”7

Two sides of the same coin: Consumer and enterprise identity

While reexamining their digital identity management strategies, organizations should think about challenges related to both consumer and enterprise identity management to understand what they can do to create a holistic approach. There are different business requirements, technical approaches, and challenges for each, but there are sound fundamental practices that can be applied to both. Let’s look at some of the unique challenges:

Consumers are expecting more

With the increasing depth and complexity of digital interactions between consumers and businesses, attention to consumer identity management has increased commensurately. Companies want to ensure that those logging in are who they say they are and that they are having a good experience. The reasons for this are many, including:

  • Consumers expect more; they want to log in just once and get quick access to what they need, when they need it.
  • They are more connected than ever before and want a consistent experience across the multiple channels they engage with—call centers, mobile, Web, chatbots, and virtual assistants.
  • They are increasingly informed and concerned about privacy issues and hesitant to share too much personal information; they want personalization, ease, and flexibility in their interactions.
  • Consumers have come to expect a certain level of visible security. For example, multifactor authentication (MFA) while carrying out online banking transactions makes them feel secure.
Organizations must think about challenges related to both consumer and enterprise identity management for a holistic solution.

Within organizations, the complexity around consumer identity management has increased as well. Responsibility and ownership are often distributed among multiple executives, teams (marketing, sales, cybersecurity, etc.), and IT systems, making coordination of large-scale projects challenging. According to Deloitte’s 2019 Future of cyber survey, companies are focused on many different client- and vendor-facing identity initiatives. The top areas are consumer identity and access management at 28 percent, advanced authentication including MFA at 27 percent, and GDPR enablement/privacy compliance at 25 percent.

Enterprises are dealing with more

As the pace of business increases and the demands of transformational initiatives multiply, companies shouldn’t neglect enterprise identity management either. One of the biggest identity-related problems faced by companies is privilege misuse and compromised credentials, which are used by bad actors and cybercriminals to breach networks. A recent survey commissioned by Centrify covering 1,000 IT decision-makers in the United States and the United Kingdom found that 74 percent of respondents whose organizations have been breached acknowledge it involved access to a privileged account.8

Apart from external threats, companies face a host of internal enterprise identity management problems as well, including the following:

  • There continues to be a pronounced shortage of cybersecurity talent, and digital identity typically doesn’t garner a large share of focus or spending, so the necessary resources can be scarce.
  • Cybersecurity teams have to deal with legacy IT environments and a resistance to migrate to cloud-first architectures. Many haven’t built modern systems that are API-based, orchestrated, and enable easy integration with apps.
  • There is a rising expectation that cybersecurity can help enable digital transformation and innovation.

The top enterprise identity cybersecurity initiatives, as revealed in Deloitte’s 2019 Future of cyber survey, were advanced authentication (including MFA and risk-based authentication) and privileged access management (PAM)—each selected by 19 percent of respondents.

To fully address these issues, organizations should strive for digital identity management systems that embody a set of common qualities for both enterprise and consumer users (see the sidebar, “A proper digital identity management system should be”).

A holistic solution to digital identity management

Considering how deeply enterprise and consumer identities are interlinked, companies should approach both in a similar and coordinated manner to unlock benefits for the enterprise as well as consumers. It is not a question of either/or anymore—a strong, holistic approach to digital identity management can help drive the business, make life easier for cybersecurity teams, and provide superior experiences for both consumers and employees (see the sidebar, “How a holistic approach to digital identity helps”).

In the era of cyber everywhere, the operating environment for identity management will likely become increasingly complex—with greater business expectations to meet, new technologies to integrate, multiple data privacy regulations to adhere to, and increasing numbers of people and devices to manage. To navigate this complex environment, there are five things cybersecurity leaders can do to better integrate their digital identity management strategies, processes, and systems into the business:

  1. Pursue a holistic approach to identity: Treat everyone and everything equally—whether it be a consumer or an employee, a person, a device, or an application. Neglecting a single element of the identity ecosystem could impact the speed at which an organization innovates and operates. Look for cross-pollination opportunities between enterprise and consumer identity management and ways to use your traditional capabilities in new ways.
  2. Help consolidate, coordinate, and align responsibilities: Identity, data privacy, and regulatory compliance are increasingly overlapping. This means that technology, cybersecurity, legal, and business leaders are all stakeholders in effective identity management, each with their own challenges and ambitions related to user experience, system availability, resilience, risk management, and consumer engagement. Those responsible for identity management are in a unique position to inform and influence conversations and decisions and can ensure that the organization adapts more quickly.
  3. Advocate an outcome-based approach: To empower innovation efforts and drive digital transformation, look at making identity a service for the entire organization. Identify business outcomes—such as improving consumer retention or streamlining HR processes—that identity management can help with. To help overcome resource constraints, support larger transformational projects focused on these greater outcomes.
  4. Explore managed services: Given the array of resource and talent challenges and cybersecurity issues, look for help to address your business outcomes. If your organization can’t commit the required resources to identity management, explore third-party managed services, either on-premise or in the cloud. They can offer the latest skills and capabilities, increase automation, and future-proof identity systems. The shift might not be possible for all, and there may be resistance to giving up some control, but don’t disregard the option. To address concerns, consider taking a phased approach.
  5. Prepare to become AI-enabled: AI technologies such as machine learning are becoming integrated into many identity management solutions—from automated account concierges to fraud detection. Explore what their adoption may mean for your digital identity capabilities. What outcomes are you looking for—to automate or optimize existing processes or to create entirely new capabilities for authentication and risk assessment? How will it impact how your cybersecurity team spends its time and what kind of training will it require?

A 360-degree digital identity strategy, built with the above practices in mind, can unlock significant benefits for consumers and employees, cybersecurity teams, and business leaders. Most of all, a unified approach can help build trust and ensure privacy and security, thereby preventing a digital identity crisis. Digital identity systems used to require a choice between security or convenience—but now you can have both. Be thoughtful about how you design your systems in order to protect assets and avoid being too onerous for employees and consumers. Keep sight of this and the recommendations above as you walk the path of digital identity transformation.

Identity management for technology, media and entertainment, and telco companies

Every company has a different set of digital identity challenges and a unique approach to identity management. Technology companies, for instance, should be very flexible with their digital identity strategies and systems so they can navigate a fast-moving market. Media and entertainment companies often deal with large numbers of transient customers. Telco companies may have very old systems that are difficult to update or replace and can’t integrate easily with modern identity management solutions. However, there are some common factors they should keep in mind while enhancing their digital identity management capabilities. Here are some of them:

  1. They have been minimally regulated compared to other industries. This means that they don’t necessarily have to do certain things with respect to digital identity that other companies are required to do. If they do them, it is because they are the right things to do for customers and employees and help maintain trust and security. A lack of regulatory pressure can potentially slow digital identity transformation. This is beginning to change with the advent of new regulations such as the GDPR and the CCPA, which are making it necessary for less experienced industries to change their approach.
  2. They have a high level of technical expertise and experience. Many technology, media and entertainment, and telco companies employ highly skilled engineers and technologists and may feel they can handle any digital identity problem that comes their way; that they can just build what they need from scratch and move on to the next problem. However, a proper digital identity approach weaves together many complex systems that require specialized skills and constant vigilance. Companies should focus high-end technical talent on their core mission and leverage mature identity solutions already available.
  3. They face greater potential consequences for mistakes. Many of these companies create the products and services that underlie and power all other industries. If a breach were to occur in one of them due to mismanaged credentials, the public and market reaction may be disproportionately larger than if it happened to a retailer or industrial company. This makes a comprehensive digital identity strategy and approach even more essential.
Acknowledgments

The authors would like to thank Shreyas Waikar, Prakriti Singhania, Naresh Persaud, Alex Bolante, Anthony Berg, Nicole Hockin, and Hillary Campbell for their contributions to this report.

Cover image by: J. F. Podevin

Endnotes
    1. Deloitte, 2019 Future of cyber survey, 2019. The survey was conducted by Wakefield Research among 500 C-level executives who oversee cybersecurity at companies with US$500 million or more in annual revenue (100 CISOs, 100 CSOs, 100 CTOs, 100 CIOs, and 100 CROs) between January 9 and 25, 2019, using an online survey. View in article

    2. CISO of a telecommunications company, interview with authors, August 16, 2019. View in article

    3. NIST, “Cybersecurity framework,” accessed October 23, 2019. View in article

    4. Gillian Crossan et al., Accelerating agility with everything-as-a-service: IT providers are shifting from traditional models to XaaS flexible consumption models, Deloitte Insights, September 17, 2018. View in article

    5. Gartner, “Gartner predicts increased adoption of mobile-centric biometric authentication and SaaS-delivered IAM,” press release, February 6, 2019. View in article

    6. CEO of a US-based cybersecurity and risk advisory company, interview with authors, August 28, 2019. View in article

    7. Alex Beigelman (chairman, National Cybersecurity Society), interview with authors, August 27, 2019. View in article

    8. Centrify, “SURVEY: Privileged access management in the modern threatscape,” accessed October 23, 2019. View in article

Show moreShow less

Topics in this article

Technology , Media & Entertainment , Technology Industry , Telecommunications , Digital Transformation , Cyber risk , Risk management

Deloitte Cyber

As a recognized leader in cybersecurity consulting, Deloitte Cyber includes thousands of dedicated cyber professionals, across 20 industry sectors, who help clients better align cyber risk strategy and investments with strategic business priorities, improve threat awareness and visibility, and strengthen their ability to thrive in the face of cyber incidents. The ubiquity of cyber drives the scope of our services. Deloitte Cyber advises, implements, and manages solutions in strategy, defense, and response; data security; application security; infrastructure security; and identity management. In 2019, Deloitte Cyber opened the Cybersphere, a state-of-the-art destination to help clients address their most pressing cyber challenges. The Cybersphere offers a Watch Floor for 24/7 threat monitoring and reconnaissance to help clients detect and respond to threats in real time; a Cyber IoT Studio, where next-generation security is developed and tested; and a client-centered Core, featuring labs that provide disruptive, interactive experiences customized to increases capability and confidence in the face of ever-evolving cyber threats.

Learn more
Get in touch
Contact
  • Michael Wyatt
  • Identity leader, Principal
  • Deloitte & Touche LLP
  • miwyatt@deloitte.com

Download Subscribe

Related content

img Trending

Building digital trust: Technology can lead the way

Article 4 years ago
img Trending

The duct tape guide to digital strategy

Article 4 years ago
img Trending

Determining your future Business of Technology

Article 4 years ago
img Trending

Where do you fit in the new digital ecosystem?

Article 7 years ago

Explore the Digital transformation collection

  • Bringing digital to the boardroom Article4 years ago
  • A pragmatic pathway for redefining work Article4 years ago
  • Scaling IoT to meet enterprise needs Article4 years ago
  • Are you a trust buster or builder? Article4 years ago
  • Are you a trust buster or builder? Article4 years ago
  • Coming of age digitally Article5 years ago
Michael Wyatt

Michael Wyatt

Principal | Deloitte Risk & Financial Advisory

Mike, a principal at Deloitte & Touche LLP, is the Global Identity Offering leader of the Cyber & Strategic Risk practice of Deloitte Risk & Financial Advisory. He is a recognized leader in identity, as well as public sector cybersecurity and privacy approaches, and has a deep focus on identity management, breach remediation, and statewide security assessments and security program development. Mike is the Deloitte Risk & Financial Advisory leader for many state and commercial clients.

  • miwyatt@deloitte.com
  • +1 512 226 4171
David Mapgaonkar

David Mapgaonkar

US Cyber & Strategic Risk Clients & Industries Leader | Deloitte & Touche LLP

David serves as the US Cyber & Strategic Risk Clients & Industries Leader and focuses on driving growth across Deloitte's commercial portfolio of industries and sectors while ensuring the highest level of client excellence. Prior to his current role, he served in dual roles as the Identity & Access Management practice leader, and, the TMT Industry leader for the Cyber & Strategic Risk practice. Over his 25 years of professional experience, David has held various business and client leadership roles and has been shaped by the opportunity to work with some of the world's most innovative companies. He frequently speaks and writes on technology risk topics. Recent publications include the Wall Street Journal, USA Today, and various Deloitte and other publications. Recent speaking engagements include ISC2, Silicon Valley Directors' Community, various Boards and Audit Committees, the Gartner Identity conferenec and the RSA Security Conference. David has a master’s degree in Computer Science from the University of Southern California (USC).

  • dmapgaonkar@deloitte.com
  • +1 408 704 4481
David Jarvis

David Jarvis

Senior Research Leader

David is a senior research manager in Deloitte’s Center for Technology, Media & Telecommunications, Deloitte Services LP. He has more than 15 years of experience in the technology industry and is a passionate expert and educator focused on emerging business and technology issues—including the potential impacts of longer-term change across our digital society.

  • davjarvis@deloitte.com
  • +1 617 437 2862

Share article highlights

See something interesting? Simply select text and choose how to share it:

Email a customized link that shows your highlighted text.
Copy a customized link that shows your highlighted text.
Copy your highlighted text.

Rediscovering your identity has been saved

Rediscovering your identity has been removed

An Article Titled Rediscovering your identity already exists in Saved items

Invalid special characters found 
Forgot password

To stay logged in, change your functional cookie settings.

OR

Social login not available on Microsoft Edge browser at this time.

Connect Accounts

Connect your social accounts

This is the first time you have logged in with a social network.

You have previously logged in with a different account. To link your accounts, please re-authenticate.

Log in with an existing social network:

To connect with your existing account, please enter your password:

OR

Log in with an existing site account:

To connect with your existing account, please enter your password:

Forgot password

Subscribe

to receive more business insights, analysis, and perspectives from Deloitte Insights
✓ Link copied to clipboard

Deloitte Insights and our research centers deliver proprietary research designed to help organizations turn their aspirations into action.

Deloitte Insights

  • Home
  • Topics
  • Industries
  • About Deloitte Insights

DELOITTE RESEARCH CENTERS

  • Cross-Industry
  • Economics
  • Consumer
  • Energy & Industrials
  • Financial Services
  • Government & Public Services
  • Life Sciences & Health Care
  • Tech, Media & Telecom
Deloitte logo

Learn about Deloitte’s offerings, people, and culture as a global provider of audit, assurance, consulting, financial advisory, risk advisory, tax, and related services.

  • Terms of Use
  • Privacy
  • Privacy Shield
  • Cookies
  • Legal Information for Job Seekers
  • Labor Condition Applications
  • Do Not Sell My Personal Information