SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
What obstacles and opportunities might be in store for
your organization? These 2023 forecasts from leaders
at the cyber front lines reveal a range of insights and
strategies, from greater emphasis on future forward
readiness to the increased role organizational resilience
will play in controlling exposure to threats and
managing multifaceted risks.
Cybersecurity in 2023 and beyond:
12 leaders share their forecasts
While the stakes are high for addressing the complex
cyber and risk challenges of 2023 and beyond, Deloitte
can help you meet your objectives, whether you need
assistance with strategy, design, implementation, or
ongoing operations. We offer a unified approach to help
you tackle obstacles, build new capabilities, and move
forward fast—wherever you are on your journey.
Learn more at Deloitte.com/us/MoveForwardFast
For the challenges you can’t predict,
and the opportunities you can’t pass up
This publication contains general information only and Deloitte is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication
is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your
business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this publication.
As used in this document, “Deloitte” means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of our legal structure. Certain services may not be available
to attest clients under the rules and regulations of public accounting.
Copyright © 2023 Deloitte Development LLC. All rights reserved.
AGILE, SECURE
MODERNIZATION
Vikram Kunchala
Cyber Cloud and Infrastructure Leader,
Deloitte & Touche LLP
Proliferating cloud services
create new possibilities and risks
“The huge shift to cloud-based data and business
functions has created unprecedented possibilities—
but comes with costly regulatory missteps and
damaging cyberattacks when security is not woven
into the process. Organizations can enable agile,
secure transformation by leveraging “secure-by-
design” processes and Zero Trust principles.”
Asheem Chandna
Investor and Company Builder,
Greylock Partners
The shift-left
movement will improve
application security
“Developers won’t be working in
isolation; security improvements will be
embedded in the process of application
creation throughout the process from
development to production.”
Deborah Golden
US Cyber & Strategic Risk Leader,
Deloitte & Touche LLP
Growing talent shortages
and labor costs will lead to
cyber talent consolidation
and outsourcing
“With cybersecurity risks and regulations
increasing by the day, many organizations are
scrambling to fill positions. To stay agile, they’ll
need to focus on hiring niche cyber talent
along with outsourcing strategies.”
Jay Leek
Managing Partner & Co-founder,
SYN Ventures
Humans can’t do it alone
“The combination of ongoing talent
shortages and increasing efforts from
adversaries makes automation critical.
Humans just can’t respond fast enough.
Software is needed to fight software—
for detection, response, and prevention.”
Ken Gonzalez
Managing Director,
NightDragon Investments & Advisory
Machines can’t do it alone,
either
“If you automate a bad process, you’re
just running yourself off a cliff. You still
need process best practices and people
to oversee it.”
Mary Galligan
Crisis Management Leader,
Deloitte & Touche LLP
Boards will increasingly
view cyber readiness as a
business imperative
“The role that the board plays in cyber
oversight is becoming more important, as is
their ability to position cyber as a strategic
enabler across customer, vendor, employee,
and shareholder relationships.”
Asheem Chandna
Investor and Company Builder,
Greylock Partners
Geopolitics will make
the attack surface
more complicated
“On the attack side, threats aren’t just from
individual bad actors, but also nation states.
It will be very hard for organizations to manage
threat protection themselves, as these attacks
have high levels of sophistication.”
Ken Gonzalez
Managing Director,
NightDragon Investments & Advisory
Companies will drive
innovation to solve
global issues
“There’s a shared sense of corporate social
responsibility—a mission to protect our way of
life, governments, families, and corporations—
that’s driving new innovations.”
Pete Renneker
Technical Resilience Leader,
Deloitte & Touche LLP
Focus on organizational
resilience will continue to grow
“The multitude of supply chain, geopolitical,
environmental and cyber disruptions are
challenging traditional risk programs. An integrated
view of risks can help lead organizations to employ
new techniques and technologies to improve
threat awareness and response.”
Criss Bradbury
Data & Privacy Solution Leader,
Deloitte & Touche LLP
Brand trust will be built
on data-centric security
“There is growing urgency for
organizations to embrace data privacy,
security, and compliance as mechanisms
to bolster customer experience, trust,
and brand perception.”
Deborah Golden
US Cyber & Strategic Risk Leader,
Deloitte & Touche LLP
Organizations can build agility
with future-ready cyber tech
“Breakthrough cyber tech, including AI, will lead
to a more proactive risk approach as well as
greater innovation, competitive differentiation,
and operational excellence. Organizations
need to actively build a unified cyber
strategy to be agile enough to seize future
opportunities before they emerge.”
Kieran Norton
Transformation & Emerging
Technology Market Leader,
Deloitte & Touche LLP
Security will be a critical
enabler in the adoption of
emerging tech
“The sustained success of IoT, Blockchain, 5G,
Quantum, and other applications will largely be
based on the ability to navigate and implement
appropriate cybersecurity technology measures
in tandem with adoption.”
FUTURE
FORWARD
READINESS
AND RESILIENT
DIGITAL
OPERATIONS
TRUSTED
CUSTOMER
EXPERIENCES
AND DATA
USE
Sharon Chand
Secure Supply Chain Leader,
Deloitte & Touche LLP
Comprehensive supply chain
security is imperative
“Supply chain threats continue to evolve
in complexity, requiring a greater focus on
deploying and operating identity and access
management (IAM) and Zero Trust capabilities
to enforce authorized third-party access.”
SUPPLY
CHAIN SECURITY
AND RISK
TRANSFORMATION
SECURE,
EFFICIENT
WORKFORCE
EXPERIENCE
DYNAMIC RISK
PROGRAMS
AND ENHANCED
RESPONSE AND
RECOVERY
GOVERNANCE
AND
OPTIMIZATION
Asheem Chandna
Investor and Company Builder,
Greylock Partners
Expanding attack surfaces
will be secured through
increased automation
“With the expanding threat surface becoming
more complex for most organizations, there
is a tremendous opportunity to leverage
APIs that can improve automated threat
detection using AI and ML.”
Ramsey Hajj
Cyber OT Leader,
Deloitte & Touche LLP
Threats to operational
technologies will continue
to evolve rapidly
“Operational technology (OT) environments are
increasingly being weaponized. This is prompting
greater visibility into OT devices, networks, and an
increase in monitoring tools to better correlate
security of OT and IT networks.”
Wendy Frank
Cyber IoT Leader,
Deloitte & Touche LLP
Device visibility and security
will be a major area of focus
“As the number of IoT-connected devices
grows, the attack surface grows with it. Leading
organizations will need to increase their focus on
device policies, procedures, and inventories, as
well as closer monitoring of those devices.”
SECURE,
CONNECTED
DEVICES AND
INTELLIGENT
OPERATIONS

Weitere ähnliche Inhalte

Ähnlich wie 2023 Cyber Forecast Infographic

End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Greataccenture
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
Compliance & data security – the way we work
Compliance & data security – the way we workCompliance & data security – the way we work
Compliance & data security – the way we workPuneet Chopra
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts finalDaren Dunkel
 
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldRSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldEMC
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmPriyanka Aash
 
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Davis Blair
 
HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION Andrea Vallavanti
 
The 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressedThe 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressedinsightssuccess2
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Enterprise Management Associates
 
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersThe 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersMerry D'souza
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Optiv Security Award Write Up
Optiv Security Award Write UpOptiv Security Award Write Up
Optiv Security Award Write UpClaudia Toscano
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 

Ähnlich wie 2023 Cyber Forecast Infographic (20)

End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Compliance & data security – the way we work
Compliance & data security – the way we workCompliance & data security – the way we work
Compliance & data security – the way we work
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
Lead Through Disruption Guide PDF
Lead Through Disruption Guide PDFLead Through Disruption Guide PDF
Lead Through Disruption Guide PDF
 
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldRSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
 
BizCarta-2
BizCarta-2BizCarta-2
BizCarta-2
 
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213
 
HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION
 
The 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressedThe 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressed
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersThe 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providers
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Optiv Security Award Write Up
Optiv Security Award Write UpOptiv Security Award Write Up
Optiv Security Award Write Up
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 

Mehr von Deloitte United States

Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024Deloitte United States
 
Setting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legalSetting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legalDeloitte United States
 
Turning diligence insights into actionable integration steps
Turning diligence insights into actionable integration stepsTurning diligence insights into actionable integration steps
Turning diligence insights into actionable integration stepsDeloitte United States
 
Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Emerging Technologies in Transformations Drive the Need for Evolving Internal...Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Emerging Technologies in Transformations Drive the Need for Evolving Internal...Deloitte United States
 
Almost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Almost Half of Executives Expect Supply Chain Security Challenges in Year AheadAlmost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Almost Half of Executives Expect Supply Chain Security Challenges in Year AheadDeloitte United States
 
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...Deloitte United States
 
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...Deloitte United States
 
Few are Confident in Their Organizations’ Ability to Report on ESG Financials
Few are Confident in Their Organizations’ Ability to Report on ESG FinancialsFew are Confident in Their Organizations’ Ability to Report on ESG Financials
Few are Confident in Their Organizations’ Ability to Report on ESG FinancialsDeloitte United States
 
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust AdoptionDeloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust AdoptionDeloitte United States
 
Private Equity Leads Corporate Deal Teams on ESG in M&A
Private Equity Leads Corporate Deal Teams on ESG in M&APrivate Equity Leads Corporate Deal Teams on ESG in M&A
Private Equity Leads Corporate Deal Teams on ESG in M&ADeloitte United States
 
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...Deloitte United States
 
Could M&A Activity be a Springboard for Controllership Transformation?
Could M&A Activity be a Springboard for Controllership Transformation?Could M&A Activity be a Springboard for Controllership Transformation?
Could M&A Activity be a Springboard for Controllership Transformation?Deloitte United States
 
Putting intercompany accounting back in the spotlight: Controllership Perspec...
Putting intercompany accounting back in the spotlight: Controllership Perspec...Putting intercompany accounting back in the spotlight: Controllership Perspec...
Putting intercompany accounting back in the spotlight: Controllership Perspec...Deloitte United States
 
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...Deloitte United States
 
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...Deloitte United States
 
SOX modernization: Optimizing compliance while extracting value
SOX modernization: Optimizing compliance while extracting valueSOX modernization: Optimizing compliance while extracting value
SOX modernization: Optimizing compliance while extracting valueDeloitte United States
 
A new working relationship: Aligning organizations with the workforce of the ...
A new working relationship: Aligning organizations with the workforce of the ...A new working relationship: Aligning organizations with the workforce of the ...
A new working relationship: Aligning organizations with the workforce of the ...Deloitte United States
 
Hospitality Accounting Update Spring 2022
Hospitality Accounting Update Spring 2022Hospitality Accounting Update Spring 2022
Hospitality Accounting Update Spring 2022Deloitte United States
 
TEI Conference Deloitte Private Brochure
TEI Conference Deloitte Private BrochureTEI Conference Deloitte Private Brochure
TEI Conference Deloitte Private BrochureDeloitte United States
 

Mehr von Deloitte United States (20)

Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024
 
Setting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legalSetting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legal
 
Turning diligence insights into actionable integration steps
Turning diligence insights into actionable integration stepsTurning diligence insights into actionable integration steps
Turning diligence insights into actionable integration steps
 
Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Emerging Technologies in Transformations Drive the Need for Evolving Internal...Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Emerging Technologies in Transformations Drive the Need for Evolving Internal...
 
Almost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Almost Half of Executives Expect Supply Chain Security Challenges in Year AheadAlmost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Almost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
 
Pivotal Moments All-in-One_FINAL.pdf
Pivotal Moments All-in-One_FINAL.pdfPivotal Moments All-in-One_FINAL.pdf
Pivotal Moments All-in-One_FINAL.pdf
 
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
 
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
 
Few are Confident in Their Organizations’ Ability to Report on ESG Financials
Few are Confident in Their Organizations’ Ability to Report on ESG FinancialsFew are Confident in Their Organizations’ Ability to Report on ESG Financials
Few are Confident in Their Organizations’ Ability to Report on ESG Financials
 
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust AdoptionDeloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
 
Private Equity Leads Corporate Deal Teams on ESG in M&A
Private Equity Leads Corporate Deal Teams on ESG in M&APrivate Equity Leads Corporate Deal Teams on ESG in M&A
Private Equity Leads Corporate Deal Teams on ESG in M&A
 
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
 
Could M&A Activity be a Springboard for Controllership Transformation?
Could M&A Activity be a Springboard for Controllership Transformation?Could M&A Activity be a Springboard for Controllership Transformation?
Could M&A Activity be a Springboard for Controllership Transformation?
 
Putting intercompany accounting back in the spotlight: Controllership Perspec...
Putting intercompany accounting back in the spotlight: Controllership Perspec...Putting intercompany accounting back in the spotlight: Controllership Perspec...
Putting intercompany accounting back in the spotlight: Controllership Perspec...
 
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
 
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
 
SOX modernization: Optimizing compliance while extracting value
SOX modernization: Optimizing compliance while extracting valueSOX modernization: Optimizing compliance while extracting value
SOX modernization: Optimizing compliance while extracting value
 
A new working relationship: Aligning organizations with the workforce of the ...
A new working relationship: Aligning organizations with the workforce of the ...A new working relationship: Aligning organizations with the workforce of the ...
A new working relationship: Aligning organizations with the workforce of the ...
 
Hospitality Accounting Update Spring 2022
Hospitality Accounting Update Spring 2022Hospitality Accounting Update Spring 2022
Hospitality Accounting Update Spring 2022
 
TEI Conference Deloitte Private Brochure
TEI Conference Deloitte Private BrochureTEI Conference Deloitte Private Brochure
TEI Conference Deloitte Private Brochure
 

Kürzlich hochgeladen

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

2023 Cyber Forecast Infographic

  • 1. What obstacles and opportunities might be in store for your organization? These 2023 forecasts from leaders at the cyber front lines reveal a range of insights and strategies, from greater emphasis on future forward readiness to the increased role organizational resilience will play in controlling exposure to threats and managing multifaceted risks. Cybersecurity in 2023 and beyond: 12 leaders share their forecasts While the stakes are high for addressing the complex cyber and risk challenges of 2023 and beyond, Deloitte can help you meet your objectives, whether you need assistance with strategy, design, implementation, or ongoing operations. We offer a unified approach to help you tackle obstacles, build new capabilities, and move forward fast—wherever you are on your journey. Learn more at Deloitte.com/us/MoveForwardFast For the challenges you can’t predict, and the opportunities you can’t pass up This publication contains general information only and Deloitte is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this publication. As used in this document, “Deloitte” means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of our legal structure. Certain services may not be available to attest clients under the rules and regulations of public accounting. Copyright © 2023 Deloitte Development LLC. All rights reserved. AGILE, SECURE MODERNIZATION Vikram Kunchala Cyber Cloud and Infrastructure Leader, Deloitte & Touche LLP Proliferating cloud services create new possibilities and risks “The huge shift to cloud-based data and business functions has created unprecedented possibilities— but comes with costly regulatory missteps and damaging cyberattacks when security is not woven into the process. Organizations can enable agile, secure transformation by leveraging “secure-by- design” processes and Zero Trust principles.” Asheem Chandna Investor and Company Builder, Greylock Partners The shift-left movement will improve application security “Developers won’t be working in isolation; security improvements will be embedded in the process of application creation throughout the process from development to production.” Deborah Golden US Cyber & Strategic Risk Leader, Deloitte & Touche LLP Growing talent shortages and labor costs will lead to cyber talent consolidation and outsourcing “With cybersecurity risks and regulations increasing by the day, many organizations are scrambling to fill positions. To stay agile, they’ll need to focus on hiring niche cyber talent along with outsourcing strategies.” Jay Leek Managing Partner & Co-founder, SYN Ventures Humans can’t do it alone “The combination of ongoing talent shortages and increasing efforts from adversaries makes automation critical. Humans just can’t respond fast enough. Software is needed to fight software— for detection, response, and prevention.” Ken Gonzalez Managing Director, NightDragon Investments & Advisory Machines can’t do it alone, either “If you automate a bad process, you’re just running yourself off a cliff. You still need process best practices and people to oversee it.” Mary Galligan Crisis Management Leader, Deloitte & Touche LLP Boards will increasingly view cyber readiness as a business imperative “The role that the board plays in cyber oversight is becoming more important, as is their ability to position cyber as a strategic enabler across customer, vendor, employee, and shareholder relationships.” Asheem Chandna Investor and Company Builder, Greylock Partners Geopolitics will make the attack surface more complicated “On the attack side, threats aren’t just from individual bad actors, but also nation states. It will be very hard for organizations to manage threat protection themselves, as these attacks have high levels of sophistication.” Ken Gonzalez Managing Director, NightDragon Investments & Advisory Companies will drive innovation to solve global issues “There’s a shared sense of corporate social responsibility—a mission to protect our way of life, governments, families, and corporations— that’s driving new innovations.” Pete Renneker Technical Resilience Leader, Deloitte & Touche LLP Focus on organizational resilience will continue to grow “The multitude of supply chain, geopolitical, environmental and cyber disruptions are challenging traditional risk programs. An integrated view of risks can help lead organizations to employ new techniques and technologies to improve threat awareness and response.” Criss Bradbury Data & Privacy Solution Leader, Deloitte & Touche LLP Brand trust will be built on data-centric security “There is growing urgency for organizations to embrace data privacy, security, and compliance as mechanisms to bolster customer experience, trust, and brand perception.” Deborah Golden US Cyber & Strategic Risk Leader, Deloitte & Touche LLP Organizations can build agility with future-ready cyber tech “Breakthrough cyber tech, including AI, will lead to a more proactive risk approach as well as greater innovation, competitive differentiation, and operational excellence. Organizations need to actively build a unified cyber strategy to be agile enough to seize future opportunities before they emerge.” Kieran Norton Transformation & Emerging Technology Market Leader, Deloitte & Touche LLP Security will be a critical enabler in the adoption of emerging tech “The sustained success of IoT, Blockchain, 5G, Quantum, and other applications will largely be based on the ability to navigate and implement appropriate cybersecurity technology measures in tandem with adoption.” FUTURE FORWARD READINESS AND RESILIENT DIGITAL OPERATIONS TRUSTED CUSTOMER EXPERIENCES AND DATA USE Sharon Chand Secure Supply Chain Leader, Deloitte & Touche LLP Comprehensive supply chain security is imperative “Supply chain threats continue to evolve in complexity, requiring a greater focus on deploying and operating identity and access management (IAM) and Zero Trust capabilities to enforce authorized third-party access.” SUPPLY CHAIN SECURITY AND RISK TRANSFORMATION SECURE, EFFICIENT WORKFORCE EXPERIENCE DYNAMIC RISK PROGRAMS AND ENHANCED RESPONSE AND RECOVERY GOVERNANCE AND OPTIMIZATION Asheem Chandna Investor and Company Builder, Greylock Partners Expanding attack surfaces will be secured through increased automation “With the expanding threat surface becoming more complex for most organizations, there is a tremendous opportunity to leverage APIs that can improve automated threat detection using AI and ML.” Ramsey Hajj Cyber OT Leader, Deloitte & Touche LLP Threats to operational technologies will continue to evolve rapidly “Operational technology (OT) environments are increasingly being weaponized. This is prompting greater visibility into OT devices, networks, and an increase in monitoring tools to better correlate security of OT and IT networks.” Wendy Frank Cyber IoT Leader, Deloitte & Touche LLP Device visibility and security will be a major area of focus “As the number of IoT-connected devices grows, the attack surface grows with it. Leading organizations will need to increase their focus on device policies, procedures, and inventories, as well as closer monitoring of those devices.” SECURE, CONNECTED DEVICES AND INTELLIGENT OPERATIONS