Perspectives

Unlocking cyber excellence: CISO strategies for the TMT industry

Maximizing cyber investments, enhancing security operations, and optimizing compliance

Cyber continues to be both a growing and critical strategic priority for companies that need to maintain the trust and confidence of customers. The vital role of cyber is reflected on board agendas: 40% of US chief information security officers (CISOs) say they report to their boards monthly, and another 47% report quarterly.¹

Four ways to propel a cyber refresh

With revenue pressure growing, one of the technology, media, and telecommunications (TMT) industry’s challenges is bringing fiscal efficiency to programs that protect and secure digital operations. Security operations need to be streamlined, made less redundant, and tuned for optimal effectiveness, all in an environment of evolving threats, limited resources, and scarce security talent.

Deloitte’s TMT and Cyber specialists have explored the critical cyber issues facing TMT companies and offer key strategic actions to help address them. Read on to see more on the challenges and the actions you can take.

TMT organizations face an expanding and increasingly complex cybersecurity threat environment. The volume of attacks grows at an exponential pace, while attackers use both scaled computing power and new sophistication (e.g., AI and Generative AI) to overwhelm defenses. Regulatory demands add to the complexity and cost of responding to breaches (already averaging $9.48 million per breach in the United States²). Continual migration to the cloud, remote and hybrid work, and mobile applications have opened new gaps for attackers to exploit. Companies have built up defenses—the average company has deployed 76 security tools³—but struggle to coordinate mismatched, redundant, or siloed technologies. Yet even as the cybersecurity challenge grows, budgets are constrained—and cybersecurity talent is hard to find and hard to keep.

How can you respond?

  1. Assess how well your technology is integrated and whether there are efficiencies to gain in your security operations services.
  2. Determine your existing cybersecurity expertise and talent against the rapidly expanding attack surface. Do you have the personnel in-house to enhance your security—and if not, can you recruit and retain the needed talent in today’s tight market? If you lack offshore operations, can you meet 24/7 cybersecurity demands?
  3. Evaluate the cost of current tools and technology platforms against the value of managed services and infrastructure, which tend to accelerate implementation and reduce capital spending.

View the related case study here

To operate in the digital world, TMT organizations need to create ecosystems, surrounding themselves with third-party providers, including developers hosting applications on their platform. These relationships allow TMT companies to offer a host of services and a richer user experience. But each of these relationships creates security risks. Regulators have focused on TMT organizations’ sharing of data—especially customer and user data—with developers and other third parties. Users also have rising expectations for data security and data use. But customer-facing organizations may find that their third-party providers don’t adhere to the same standards, creating a control challenge—often with few clear lines of responsibility for managing those risks.

How can you respond?

  1. Review and understand the data your organization shares with third parties and developers.
  2. Streamline service terms and agreements to clarify responsibilities for data security, privacy controls, data segregation, and attack detection and response among TMT organizations and their third parties and developers.
  3. Build a compliance program to help ensure third parties and developers adhere to service terms and contracts.
  4. Implement ongoing monitoring to manage risks arising from third parties.

View the related case study here

TMT organizations have been in the throes of transformation, disruption, and maturation. From an explosion in digital commerce activity to the proliferation of online interactions, TMT companies were forced to scale up their services, expand computing capacities, and hire more personnel. Now, these companies are grappling with the need to rightsize their operations amid uncertain market conditions. Increasing pressure to reduce costs is further exacerbated by intensifying shareholder scrutiny on operating expenses and the increasing cost and operational burden of complying with an expanding set of digital regulations. As a result, privacy, governance, risk, and compliance program leaders should reevaluate their programs to identify opportunities for process optimization, efficiencies, and automation to reduce overall cost.

To navigate these cost pressures, Deloitte is assisting clients with integrating privacy governance, risk, and compliance (GRC) programs to drive efficiency through centralized capabilities and resource sharing; workforce optimization utilizing global delivery centers; and process automation utilizing curated AI and Generative AI models.

How can you respond?

  1. Identify adjacent and synergistic GRC programs where capabilities, including tooling, could be combined and shared across programs to drive efficiencies.
  2. Reevaluate the existing workforce location strategies to determine whether there are opportunities to leverage globally distributed delivery centers and lower-cost regions.
  3. Inventory and evaluate what processes and tasks can be performed more efficiently offshore or completely outsourced as managed services (e.g., privacy impact assessments).
  4. Assess current processes to determine where automation, use of Generative AI, and technological infrastructure can improve process quality and reduce operational costs. Automating privacy incident management, for example, may improve real-time response while generating both ongoing insights and analysis from historic incident data.

View the related case study here

As cyber risks have grown, so, too, have security demands and programs. The result for many TMT organizations is overlapping, uncoordinated, and ineffective security efforts. Some investments are fueled by “shiny new object” syndrome—purchases driven by hype rather than organizational needs. Processes can also multiply, losing focus and creating redundancies and gaps. These problems are exacerbated by the premium cost of cyber talent and the challenges of recruiting and retaining skilled specialists. Inefficient defenses are not just a waste of investment—they create their own risks as sophisticated attackers exploit the junctures between disjointed tools. For TMT organizations facing revenue reduction and tighter budgets, optimizing the security program is an overriding imperative.

How can you respond?

  1. Step back and take a holistic view of your cyber organization, technology, personnel, and spending, measuring them against evolving needs.
  2. Make sure you have the right staffing in the right places. Refine your cyber organization to streamline levels and focus on outcome-based metrics. Consider whether offshoring can expand your talent pool and relieve talent of rote processes.
  3. Streamline your security technology infrastructure for optimal results. Review all your applications for effectiveness and integration. Standardize your IT tools to the extent possible.
  4. Automate processes. Leverage AI and machine learning (ML) so you can improve efficiency and effectiveness in identifying, analyzing, and countering threats. Consider whether automation can enhance user experience.
  5. Consolidate your security vendors and third parties strategically to boost efficiency, reduce redundancies, and align responsibilities with evolving cyberthreats. Consider whether a high-touch, fully managed cybersecurity service arrangement like Deloitte’s Managed Extended Detection and Response (MXDR) could help you enhance your security while controlling the escalating cost of coping with cyberthreats.

View the related case study here

Case studies

Read on to discover Deloitte’s real impact on client cybersecurity needs in the TMT industry.

Close
Scaling your security operations
Client: Multinational information technology manufacturer

Current challenges: Attrition among cybersecurity professionals; gaps in specialized knowledge of cyber risks; significantly higher spending than competitors

Deloitte’s approach: We provided a dedicated delivery team, which helped the client enhance its technology stack by identifying root causes for performance and compatibility issues, improving legacy technologies and bringing in our integrated solutions. Our 24/7, 365-days-a-year Cyber Operations and Infrastructure Management team was able to help the client address its talent issues by providing access to specialists that the client was struggling to hire and retain.

Results for client: Reduced incident frequency, allowing shift to a more strategic security operations focus. Integrated cross-team processes to help the client improve workflows, accelerate responses, identify emerging risks, and improve overall security.

Close
Managing third-party and developer risks
Client: Leading technology and social media provider

Current challenges: Regulatory concerns; assessing developers’ practices against client’s terms for service providers and data security, use, and deletion; managing and maintaining developer risk assessments (DRAs)

Deloitte’s approach: Assembled a team of 25 cyber and cloud security and application development specialists to help the client transform its program from manual, email-based DRAs to automated workflow, engaging with client product teams to help them align the process with business requirements. Redefined the approach to handling client escalations with their most significant on-platform vendors to help them improve adherence to program standards. Implemented follow-the-sun model by leveraging Deloitte’s onshore and offshore resources for live and offline communications.

Results for client: Completed more than 6,000 unique DRAs in 10 months. Efficiently cleared a backlog of more than 5,000 DRAs while implementing process and tool improvements.

Close
Reducing the cost of compliance through process optimization and AI
Client: Technology media company

Current challenges: Enterprisewide effort to reduce costs in demonstrable and measurable ways; large privacy programs needed to mature to meet regulatory obligations while attaining greater efficiency and reducing overall costs

Deloitte’s approach: Deployed a diverse, multidisciplinary team of subject-matter advisers and service delivery managers to help the client achieve its strategic and operational compliance needs. Our approach offered breadth and depth along with agility and adaptability. The team worked with the client to identify and analyze processes that could be redesigned, automated, and offshored.

Results for client: Helped to convert 40% of existing process support by leveraging offshore capabilities and by automating repetitive tasks. Client gained a more mature privacy program while reducing costs by 27% without any impact on productivity. Automation also enabled the client to shift focus toward more value-added strategic tasks.

Close
Making the most of your cyber spend
Client: Multinational technology conglomerate

Current challenges: Reduce $50M from the overall annual cybersecurity spend in 2 years, without compromising on security posture and quality of service

Deloitte’s approach: We evaluated the client's current spending on cybersecurity, analyzed their technology infrastructure, and assessed the composition of their workforce. Extensive data analysis was also performed across various spending dimensions. Leveraging our industry experience and a robust cost-optimization framework, we identified several cost-saving levers. These were strategically developed into hypotheses that spanned people, processes, and technology, aiming to enable the client to either maintain or enhance their existing security posture while reducing overall security spending.

Results for client: Deloitte enabled the client to make informed decisions, identifying cost optimization opportunities that could result in up to 30% overall savings in annual cyber spending. These savings were distributed across labor (25-35%), process (3-5%) and technology licensing costs (3-5%), without compromising cybersecurity effectiveness.

    Creating value while elevating your cyber game

    TMT organizations are on the front lines of the fight against cyberattackers—and there’s no escaping the battlefield.

    As you assess your cybersecurity needs, you may find you need a trusted ally at your side. Deloitte ranks No. 1 in security consulting since 2012.⁴ We bring a depth of knowledge and access to a wealth of resources around the world. Working with a curated selection of technology vendors, Deloitte’s teams can help your organization achieve streamlined, effective, and efficient security operations to defend your data, your users’ privacy, and your most important asset—your customers’ trust and confidence.

    User Friendly Podcast

    Cyber trends shaping the TMT industry

    With the expansion of technologies like cloud and AI, the TMT industry is being largely shaped by evolving cyber trends. How can organizations stay ahead of emerging cyber threats to create a competitive advantage?

    Tune in for more insights >

    1 Shawn M. Bowen, Marie Wilcox, and Andreas Wuchner, 2024 Security Leaders Peer Report, Panaseer, accessed May 2024.
    2 IBM and Ponemon Institute, Cost of a data breach 2023, accessed May 2024.
    3 Panaseer, Panaseer 2022 Security Leaders Peer Report, accessed May 2024.
    4 Gartner, Market Share Analysis: Security Consulting Services, Worldwide, 2022, Rustam Malik, June 21, 2023. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

    Did you find this useful?