Unlocking cyber excellence: CISO strategies for the TMT industry has been saved
Perspectives
Unlocking cyber excellence: CISO strategies for the TMT industry
Maximizing cyber investments, enhancing security operations, and optimizing compliance
Cyber continues to be both a growing and critical strategic priority for companies that need to maintain the trust and confidence of customers. The vital role of cyber is reflected on board agendas: 40% of US chief information security officers (CISOs) say they report to their boards monthly, and another 47% report quarterly.¹
Four ways to propel a cyber refresh
With revenue pressure growing, one of the technology, media, and telecommunications (TMT) industry’s challenges is bringing fiscal efficiency to programs that protect and secure digital operations. Security operations need to be streamlined, made less redundant, and tuned for optimal effectiveness, all in an environment of evolving threats, limited resources, and scarce security talent.
Deloitte’s TMT and Cyber specialists have explored the critical cyber issues facing TMT companies and offer key strategic actions to help address them. Read on to see more on the challenges and the actions you can take.
Case studies
Read on to discover Deloitte’s real impact on client cybersecurity needs in the TMT industry.
Creating value while elevating your cyber game
TMT organizations are on the front lines of the fight against cyberattackers—and there’s no escaping the battlefield.
As you assess your cybersecurity needs, you may find you need a trusted ally at your side. Deloitte ranks No. 1 in security consulting since 2012.⁴ We bring a depth of knowledge and access to a wealth of resources around the world. Working with a curated selection of technology vendors, Deloitte’s teams can help your organization achieve streamlined, effective, and efficient security operations to defend your data, your users’ privacy, and your most important asset—your customers’ trust and confidence.
1 Shawn M. Bowen, Marie Wilcox, and Andreas Wuchner, 2024 Security Leaders Peer Report, Panaseer, accessed May 2024.
2 IBM and Ponemon Institute, Cost of a data breach 2023, accessed May 2024.
3 Panaseer, Panaseer 2022 Security Leaders Peer Report, accessed May 2024.
4 Gartner, Market Share Analysis: Security Consulting Services, Worldwide, 2022, Rustam Malik, June 21, 2023. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Recommendations
CyberSphere: Security Operations Platform | Deloitte US
CyberSphere is a vendor-neutral integrated cybersecurity platform that brings people and technology together for your cybersecurity solutions. Learn more now.
Navigating the impact of generative AI on security
How the CISO role is evolving with the advent of Gen AI