Viewing offline content

Limited functionality available

Dismiss
Deloitte South Africa
  • Services

    What's new

    • Deloitte Digital

    • Deloitte Africa Centre for Corporate Governance

      The Deloitte Africa Center for Corporate Governance offers a number of resources for executives, directors, and others who are active in governance.

    • Corporate Reporting Reform

      View our latest events on corporate reporting reform.

    • Audit & Assurance

      • Audit & Assurance Insights
      • Centre for Corporate Governance
    • Consulting

      • Strategy
      • Customer and Marketing
      • Core Business Operations
      • Human Capital
      • Enterprise Technology & Performance
      • Managed Services
      • Growth Platforms
    • Financial Advisory

      • Mergers & Acquisitions
      • Turnaround and Restructuring
      • Forensics
    • Risk Advisory

      • Internal Control & Assurance
      • Financial Crime and Regulatory Risk
      • IT & Specialised Assurance
      • Cyber Risk
      • Analytics
    • Tax & Legal

      • Outsourced Tax Compliance
      • Tax Technology Consulting
      • Tax Advisory and Transactions
      • Mobility, Payroll, Immigration
      • Workforce, Analytics
      • Reward, Employment Tax
      • Legal Services
      • South African Budget
      • Tax News and Trends
    • Deloitte Private

  • Industries

    What's new

    • Deloitte perspectives

      Leadership perspectives from across the globe.

    • Future of Mobility

      Learn how this new reality is coming together and what it will mean for you and your industry.

    • Deloitte Africa Insights

      Access the latest thought leadership on industry insights, country reports and economic developments in Africa.

    • Consumer

      • Automotive
      • Consumer Products
      • Retail, Wholesale & Distribution
      • Transportation, Hospitality & Services
    • Energy & Resources

      • Energy & Chemicals
      • Mining & Metals
      • Power, Utilities & Renewables
      • Industrial Products & Construction
    • Financial Services

      • Insurance
      • Banking & Securities
      • Investment Management
      • Actuarial & Insurance Solutions
      • Real Estate
    • Life Sciences & Healthcare

      • Life Sciences
      • Health Care
      • The Africa Deloitte Health Equity Institute
    • Government and Public Services

      • Infrastructure, Transport & Regional Government
      • Central Government
      • Defence, Security & Justice
      • Health & Human Services
    • Technology, Media & Telecom

      • Technology
      • Media & Entertainment
      • Telecom, Media & Entertainment
      • Predictions
  • Insights

    Deloitte Insights

    What's new

    • Deloitte Insights Magazine

      Explore the latest issue now

    • Deloitte Insights app

      Go straight to smart with daily updates on your mobile device

    • Weekly economic update

      See what's happening this week and the impact on your business

    • Strategy

      • Business Strategy & Growth
      • Digital Transformation
      • Governance & Board
      • Innovation
      • Marketing & Sales
      • Private Enterprise
    • Economy & Society

      • Economy
      • Environmental, Social, & Governance
      • Health Equity
      • Trust
      • Mobility
    • Organization

      • Operations
      • Finance & Tax
      • Risk & Regulation
      • Supply Chain
      • Smart Manufacturing
    • People

      • Leadership
      • Talent & Work
      • Diversity, Equity, & Inclusion
    • Technology

      • Data & Analytics
      • Emerging Technologies
      • Technology Management
    • Industries

      • Consumer
      • Energy, Resources, & Industrials
      • Financial Services
      • Government & Public Services
      • Life Sciences & Health Care
      • Technology, Media, & Telecommunications
    • Spotlight

      • Deloitte Insights Magazine
      • Press Room Podcasts
      • Weekly Economic Update
      • COVID-19
      • Resilience
      • Top 10 reading guide
  • Careers

    What's new

    • Job search

    • Experienced Hires

    • Executives

    • Students

    • Life at Deloitte

    • Alumni

  • ZA-EN Location: South Africa-English  
  • ZA-EN Location: South Africa-English  
    • Dashboard
    • Saved items
    • Content feed
    • Profile/Interests
    • Account settings
    • Subscriptions

Welcome back

Still not a member? Join My Deloitte

Pursuing cybersecurity maturity at financial institutions

by Sam Friedman, Nikhil Gokhale
  • Save for later
  • Download
  • Share
    • Share on Facebook
    • Share on Twitter
    • Share on Linkedin
    • Share by email
Deloitte Insights
  • Strategy
    Strategy
    Strategy
    • Business Strategy & Growth
    • Digital Transformation
    • Governance & Board
    • Innovation
    • Marketing & Sales
    • Private Enterprise
  • Economy & Society
    Economy & Society
    Economy & Society
    • Economy
    • Environmental, Social, & Governance
    • Health Equity
    • Trust
    • Mobility
  • Organization
    Organization
    Organization
    • Operations
    • Finance & Tax
    • Risk & Regulation
    • Supply Chain
    • Smart Manufacturing
  • People
    People
    People
    • Leadership
    • Talent & Work
    • Diversity, Equity, & Inclusion
  • Technology
    Technology
    Technology
    • Data & Analytics
    • Emerging Technologies
    • Technology Management
  • Industries
    Industries
    Industries
    • Consumer
    • Energy, Resources, & Industrials
    • Financial Services
    • Government & Public Services
    • Life Sciences & Health Care
    • Tech, Media, & Telecom
  • Spotlight
    Spotlight
    Spotlight
    • Deloitte Insights Magazine
    • Press Room Podcasts
    • Weekly Economic Update
    • COVID-19
    • Resilience
    • Top 10 reading guide
    • ZA-EN Location: South Africa-English  
      • Dashboard
      • Saved items
      • Content feed
      • Profile/Interests
      • Account settings
      • Subscriptions
    15 minute read 01 May 2019

    Pursuing cybersecurity maturity at financial institutions Survey spotlights key traits among more advanced risk managers

    15 minute read 01 May 2019
    • Sam Friedman United States
    • Nikhil Gokhale United States
    • Save for later
    • Download
    • Share
      • Share on Facebook
      • Share on Twitter
      • Share on Linkedin
      • Share by email
    • Top cyber programs exhibit distinct traits
    • Spotlight on spending
    • Defining characteristics of advanced cybersecurity programs
    • Cybersecurity maturity should be an ongoing effort

    Financial firms are stepping up their efforts to stay ahead of cyber and business threats. Our latest Deloitte and FS-ISAC survey reveals what differentiates the strongest cybersecurity programs from the rest. 

    Sign up to receive a copy of the 2020 Deloitte and FS-ISAC survey coming in July
    Send me the report

     

    Top cyber programs exhibit distinct traits

    We are entering an era in which digital and physical technologies are more combined and connected than ever. For financial institutions, developing an innate understanding of where and how they could encounter cyber risk in this environment is now of primary importance. At the same time, security teams must continuously strive to fulfill their fiduciary and regulatory responsibilities, while meeting rising expectations for consumer privacy and innovative business solutions.

    Learn more

    Explore the Cyber risk collection

    Read the 2018 report: The state of cybersecurity at financial institutions

    Over the past two years, Deloitte has worked with the Financial Services Information Sharing and Analysis Center (FS-ISAC) to survey members on how they are confronting these cyber challenges. The objective is to measure good stewardship of both the cybersecurity budget and overall cyber risk management program.

    Our 2018 pilot provided a snapshot of how the chief information security officers (CISOs) who responded to our survey were discharging their responsibilities, while offering preliminary insights into the industry’s broad spectrum of cybersecurity strategies, structures, and budget priorities.1 This year—in addition to identifying spending patterns across the industry by sector, size of company, and cyber risk management maturity level—we identified several core traits of those that have already reached the highest maturity level as defined by the National Institute of Standards and Technology (NIST). (See figure 1.)

    These defining characteristics of “adaptive” companies, which are alluded to in the NIST cybersecurity maturity framework,2 include:

    • Securing the involvement of senior leadership, both top executives and the board;
    • Raising cybersecurity’s profile within the organization beyond the information technology (IT) department to give the security function higher-level attention and greater clout; and
    • Aligning cybersecurity efforts more closely with the company’s business strategy.

    Organizations that can integrate these fundamental elements and follow the example set by leading cybersecurity programs will more likely become and remain adaptive in the face of an ever-evolving business and threat landscape.

    The survey indicated that money alone is probably not the answer, as higher cybersecurity spending did not necessarily translate into a higher maturity level. That likely means exactly how—and how well—financial institutions go about securing their digital fortress is at least as important as the amount of money devoted to cybersecurity.

    Cybersecurity maturity levels

    • Partial: Organizational cybersecurity risk management practices are not formalized, and risk is managed in an ad hoc and sometimes reactive manner.
    • Informed: Risk management practices are approved by management but may not be established as policy across the organization.
    • Repeatable: The organization’s risk management practices are formally approved and expressed as policy.
    • Adaptive: The organization adapts its cybersecurity practices based on lessons learned and predictive indicators derived from previous and current cybersecurity activities.

    Spotlight on spending

    Understanding the resources that firms devote to cyber risk was one of the more important data points we wanted to gather from this effort (figure 2). Those responding to the survey spent anywhere from 6 percent to 14 percent of their IT budget on cybersecurity, with an average of 10 percent. This amount translated to a range of around 0.2 percent to 0.9 percent of company revenue, with an average of about 0.3 percent. In terms of spending per employee, respondents spent between US$1,300 to US$3,000 per full-time or equivalent employee (FTE) on cybersecurity, with an average of around US$2,300.

    Average cybersecurity spending range at financial institutions (overall sample)

    The ranges represent the diversity we saw in the sample—varying, for example, by the size of the responding company (figure 3).

    At first glance, it appears smaller companies have some catching up to do to match the financial commitment of larger respondents. Small institutions surveyed spent a lower percentage of their revenue (0.2 percent) on cyber than did midsize (0.5 percent) or large companies (0.4 percent), and while their average spending of US$2,100 per FTE matched that of midsize firms, it is far lower than the US$2,700 cited by their large counterparts. That could be explained by the greater complexity of larger institutions, which often offer more products and services and have multiple business units and delivery channels to account for.

    Smaller companies surveyed did commit a higher percentage of their IT budget (12 percent) to cybersecurity than did large and midsize firms (9 percent). This may indicate that smaller firms realize they need to commit a larger piece of the IT pie to meeting new regulatory requirements and operational needs on cyber.

    Digging deeper into spending decisions, larger firms allocated nearly one-fifth of their cybersecurity budget to identity and access management—nearly twice the percentage of midsize and smaller companies, which tended to spend more heavily on endpoint and network security. (For more about how respondents compared based on their revenue segment, see the sidebar, “Size drives divergent strategies.”)

    There were also differences by industry segment. For example, bank respondents reported that they allocated a slightly higher than average percentage (close to 11 percent) of their IT budget to cybersecurity, while insurance and nonbanking financial services companies were slightly below the overall respondent average of 10 percent—although at around 0.33 percent, all three were nearly even as a percentage of company revenue. Yet in terms of dollars spent per FTE, nonbanking financial services companies allocated considerably more—about US$2,800—than did banks (about US$2,000) or insurers (nearly US$2,200).

    The highest spending group among this survey sample were the financial utilities, such as clearinghouses, exchanges, and payment processors, which averaged around 15 percent of their IT budget on cybersecurity, 0.75 percent of revenue, and about US$3,600 per FTE. Service providers (financial products/services/applications) also reported spending slightly more, at nearly 11 percent of the IT budget and about 0.60 percent of revenue, yet only averaged US$2,000 or so per FTE—about the same as bank respondents.

    Most interestingly, while there were slight differences in spending by maturity level, adaptive companies did not necessarily spend more than the sample’s overall average on their cybersecurity programs. This is in line with our central theme: How a security program is planned, executed, and governed is likely as important as how much money is devoted to cybersecurity. So, what differentiates adaptive companies in their cybersecurity approaches?

    Defining characteristics of advanced cybersecurity programs

    CISOs work through a multitude of systems and processes in their ongoing efforts to secure their organizations against cyber intrusions, establish heightened vigilance to spot attacks before they can do serious harm, and be resilient when recovering from a significant event. With so many varied risk management activities going on simultaneously, CISOs at times may find it difficult to prioritize their efforts. What fundamental elements should be in place to accelerate an financial institution’s cybersecurity maturity and maintain a high level once it is attained?

    While there are many factors that go into making a cybersecurity program successful, we found three common denominators that typically separate adaptive companies from the rest. Adaptive companies were generally best able to: 1) secure executive leadership and board involvement; 2) raise cybersecurity’s profile beyond the IT department; and 3) align cyber risk management more closely with business strategy (figure 4).

    These findings conform to the NIST description of what an adaptive organization looks like. That is encouraging, because almost all the respondents who classified their organizations as “adaptive” did so with a self-assessment, meaning they fully appreciate what they needed to do to indeed reach the highest maturity level.

    The three characteristics that set adaptive companies apart

    These adaptive companies can serve as a role model for less mature organizations aiming to reach the next level. Financial institutions that can successfully emulate these defining characteristics are likely to improve their cybersecurity maturity in the short term as well as continue to bolster their defenses over the long haul.

    By emulating adaptive companies, CISOs can also expand beyond their traditional roles as technologists and guardians. This can enable them to devote more time as strategists and advisors to better support the broader operations and goals of their business units, management teams, and boards.3

    Characteristic No. 1: Secure leadership and board involvement

    Adaptive companies, as defined by NIST, call for senior executives to monitor cybersecurity risk in the same context as financial risk and other organizational risks.4 That certainly tracks with our survey’s finding that lack of management support/inadequate funding was cited as a CISO’s top challenge in managing cybersecurity by companies with a lower (informed) level of maturity.

    Our analysis went beyond senior executives, finding that the boards and management committees of those survey respondents who classified themselves as adaptive were more interested in nearly all areas of cybersecurity than were those at the informed level (figure 5). Indeed, boards and management committees at the lowest maturity companies appear to be interested in fewer areas of cybersecurity activities.

    By comparison, interest rises dramatically among the next level up on the maturity curve (“repetitive”), from overall security strategy to reviews of threats and security risks, cybersecurity program progress, vulnerability to a third-party breach, as well as review of security testing results. In most areas, board and management committee interest peaks among adaptive companies.

    Adaptive companies typically have a more engaged board

    Better education of the board and the management committee by CISOs and other C-suite executives around current threats and security risks and their implications for the business could galvanize increased engagement. Having an engaged board that works closely with senior management on cybersecurity issues can help focus the entire organization on the challenge while assuring that adequate resources are allocated to the task.

    For example, the survey found that five out of 14 adaptive companies compared to only one in 12 informed ones assigned a high priority to investing in organizationwide awareness and training, something that requires resources and support from multiple functions. More adaptive companies tend to be better able to engage and enlist the whole organization across all functions and embed security-minded practices into day-to-day work routines, from new product development to customer service to core processes.

    Characteristic No. 2: Raising cybersecurity’s profile within the organization beyond IT

    Cybersecurity as a discipline originated within the IT function. Therefore, it is not surprising that one-half of all respondents—including those from adaptive companies—reported that the security team was part of the IT function at their organization. After all, a company’s technology systems are not only the target of cyberattacks, but a large part of the solution in preventing intrusions from succeeding and limiting the damage if they do.

    That said, cyber threats are increasingly being acknowledged as one of the most critical risk exposures facing an organization, and cybersecurity today is not merely a technology challenge. More mature companies have therefore recognized the need to raise the profile of the security function, enabling decisions that are above and independent of other IT considerations or constraints.

    The survey findings (figure 6) showed that adaptive respondents were more likely to elevate the cybersecurity function by completely segregating cybersecurity from IT. Repetitive respondents appear to be moving in this direction; their organizations were more likely to segregate the two functions but still maintain common lines of reporting. Informed respondents were by far the most likely to keep cybersecurity as part of IT, and least likely to split the functions and give cyber a separate identity.

    More mature programs moving toward segregation of IT and cybersecurity

    In addition, about one-half of adaptive companies (nine out of 17) operated a first line and second line of defense with complete independence, versus only two out of 14 of informed respondents.

    The theme of raising cybersecurity’s profile and segregating it from IT was also reflected in the reporting structure at adaptive companies surveyed (figure 7), where more CISOs reported to chief operating officers (COOs) and chief risk officers (CROs) than to chief information officers (CIOs) and chief technology officers (CTOs).

    The survey also found that nearly all the CISOs at adaptive companies reported no lower than two levels down from the chief executive officer (CEO), compared with three of four at repetitive organizations, and two of three among informed respondents.

    To whom does the chief information security officer (CISO) or equivalent report?

    That said, across the complete sample surveyed, very few CISOs reported to a general counsel or a chief compliance officer (CCO). This indicates that most cybersecurity programs at financial institutions have moved beyond just compliance; they are becoming a part of the broader security function responsible for combating cyber risk and are touching every part of the organization. For most progressive CISOs, the next step would likely be providing strategic inputs during the business planning and decision-making phases.

    Characteristic No. 3: Aligning cybersecurity more closely with business strategy

    In today’s increasingly digital and data-driven world, business functions across the board rely heavily on technology to carry out day-to-day operations internally and externally. How well companies leverage emerging technology to innovate and change the way they operate is often what differentiates them from competitors.

    New technology, however, may also expose companies to additional cyber vulnerabilities. For example, most respondents said the top two emerging technologies their companies plan to adopt over the next two years were cloud and data analytics. Yet as Deloitte’s 2019 Insurance Outlook noted, as insurers increase cloud usage to speed up transformation and free up resources, regulators have been raising concerns about the potential for cybersecurity issues, because core systems and critical data are essentially being moved offsite to a third party.5 While service providers are accountable for the security of their hardware and software, the ultimate responsibility for ensuring cybersecurity of cloud functions remains with the insurer, and any breach of cloud data could have regulatory and reputational implications for the company.6

    Bank CISOs often face similar challenges. “As more data is used in AI applications, concerns over data protection and privacy could escalate institutions’ risk profile,” noted Deloitte’s 2019 Banking Outlook. “Increased connectivity with third-party providers and the potential for increased cyber risk is another growing concern.”7

    Adaptive respondents seem to already recognize that cybersecurity needs to be more closely tied to overall strategy, as business growth and expansion was identified as their second biggest challenge when managing cybersecurity (figure 8), trailing only rapid IT changes and rising complexities—an issue that faces all CISOs, regardless of company maturity level. As companies grow by adding new platforms, products, geographic regions, apps, and Web capabilities, cybersecurity considerations can multiply along with the introduction of each new element.

    In contrast, companies with less mature cybersecurity programs were often still contending with much more basic issues than how to cope with growth challenges. The second largest problem repetitive companies face, for instance, is prioritizing options for securing the enterprise, while the biggest challenge facing informed respondents was lack of management support and inadequate funding.

    Adaptive companies are more aware of the implications of business expansion on cybersecurity

    Better alignment with business plans will likely help CISOs identify and respond to emerging exposures. Those from adaptive and repetitive companies recognized third-party/supply chain control deficiencies as one of the top three cybersecurity threats to their organization. Respondents from informed companies, meanwhile, seemed to be grappling with more internal issues, such as unauthorized access to systems, as well as inadequate detection and response capabilities.

    Embedding cyber professionals into strategic initiatives and transformational projects right from the onset will likely help the security function better manage cyber risk across the enterprise and foster greater collaboration and innovation.8

    Cybersecurity maturity should be an ongoing effort

    There are many other factors beyond the maturity level to consider when examining a financial institution’s cybersecurity program. Size is one such consideration (see sidebar, “Size drives divergent strategies”); another is industry sector.

    Yet no matter how an institution stacks up against its competitors or how those comparisons are made, cybersecurity will remain a work in progress for all financial organizations. Indeed, regardless of who is ultimately in charge and how governance is structured, cybersecurity awareness, responsibility, and accountability should be part of every department within every financial services firm.

    Even highly mature companies should keep adapting

    Respondents from adaptive companies should not rest on their laurels. While the survey indicated that high maturity respondents may have settled on a solid governance system and laid the foundation for an effective cyber risk management program, there’s likely still much work to be done to keep fortifying defenses and response capabilities.

    As noted, even adaptive companies are racing to keep up with rapid IT changes and rising complexities in tech systems, which was cited as a top challenge for CISOs regardless of company size or maturity level. Such efforts have taken on a new sense of urgency in this age of heightened consumer sensitivity about data security and privacy, as well as additional regulatory demands.

    Achieving excellence in cybersecurity will therefore likely remain an ongoing journey, with many twists and turns, rather than an ultimate destination. Cyberattacks continue to be bolder and more sophisticated, challenging financial institutions to respond in kind. Companies will need to continuously upgrade their capabilities—both human and technological—to remain secure, vigilant, and resilient.

    CISOs should also keep getting better at being proactive, anticipating potential exposures and preparing to counter them, rather than reacting to new modes of attack as they arise. Even an adaptive organization could be vulnerable without a sustained effort to stay one step ahead of those seeking to penetrate its digital fortress and compromise its operations.

    Size drives divergent strategies

    The size (by annual revenue) of responding companies made a difference when it came to many of the characteristics addressed in our survey. For example, larger respondents were far more likely to keep all their cybersecurity functions in-house, and similarly were least likely to outsource their cybersecurity workforce (figure 9).

    Percentage of cybersecurity workforce that is outsourced, by company annual revenue

    Larger companies also tended to keep their CISOs within IT: 56 percent of respondents at these companies said their CISO reported to the CIO or CTO rather than to the CRO or COO, compared to about one in four midsize and small companies (figure 10). Perhaps due to their relatively flatter organizations, respondents from smaller companies were most likely to have their CISOs report to the CEO, with one in four respondents doing so. Meanwhile, only a handful of midsize company respondents said their companies had CISOs reporting that high up the corporate ladder, and none of the respondents from larger companies responded this way.

    To whom the CISO reports, by company annual revenue

    Larger company respondents were more likely to attempt a hybrid operating model—with strategy and execution capabilities in both a centralized function and at each business or region. Here, both functions were integrated and worked in coordination with one another. However, such an approach remained the exception rather than the rule at all revenue levels, with a little more than one in 10 large companies going this route, and far fewer than that among midsize and smaller firms.

    Respondents from larger companies were also more likely to have an independent second line of cyber defense, and to have cybersecurity interface with the business via security liaisons or “champions” within each unit.

    Risk transfer was another differentiator, as fewer than one in 10 large company respondents are operating without cyber insurance, versus one in four midsize companies. These respondents also had relatively more mature programs overall. Eight out of the 23 large company respondents that disclosed their program maturity characterized themselves as adaptive, 13 were repetitive, and two were informed. Of the 20 who were from midsize organizations, only two firms were in the adaptive category, versus 14 repetitive and four informed. Of the 31 respondents from small companies, seven said their companies were adaptive, 16 were repetitive, and eight were informed.

    About the survey

    Respondents by revenue Respondents by industry

    The survey upon which this article is based was fielded by the Financial Services Information Sharing and Analysis Center (FS-ISAC), in conjunction with Deloitte’s Cyber Risk Services practice in the fall of 2018. Ninety-seven companies participated, with representation spanning multiple revenue levels (figure 11) and all financial sectors (figure 12, adding up to more than 97 because some respondents represented multiple categories).

    The study looked at various components of a financial institution’s cybersecurity operation, including how it is organized and governed, who the CISO reports to, the level of board interest in the CISO’s work, as well as which cybersecurity capability areas were prioritized in terms of spending.

    The survey also asked respondents to report on their cybersecurity maturity level under the four-level NIST framework9 (figure 1). Eight out of 10 respondents self-assessed their maturity level, while the remaining were third-party assessments. Out of 97 survey participants, 74 responded with their assessment of maturity levels for each of the 16 NIST parameters.

    Based on a calculated combination of maturity ratings for each of the parameters, 17 companies were identified as having reached an adaptive level of maturity, 43 companies were repetitive, 12 were informed, and two were partial. Companies that fell into the partial maturity level were grouped with companies in the informed maturity category to ensure analytical rigor for the purposes of this report.

     


    Acknowledgments

    The center wishes to thank Prachi Ashani, contributing data analyst, for her contributions to this report. The center also wishes to thank the Financial Services Information Sharing and Analysis Center (FS-ISAC) for their help in fielding and analyzing this survey.

    The authors also extend special thanks to Satish Nelanuthula, Srinvarsarao Oguri, and Soumva Mohapatra of Deloitte Services India Pvt. Ltd. for their contributions toward the advanced survey analysis in this research project.

    The center wishes to thank the following Deloitte professionals for their support and contribution to this report:

    Sriram Balakrishnan, advisory manager, Deloitte & Touche LLP

    Michelle Canaan, insurance research manager, Deloitte Center for Financial Services, Deloitte Services LP

    Michelle Chodosh, senior manager, Deloitte Center for Financial Services, Deloitte Services LP

    Patricia Danielecki, senior manager, chief of staff, Deloitte Center for Financial Services, Deloitte Services LP

    Christopher Faile, public relations leader, financial services, Deloitte Services LP

    Meghana Rajiv Kanitkar, advisory senior manager, Deloitte & Touche LLP

    Erin Loucks, manager, campaign management, Deloitte Services LP

    Swati Nidiganti, advisory manager, Deloitte & Touche LLP

    Venkat Chalam Pogaru, advisory assistant manager, Deloitte & Touche LLP

    Cover image by: Neil Webb

    Endnotes
      1. Jim Eckenrode and Sam Friedman, The state of cybersecurity at financial institutions: There’s no “one size fits all” approach, Deloitte Insights, May 21, 2018. View in article

      2. National Institute of Standards and Technology (NIST), “Framework for improving critical infrastructure cybersecurity,” April 16, 2018. View in article

      3. Khalid Kark, Monique Francois, and Taryn Aguas, “The new CISO: Leading the strategic security organization,” Deloitte Review 19, July 25, 2016. View in article

      4. NIST, “Framework for improving critical infrastructure cybersecurity.” View in article

      5. Sam Friedman et al., 2019 insurance outlook, Deloitte, November 2018. View in article

      6. Ibid. View in article

      7. Val Srinivas et al., 2019 banking and capital markets outlook, Deloitte, November 2018. View in article

      8. Deloitte, The future of cyber survey 2019, March 4, 2019. View in article

      9. NIST, “Framework for improving critical infrastructure cybersecurity.” View in article

    Show moreShow less

    Topics in this article

    Financial Services , Cyber risk , Strategy , , Risk management

    Cyber

    Deloitte offers a complete portfolio of services to help complex organizations establish their cyber risk appetite, design and implement Secure.Vigilant.Resilient.™ programs, and assist in the ongoing management, maintenance, and adaptation of their programs as the business, compliance, and threat environments change.

    Learn more
    Get in touch
    Contact
    • ​Julie Bernard
    • Advisory principal, Cyber Risk Services
    • Deloitte & Touche LLP
    • juliebernard@deloitte.com
    • +1 714 436 7350

    Download Subscribe

    Related content

    img Trending

    What's next for bank board risk governance

    Article 5 years ago
    img Trending

    A moving target: Refocusing risk and resiliency amidst continued uncertainty

    Article 2 years ago
    img Trending

    The state of cybersecurity at financial institutions

    Article 4 years ago

    More from the Cyber risk collection

    • Overcoming challenges to cyber insurance growth Article3 years ago
    • DevSecOps and the cyber imperative Article4 years ago
    • Protecting the connected barrels Article5 years ago
    • AI-augmented cybersecurity Article5 years ago
    • Managing risk across the extended enterprise Article4 years ago
    Sam Friedman

    Sam Friedman

    Research Leader | Insurance

    Sam is the insurance research leader at the Deloitte Center for Financial Services, putting his journalistic skills and three decades of industry experience to good use analyzing the latest trends and identifying the major challenges confronting the property-casualty and life insurance industries. Sam joined Deloitte in October 2010 after 29 years at National Underwriter P&C, where he served as editor-in-chief.

    • samfriedman@deloitte.com
    • +1 212 436 5521
    Nikhil Gokhale

    Nikhil Gokhale

    Manager | Deloitte Services India Pvt. Ltd.

    Nikhil, Deloitte Services India Pvt. Ltd., is a research specialist at the Deloitte Center for Financial Services where he covers the insurance sector. Nikhil focuses on strategic and performance issues facing life, annuity, property, and casualty insurance companies. Prior to joining Deloitte, he worked as a senior research consultant on strategic projects relating to post-merger integration, operational excellence, and market intelligence.

    • ngokhale@deloitte.com
    • +91 986 905 6315

    Share article highlights

    See something interesting? Simply select text and choose how to share it:

    Email a customized link that shows your highlighted text.
    Copy a customized link that shows your highlighted text.
    Copy your highlighted text.

    Pursuing cybersecurity maturity at financial institutions has been saved

    Pursuing cybersecurity maturity at financial institutions has been removed

    An Article Titled Pursuing cybersecurity maturity at financial institutions already exists in Saved items

    Invalid special characters found 
    Forgot password

    To stay logged in, change your functional cookie settings.

    OR

    Social login not available on Microsoft Edge browser at this time.

    Connect Accounts

    Connect your social accounts

    This is the first time you have logged in with a social network.

    You have previously logged in with a different account. To link your accounts, please re-authenticate.

    Log in with an existing social network:

    To connect with your existing account, please enter your password:

    OR

    Log in with an existing site account:

    To connect with your existing account, please enter your password:

    Forgot password

    Subscribe

    to receive more business insights, analysis, and perspectives from Deloitte Insights
    ✓ Link copied to clipboard
    • Contact Us
    • Submit RFP
    • Media enquiries
    Follow Deloitte Insights:
    Global office directory Office locations
    ZA-EN Location: South Africa-English  
    About Deloitte
    • Home
    • Newsroom
    • Code of Conduct
    • Report unethical conduct
    • Office locator
    • Global Office Directory
    • Press releases
    • Submit RFP
    • Contact us
    • Deloitte Insights Blog
    • Social Media
    • About Deloitte in Malawi
    • About Deloitte in Zimbabwe
    • About Deloitte in Mozambique
    • About Deloitte in Botswana
    • About Deloitte in Zambia
    • https://sacoronavirus.co.za
    Services
    • Audit & Assurance
    • Consulting
    • Financial Advisory
    • Risk Advisory
    • Tax & Legal
    • Deloitte Private
    Industries
    • Consumer
    • Energy & Resources
    • Financial Services
    • Life Sciences & Healthcare
    • Government and Public Services
    • Technology, Media & Telecom
    Careers
    • Job search
    • Experienced Hires
    • Executives
    • Students
    • Life at Deloitte
    • Alumni
    • About Deloitte
    • Terms of use
    • Privacy
    • Cookies
    • PAIA Manual
    • About Deloitte Africa
    • Avature Privacy
    • Standard terms for the provision of goods and services to Deloitte & Touche

    © 2023. See Terms of Use for more information.

    Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities.  Please see www.deloitte.com/about for a detailed description of DTTL and its member firms.