Suche senden
Hochladen
2023 Cyber Forecast Infographic
•
2 gefällt mir
•
74 views
Deloitte United States
Folgen
2023 Cyber Forecast Infographic
Weniger lesen
Mehr lesen
Technologie
Melden
Teilen
Melden
Teilen
1 von 1
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
aakash malhotra
eCrime-report-2011-accessible
eCrime-report-2011-accessible
Charmaine Servado
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
William McBorrough
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
balejandre
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
drewz lin
1674749167063.pdf
1674749167063.pdf
Alemayehu
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
Lydia Shepherd
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
Sherry Jones
Empfohlen
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
aakash malhotra
eCrime-report-2011-accessible
eCrime-report-2011-accessible
Charmaine Servado
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
William McBorrough
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
balejandre
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
drewz lin
1674749167063.pdf
1674749167063.pdf
Alemayehu
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
Lydia Shepherd
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
Sherry Jones
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
accenture
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
accenture
Compliance & data security – the way we work
Compliance & data security – the way we work
Puneet Chopra
Ask the Experts final
Ask the Experts final
Daren Dunkel
Lead Through Disruption Guide PDF
Lead Through Disruption Guide PDF
Deloitte United States
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
EMC
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
Ayham Kochaji
A smarter way to manage identities
A smarter way to manage identities
Matthew Zielinski, CISSP, CBCP
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
Tatainteractive1
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
Priyanka Aash
BizCarta-2
BizCarta-2
Pradeep Kumar
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213
Davis Blair
HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION
Andrea Vallavanti
The 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressed
insightssuccess2
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
Enterprise Management Associates
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providers
Merry D'souza
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
Laurie Mosca-Cocca
Cybersecurity Improvement eBook
Cybersecurity Improvement eBook
Pablo Junco
Optiv Security Award Write Up
Optiv Security Award Write Up
Claudia Toscano
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Sarah Nirschl
Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024
Deloitte United States
Setting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legal
Deloitte United States
Weitere ähnliche Inhalte
Ähnlich wie 2023 Cyber Forecast Infographic
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
accenture
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
accenture
Compliance & data security – the way we work
Compliance & data security – the way we work
Puneet Chopra
Ask the Experts final
Ask the Experts final
Daren Dunkel
Lead Through Disruption Guide PDF
Lead Through Disruption Guide PDF
Deloitte United States
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
EMC
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
Ayham Kochaji
A smarter way to manage identities
A smarter way to manage identities
Matthew Zielinski, CISSP, CBCP
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
Tatainteractive1
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
Priyanka Aash
BizCarta-2
BizCarta-2
Pradeep Kumar
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213
Davis Blair
HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION
Andrea Vallavanti
The 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressed
insightssuccess2
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
Enterprise Management Associates
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providers
Merry D'souza
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
Laurie Mosca-Cocca
Cybersecurity Improvement eBook
Cybersecurity Improvement eBook
Pablo Junco
Optiv Security Award Write Up
Optiv Security Award Write Up
Claudia Toscano
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Sarah Nirschl
Ähnlich wie 2023 Cyber Forecast Infographic
(20)
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
Compliance & data security – the way we work
Compliance & data security – the way we work
Ask the Experts final
Ask the Experts final
Lead Through Disruption Guide PDF
Lead Through Disruption Guide PDF
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
A smarter way to manage identities
A smarter way to manage identities
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
BizCarta-2
BizCarta-2
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213
HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION
The 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressed
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providers
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
Cybersecurity Improvement eBook
Cybersecurity Improvement eBook
Optiv Security Award Write Up
Optiv Security Award Write Up
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Mehr von Deloitte United States
Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024
Deloitte United States
Setting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legal
Deloitte United States
Turning diligence insights into actionable integration steps
Turning diligence insights into actionable integration steps
Deloitte United States
Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Deloitte United States
Almost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Almost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Deloitte United States
Pivotal Moments All-in-One_FINAL.pdf
Pivotal Moments All-in-One_FINAL.pdf
Deloitte United States
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Deloitte United States
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Deloitte United States
Few are Confident in Their Organizations’ Ability to Report on ESG Financials
Few are Confident in Their Organizations’ Ability to Report on ESG Financials
Deloitte United States
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte United States
Private Equity Leads Corporate Deal Teams on ESG in M&A
Private Equity Leads Corporate Deal Teams on ESG in M&A
Deloitte United States
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Deloitte United States
Could M&A Activity be a Springboard for Controllership Transformation?
Could M&A Activity be a Springboard for Controllership Transformation?
Deloitte United States
Putting intercompany accounting back in the spotlight: Controllership Perspec...
Putting intercompany accounting back in the spotlight: Controllership Perspec...
Deloitte United States
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Deloitte United States
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Deloitte United States
SOX modernization: Optimizing compliance while extracting value
SOX modernization: Optimizing compliance while extracting value
Deloitte United States
A new working relationship: Aligning organizations with the workforce of the ...
A new working relationship: Aligning organizations with the workforce of the ...
Deloitte United States
Hospitality Accounting Update Spring 2022
Hospitality Accounting Update Spring 2022
Deloitte United States
TEI Conference Deloitte Private Brochure
TEI Conference Deloitte Private Brochure
Deloitte United States
Mehr von Deloitte United States
(20)
Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024
Setting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legal
Turning diligence insights into actionable integration steps
Turning diligence insights into actionable integration steps
Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Almost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Almost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Pivotal Moments All-in-One_FINAL.pdf
Pivotal Moments All-in-One_FINAL.pdf
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Few are Confident in Their Organizations’ Ability to Report on ESG Financials
Few are Confident in Their Organizations’ Ability to Report on ESG Financials
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Private Equity Leads Corporate Deal Teams on ESG in M&A
Private Equity Leads Corporate Deal Teams on ESG in M&A
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Could M&A Activity be a Springboard for Controllership Transformation?
Could M&A Activity be a Springboard for Controllership Transformation?
Putting intercompany accounting back in the spotlight: Controllership Perspec...
Putting intercompany accounting back in the spotlight: Controllership Perspec...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
SOX modernization: Optimizing compliance while extracting value
SOX modernization: Optimizing compliance while extracting value
A new working relationship: Aligning organizations with the workforce of the ...
A new working relationship: Aligning organizations with the workforce of the ...
Hospitality Accounting Update Spring 2022
Hospitality Accounting Update Spring 2022
TEI Conference Deloitte Private Brochure
TEI Conference Deloitte Private Brochure
Kürzlich hochgeladen
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Kürzlich hochgeladen
(20)
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
2023 Cyber Forecast Infographic
1.
What obstacles and
opportunities might be in store for your organization? These 2023 forecasts from leaders at the cyber front lines reveal a range of insights and strategies, from greater emphasis on future forward readiness to the increased role organizational resilience will play in controlling exposure to threats and managing multifaceted risks. Cybersecurity in 2023 and beyond: 12 leaders share their forecasts While the stakes are high for addressing the complex cyber and risk challenges of 2023 and beyond, Deloitte can help you meet your objectives, whether you need assistance with strategy, design, implementation, or ongoing operations. We offer a unified approach to help you tackle obstacles, build new capabilities, and move forward fast—wherever you are on your journey. Learn more at Deloitte.com/us/MoveForwardFast For the challenges you can’t predict, and the opportunities you can’t pass up This publication contains general information only and Deloitte is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this publication. As used in this document, “Deloitte” means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of our legal structure. Certain services may not be available to attest clients under the rules and regulations of public accounting. Copyright © 2023 Deloitte Development LLC. All rights reserved. AGILE, SECURE MODERNIZATION Vikram Kunchala Cyber Cloud and Infrastructure Leader, Deloitte & Touche LLP Proliferating cloud services create new possibilities and risks “The huge shift to cloud-based data and business functions has created unprecedented possibilities— but comes with costly regulatory missteps and damaging cyberattacks when security is not woven into the process. Organizations can enable agile, secure transformation by leveraging “secure-by- design” processes and Zero Trust principles.” Asheem Chandna Investor and Company Builder, Greylock Partners The shift-left movement will improve application security “Developers won’t be working in isolation; security improvements will be embedded in the process of application creation throughout the process from development to production.” Deborah Golden US Cyber & Strategic Risk Leader, Deloitte & Touche LLP Growing talent shortages and labor costs will lead to cyber talent consolidation and outsourcing “With cybersecurity risks and regulations increasing by the day, many organizations are scrambling to fill positions. To stay agile, they’ll need to focus on hiring niche cyber talent along with outsourcing strategies.” Jay Leek Managing Partner & Co-founder, SYN Ventures Humans can’t do it alone “The combination of ongoing talent shortages and increasing efforts from adversaries makes automation critical. Humans just can’t respond fast enough. Software is needed to fight software— for detection, response, and prevention.” Ken Gonzalez Managing Director, NightDragon Investments & Advisory Machines can’t do it alone, either “If you automate a bad process, you’re just running yourself off a cliff. You still need process best practices and people to oversee it.” Mary Galligan Crisis Management Leader, Deloitte & Touche LLP Boards will increasingly view cyber readiness as a business imperative “The role that the board plays in cyber oversight is becoming more important, as is their ability to position cyber as a strategic enabler across customer, vendor, employee, and shareholder relationships.” Asheem Chandna Investor and Company Builder, Greylock Partners Geopolitics will make the attack surface more complicated “On the attack side, threats aren’t just from individual bad actors, but also nation states. It will be very hard for organizations to manage threat protection themselves, as these attacks have high levels of sophistication.” Ken Gonzalez Managing Director, NightDragon Investments & Advisory Companies will drive innovation to solve global issues “There’s a shared sense of corporate social responsibility—a mission to protect our way of life, governments, families, and corporations— that’s driving new innovations.” Pete Renneker Technical Resilience Leader, Deloitte & Touche LLP Focus on organizational resilience will continue to grow “The multitude of supply chain, geopolitical, environmental and cyber disruptions are challenging traditional risk programs. An integrated view of risks can help lead organizations to employ new techniques and technologies to improve threat awareness and response.” Criss Bradbury Data & Privacy Solution Leader, Deloitte & Touche LLP Brand trust will be built on data-centric security “There is growing urgency for organizations to embrace data privacy, security, and compliance as mechanisms to bolster customer experience, trust, and brand perception.” Deborah Golden US Cyber & Strategic Risk Leader, Deloitte & Touche LLP Organizations can build agility with future-ready cyber tech “Breakthrough cyber tech, including AI, will lead to a more proactive risk approach as well as greater innovation, competitive differentiation, and operational excellence. Organizations need to actively build a unified cyber strategy to be agile enough to seize future opportunities before they emerge.” Kieran Norton Transformation & Emerging Technology Market Leader, Deloitte & Touche LLP Security will be a critical enabler in the adoption of emerging tech “The sustained success of IoT, Blockchain, 5G, Quantum, and other applications will largely be based on the ability to navigate and implement appropriate cybersecurity technology measures in tandem with adoption.” FUTURE FORWARD READINESS AND RESILIENT DIGITAL OPERATIONS TRUSTED CUSTOMER EXPERIENCES AND DATA USE Sharon Chand Secure Supply Chain Leader, Deloitte & Touche LLP Comprehensive supply chain security is imperative “Supply chain threats continue to evolve in complexity, requiring a greater focus on deploying and operating identity and access management (IAM) and Zero Trust capabilities to enforce authorized third-party access.” SUPPLY CHAIN SECURITY AND RISK TRANSFORMATION SECURE, EFFICIENT WORKFORCE EXPERIENCE DYNAMIC RISK PROGRAMS AND ENHANCED RESPONSE AND RECOVERY GOVERNANCE AND OPTIMIZATION Asheem Chandna Investor and Company Builder, Greylock Partners Expanding attack surfaces will be secured through increased automation “With the expanding threat surface becoming more complex for most organizations, there is a tremendous opportunity to leverage APIs that can improve automated threat detection using AI and ML.” Ramsey Hajj Cyber OT Leader, Deloitte & Touche LLP Threats to operational technologies will continue to evolve rapidly “Operational technology (OT) environments are increasingly being weaponized. This is prompting greater visibility into OT devices, networks, and an increase in monitoring tools to better correlate security of OT and IT networks.” Wendy Frank Cyber IoT Leader, Deloitte & Touche LLP Device visibility and security will be a major area of focus “As the number of IoT-connected devices grows, the attack surface grows with it. Leading organizations will need to increase their focus on device policies, procedures, and inventories, as well as closer monitoring of those devices.” SECURE, CONNECTED DEVICES AND INTELLIGENT OPERATIONS
Jetzt herunterladen