SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
The Internet of Things
(IoT) and cybersecurity:
A secure-by-design approach
Deloitte Cyber poll results May 30, 2019
Copyright © 2019 Deloitte Development LLC. All rights reserved. 2The Internet of Things and cybersecurity:
A secure-by-design approach
Methodology
professionals across industries and positions
participated in and responded to poll questions
during the Deloitte Dbriefs webcast, The Internet of
Things and cybersecurity: A secure-by-design
approach, held May 30, 2019.
Data totals for certain questions may not equal
100.0% due to the rounding of raw data to the
nearest tenth of a percentage.
The statements in this report reflect the
aggregation of poll responses and are not intended
to reflect facts or opinions of any entities. All data,
charts and statistics referenced and presented, as
well as the representations made and opinions
expressed, unless specifically described otherwise,
pertain only to the participants and their responses
to the Deloitte poll. The information obtained
during the poll was taken “as is” and was not
validated or confirmed by Deloitte.
4200+
EU General Data Protection Regulation:
Practical steps for compliance
2
Copyright © 2019 Deloitte Development LLC. All rights reserved. 3The Internet of Things and cybersecurity:
A secure-by-design approach
IoT and cybersecurity: A secure-by-design approach
Very
confident
18%
Somewhat confident
51%
Uncertain, or
somewhat not
confident
23%
Not
confident
at all
8%
How confident are you that your organization’s connected
products, devices, or other “things” are secure today?
Results reflect
3,221 responses
Copyright © 2019 Deloitte Development LLC. All rights reserved. 4The Internet of Things and cybersecurity:
A secure-by-design approach
Research and
development
7%
Information security
81%
Manufacturing
organization
5%
Product
cybersecurity
7%
Who is accountable for the securing of connected products in
your organization?
Results reflect
3,062 responses
IoT and cybersecurity: A secure-by-design approach
Copyright © 2019 Deloitte Development LLC. All rights reserved. 5The Internet of Things and cybersecurity:
A secure-by-design approach
Do you have a defined set of product cybersecurity requirements that
product teams use as input for requirements selection?
Yes, we use an
industry defined
framework, 28%
Yes, we have a
custom
framework, 51%
No, 31%
Results reflect
2,007 responses
IoT and cybersecurity: A secure-by-design approach
Copyright © 2019 Deloitte Development LLC. All rights reserved. 6The Internet of Things and cybersecurity:
A secure-by-design approach
What sources of guidance do you use to drive security by design?
Industry and
professional
organizations that
help to set the
guidelines, 41%
Regulatory bodies and
agencies that set the
standards, 28%
Leading practices
developed
internally, 22%
Other, 9%
Results reflect
2,705 responses
IoT and cybersecurity: A secure-by-design approach
Copyright © 2019 Deloitte Development LLC. All rights reserved. 7The Internet of Things and cybersecurity:
A secure-by-design approach
Where do you believe your greatest strengths are in developing or deploying
secure-by-design connected products and/or devices?
DevSecOps embedded throughout
the design/acquisition,
implementation, and deployment
lifecycle, 11%
Cross-functional
technology, legal,
procurement, and
compliance teaming
across pre- and post-
market deployments,
27%
Both of the
above, 48%
None of the above,
14%
Results reflect
1,812 responses
IoT and cybersecurity: A secure-by-design approach
Copyright © 2019 Deloitte Development LLC. All rights reserved. 8The Internet of Things and cybersecurity:
A secure-by-design approach
Top 10 cyber and privacy risks in the IoT world
Not having a security and
privacy program
02
01
03
Lack of ownership/
governance to drive
security and privacy
Security not being incorporated
into the design or products and
ecosystems
Insufficient security awareness
and training for engineers and
architects04
05
Lack of IoT and product security
and privacy resources
Insufficient monitoring of
devices and systems to detect
security events
07
06
08
Lack of post-market/
implementation security and
privacy risk management
Lack of visibility of products
without having a full product
inventory.
Identifying and treating risks of
fielded and legacy
devices/products09
10 Inexperienced/immature
incident response processes
Copyright © 2019 Deloitte Development LLC. All rights reserved. 9The Internet of Things and cybersecurity:
A secure-by-design approach
Media contact
Nicole Hockin
Public Relations
Deloitte & Touche LLP
nhockin@deloitte.com
Full press release available on
Deloitte.com
8
Copyright © 2019 Deloitte Development LLC. All rights reserved. 10The Internet of Things and cybersecurity:
A secure-by-design approach
This presentation contains general information only and Deloitte is not, by
means of this presentation, rendering accounting, business, financial,
investment, legal, tax, or other professional advice or services. This
presentation is not a substitute for such professional advice or services, nor
should it be used as a basis for any decision or action that may affect your
business. Before making any decision or taking any action that may affect
your business, you should consult a qualified professional advisor. Deloitte
shall not be responsible for any loss sustained by any person who relies on
this presentation.
About Deloitte
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities.
DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. In the United
States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the “Deloitte” name in the United States and their respective
affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about
our global network of member firms.
Copyright © 2019 Deloitte Development LLC. All rights reserved.

Weitere ähnliche Inhalte

Was ist angesagt?

Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 
Case study on gina(gobal innovation network and analysis)
Case study on gina(gobal innovation network and analysis)Case study on gina(gobal innovation network and analysis)
Case study on gina(gobal innovation network and analysis)SaloniAgrawal41
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture Vrince Vimal
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
BSidesAugusta 2022 - The Power of the OT Security Playbook
BSidesAugusta 2022 - The Power of the OT Security PlaybookBSidesAugusta 2022 - The Power of the OT Security Playbook
BSidesAugusta 2022 - The Power of the OT Security PlaybookChris Sistrunk
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptxDESTROYER39
 

Was ist angesagt? (20)

Iot Security
Iot SecurityIot Security
Iot Security
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Case study on gina(gobal innovation network and analysis)
Case study on gina(gobal innovation network and analysis)Case study on gina(gobal innovation network and analysis)
Case study on gina(gobal innovation network and analysis)
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
BSidesAugusta 2022 - The Power of the OT Security Playbook
BSidesAugusta 2022 - The Power of the OT Security PlaybookBSidesAugusta 2022 - The Power of the OT Security Playbook
BSidesAugusta 2022 - The Power of the OT Security Playbook
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 

Ähnlich wie The Internet of Things (IoT) and cybersecurity: A secure-by-design approach

Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensaakash malhotra
 
Hot technology developments for 2019 and beyond
Hot technology developments for 2019 and beyondHot technology developments for 2019 and beyond
Hot technology developments for 2019 and beyondDeloitte United States
 
With 5G adoption, come new cybersecurity risks to mitigate
With 5G adoption, come new cybersecurity risks to mitigateWith 5G adoption, come new cybersecurity risks to mitigate
With 5G adoption, come new cybersecurity risks to mitigateDeloitte United States
 
An Identity Crisis: Organizations Grapple With Growing Consumer Expectation f...
An Identity Crisis: Organizations Grapple With Growing Consumer Expectation f...An Identity Crisis: Organizations Grapple With Growing Consumer Expectation f...
An Identity Crisis: Organizations Grapple With Growing Consumer Expectation f...Deloitte United States
 
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust AdoptionDeloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust AdoptionDeloitte United States
 
Cyber wargaming: Building cyber resilience in an era of cyberattacks
Cyber wargaming: Building cyber resilience in an era of cyberattacksCyber wargaming: Building cyber resilience in an era of cyberattacks
Cyber wargaming: Building cyber resilience in an era of cyberattacksDeloitte United States
 
Taming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug BourgeoisTaming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug Bourgeoisscoopnewsgroup
 
in-ra-service-brochure-December-23-noexp.pdf
in-ra-service-brochure-December-23-noexp.pdfin-ra-service-brochure-December-23-noexp.pdf
in-ra-service-brochure-December-23-noexp.pdfaakash malhotra
 
Risk Advisory’s new narrative Mitigate risks effectively
Risk Advisory’s new narrative Mitigate risks effectivelyRisk Advisory’s new narrative Mitigate risks effectively
Risk Advisory’s new narrative Mitigate risks effectivelyaakash malhotra
 
Almost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Almost Half of Executives Expect Supply Chain Security Challenges in Year AheadAlmost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Almost Half of Executives Expect Supply Chain Security Challenges in Year AheadDeloitte United States
 
As organizational reliance on third parties increases, extended enterprise ri...
As organizational reliance on third parties increases, extended enterprise ri...As organizational reliance on third parties increases, extended enterprise ri...
As organizational reliance on third parties increases, extended enterprise ri...Deloitte United States
 
Hot technology trends for 2020 and beyond: A preview of Deloitte’s annual Tec...
Hot technology trends for 2020 and beyond: A preview of Deloitte’s annual Tec...Hot technology trends for 2020 and beyond: A preview of Deloitte’s annual Tec...
Hot technology trends for 2020 and beyond: A preview of Deloitte’s annual Tec...Deloitte United States
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...
The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...
The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...Franco Ferrario
 
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?Executive Leaders Network
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Emerging Technologies in Transformations Drive the Need for Evolving Internal...Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Emerging Technologies in Transformations Drive the Need for Evolving Internal...Deloitte United States
 
Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024Deloitte United States
 
Fight the good fight: Three lines of cyber defense working arm-in-arm
Fight the good fight: Three lines of cyber defense working arm-in-arm Fight the good fight: Three lines of cyber defense working arm-in-arm
Fight the good fight: Three lines of cyber defense working arm-in-arm Deloitte United States
 

Ähnlich wie The Internet of Things (IoT) and cybersecurity: A secure-by-design approach (20)

Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 
Hot technology developments for 2019 and beyond
Hot technology developments for 2019 and beyondHot technology developments for 2019 and beyond
Hot technology developments for 2019 and beyond
 
With 5G adoption, come new cybersecurity risks to mitigate
With 5G adoption, come new cybersecurity risks to mitigateWith 5G adoption, come new cybersecurity risks to mitigate
With 5G adoption, come new cybersecurity risks to mitigate
 
An Identity Crisis: Organizations Grapple With Growing Consumer Expectation f...
An Identity Crisis: Organizations Grapple With Growing Consumer Expectation f...An Identity Crisis: Organizations Grapple With Growing Consumer Expectation f...
An Identity Crisis: Organizations Grapple With Growing Consumer Expectation f...
 
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust AdoptionDeloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
 
Cyber wargaming: Building cyber resilience in an era of cyberattacks
Cyber wargaming: Building cyber resilience in an era of cyberattacksCyber wargaming: Building cyber resilience in an era of cyberattacks
Cyber wargaming: Building cyber resilience in an era of cyberattacks
 
Taming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug BourgeoisTaming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug Bourgeois
 
in-ra-service-brochure-December-23-noexp.pdf
in-ra-service-brochure-December-23-noexp.pdfin-ra-service-brochure-December-23-noexp.pdf
in-ra-service-brochure-December-23-noexp.pdf
 
Risk Advisory’s new narrative Mitigate risks effectively
Risk Advisory’s new narrative Mitigate risks effectivelyRisk Advisory’s new narrative Mitigate risks effectively
Risk Advisory’s new narrative Mitigate risks effectively
 
Almost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Almost Half of Executives Expect Supply Chain Security Challenges in Year AheadAlmost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Almost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
 
As organizational reliance on third parties increases, extended enterprise ri...
As organizational reliance on third parties increases, extended enterprise ri...As organizational reliance on third parties increases, extended enterprise ri...
As organizational reliance on third parties increases, extended enterprise ri...
 
Hot technology trends for 2020 and beyond: A preview of Deloitte’s annual Tec...
Hot technology trends for 2020 and beyond: A preview of Deloitte’s annual Tec...Hot technology trends for 2020 and beyond: A preview of Deloitte’s annual Tec...
Hot technology trends for 2020 and beyond: A preview of Deloitte’s annual Tec...
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...
The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...
The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...
 
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
 
CGI Final
CGI FinalCGI Final
CGI Final
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Emerging Technologies in Transformations Drive the Need for Evolving Internal...Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Emerging Technologies in Transformations Drive the Need for Evolving Internal...
 
Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024
 
Fight the good fight: Three lines of cyber defense working arm-in-arm
Fight the good fight: Three lines of cyber defense working arm-in-arm Fight the good fight: Three lines of cyber defense working arm-in-arm
Fight the good fight: Three lines of cyber defense working arm-in-arm
 

Mehr von Deloitte United States

Setting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legalSetting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legalDeloitte United States
 
Turning diligence insights into actionable integration steps
Turning diligence insights into actionable integration stepsTurning diligence insights into actionable integration steps
Turning diligence insights into actionable integration stepsDeloitte United States
 
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...Deloitte United States
 
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...Deloitte United States
 
Few are Confident in Their Organizations’ Ability to Report on ESG Financials
Few are Confident in Their Organizations’ Ability to Report on ESG FinancialsFew are Confident in Their Organizations’ Ability to Report on ESG Financials
Few are Confident in Their Organizations’ Ability to Report on ESG FinancialsDeloitte United States
 
Private Equity Leads Corporate Deal Teams on ESG in M&A
Private Equity Leads Corporate Deal Teams on ESG in M&APrivate Equity Leads Corporate Deal Teams on ESG in M&A
Private Equity Leads Corporate Deal Teams on ESG in M&ADeloitte United States
 
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...Deloitte United States
 
Could M&A Activity be a Springboard for Controllership Transformation?
Could M&A Activity be a Springboard for Controllership Transformation?Could M&A Activity be a Springboard for Controllership Transformation?
Could M&A Activity be a Springboard for Controllership Transformation?Deloitte United States
 
Putting intercompany accounting back in the spotlight: Controllership Perspec...
Putting intercompany accounting back in the spotlight: Controllership Perspec...Putting intercompany accounting back in the spotlight: Controllership Perspec...
Putting intercompany accounting back in the spotlight: Controllership Perspec...Deloitte United States
 
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...Deloitte United States
 
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...Deloitte United States
 
SOX modernization: Optimizing compliance while extracting value
SOX modernization: Optimizing compliance while extracting valueSOX modernization: Optimizing compliance while extracting value
SOX modernization: Optimizing compliance while extracting valueDeloitte United States
 
A new working relationship: Aligning organizations with the workforce of the ...
A new working relationship: Aligning organizations with the workforce of the ...A new working relationship: Aligning organizations with the workforce of the ...
A new working relationship: Aligning organizations with the workforce of the ...Deloitte United States
 
Hospitality Accounting Update Spring 2022
Hospitality Accounting Update Spring 2022Hospitality Accounting Update Spring 2022
Hospitality Accounting Update Spring 2022Deloitte United States
 
TEI Conference Deloitte Private Brochure
TEI Conference Deloitte Private BrochureTEI Conference Deloitte Private Brochure
TEI Conference Deloitte Private BrochureDeloitte United States
 
TEI Conference Atlanta-Birmingham Office Overview
TEI Conference Atlanta-Birmingham Office OverviewTEI Conference Atlanta-Birmingham Office Overview
TEI Conference Atlanta-Birmingham Office OverviewDeloitte United States
 

Mehr von Deloitte United States (20)

Setting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legalSetting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legal
 
Turning diligence insights into actionable integration steps
Turning diligence insights into actionable integration stepsTurning diligence insights into actionable integration steps
Turning diligence insights into actionable integration steps
 
Pivotal Moments All-in-One_FINAL.pdf
Pivotal Moments All-in-One_FINAL.pdfPivotal Moments All-in-One_FINAL.pdf
Pivotal Moments All-in-One_FINAL.pdf
 
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
 
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
 
Lead Through Disruption Guide PDF
Lead Through Disruption Guide PDFLead Through Disruption Guide PDF
Lead Through Disruption Guide PDF
 
2023 Cyber Forecast Infographic
2023 Cyber Forecast Infographic2023 Cyber Forecast Infographic
2023 Cyber Forecast Infographic
 
Few are Confident in Their Organizations’ Ability to Report on ESG Financials
Few are Confident in Their Organizations’ Ability to Report on ESG FinancialsFew are Confident in Their Organizations’ Ability to Report on ESG Financials
Few are Confident in Their Organizations’ Ability to Report on ESG Financials
 
Private Equity Leads Corporate Deal Teams on ESG in M&A
Private Equity Leads Corporate Deal Teams on ESG in M&APrivate Equity Leads Corporate Deal Teams on ESG in M&A
Private Equity Leads Corporate Deal Teams on ESG in M&A
 
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
 
Could M&A Activity be a Springboard for Controllership Transformation?
Could M&A Activity be a Springboard for Controllership Transformation?Could M&A Activity be a Springboard for Controllership Transformation?
Could M&A Activity be a Springboard for Controllership Transformation?
 
Putting intercompany accounting back in the spotlight: Controllership Perspec...
Putting intercompany accounting back in the spotlight: Controllership Perspec...Putting intercompany accounting back in the spotlight: Controllership Perspec...
Putting intercompany accounting back in the spotlight: Controllership Perspec...
 
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
 
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
 
SOX modernization: Optimizing compliance while extracting value
SOX modernization: Optimizing compliance while extracting valueSOX modernization: Optimizing compliance while extracting value
SOX modernization: Optimizing compliance while extracting value
 
A new working relationship: Aligning organizations with the workforce of the ...
A new working relationship: Aligning organizations with the workforce of the ...A new working relationship: Aligning organizations with the workforce of the ...
A new working relationship: Aligning organizations with the workforce of the ...
 
Hospitality Accounting Update Spring 2022
Hospitality Accounting Update Spring 2022Hospitality Accounting Update Spring 2022
Hospitality Accounting Update Spring 2022
 
TEI Conference Deloitte Private Brochure
TEI Conference Deloitte Private BrochureTEI Conference Deloitte Private Brochure
TEI Conference Deloitte Private Brochure
 
TEI Conference Atlanta-Birmingham Office Overview
TEI Conference Atlanta-Birmingham Office OverviewTEI Conference Atlanta-Birmingham Office Overview
TEI Conference Atlanta-Birmingham Office Overview
 
TEI Conference Deloitte Trends
TEI Conference Deloitte TrendsTEI Conference Deloitte Trends
TEI Conference Deloitte Trends
 

Kürzlich hochgeladen

Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSkajalroy875762
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Availablepr788182
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingNauman Safdar
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 

Kürzlich hochgeladen (20)

Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 

The Internet of Things (IoT) and cybersecurity: A secure-by-design approach

  • 1. The Internet of Things (IoT) and cybersecurity: A secure-by-design approach Deloitte Cyber poll results May 30, 2019
  • 2. Copyright © 2019 Deloitte Development LLC. All rights reserved. 2The Internet of Things and cybersecurity: A secure-by-design approach Methodology professionals across industries and positions participated in and responded to poll questions during the Deloitte Dbriefs webcast, The Internet of Things and cybersecurity: A secure-by-design approach, held May 30, 2019. Data totals for certain questions may not equal 100.0% due to the rounding of raw data to the nearest tenth of a percentage. The statements in this report reflect the aggregation of poll responses and are not intended to reflect facts or opinions of any entities. All data, charts and statistics referenced and presented, as well as the representations made and opinions expressed, unless specifically described otherwise, pertain only to the participants and their responses to the Deloitte poll. The information obtained during the poll was taken “as is” and was not validated or confirmed by Deloitte. 4200+ EU General Data Protection Regulation: Practical steps for compliance 2
  • 3. Copyright © 2019 Deloitte Development LLC. All rights reserved. 3The Internet of Things and cybersecurity: A secure-by-design approach IoT and cybersecurity: A secure-by-design approach Very confident 18% Somewhat confident 51% Uncertain, or somewhat not confident 23% Not confident at all 8% How confident are you that your organization’s connected products, devices, or other “things” are secure today? Results reflect 3,221 responses
  • 4. Copyright © 2019 Deloitte Development LLC. All rights reserved. 4The Internet of Things and cybersecurity: A secure-by-design approach Research and development 7% Information security 81% Manufacturing organization 5% Product cybersecurity 7% Who is accountable for the securing of connected products in your organization? Results reflect 3,062 responses IoT and cybersecurity: A secure-by-design approach
  • 5. Copyright © 2019 Deloitte Development LLC. All rights reserved. 5The Internet of Things and cybersecurity: A secure-by-design approach Do you have a defined set of product cybersecurity requirements that product teams use as input for requirements selection? Yes, we use an industry defined framework, 28% Yes, we have a custom framework, 51% No, 31% Results reflect 2,007 responses IoT and cybersecurity: A secure-by-design approach
  • 6. Copyright © 2019 Deloitte Development LLC. All rights reserved. 6The Internet of Things and cybersecurity: A secure-by-design approach What sources of guidance do you use to drive security by design? Industry and professional organizations that help to set the guidelines, 41% Regulatory bodies and agencies that set the standards, 28% Leading practices developed internally, 22% Other, 9% Results reflect 2,705 responses IoT and cybersecurity: A secure-by-design approach
  • 7. Copyright © 2019 Deloitte Development LLC. All rights reserved. 7The Internet of Things and cybersecurity: A secure-by-design approach Where do you believe your greatest strengths are in developing or deploying secure-by-design connected products and/or devices? DevSecOps embedded throughout the design/acquisition, implementation, and deployment lifecycle, 11% Cross-functional technology, legal, procurement, and compliance teaming across pre- and post- market deployments, 27% Both of the above, 48% None of the above, 14% Results reflect 1,812 responses IoT and cybersecurity: A secure-by-design approach
  • 8. Copyright © 2019 Deloitte Development LLC. All rights reserved. 8The Internet of Things and cybersecurity: A secure-by-design approach Top 10 cyber and privacy risks in the IoT world Not having a security and privacy program 02 01 03 Lack of ownership/ governance to drive security and privacy Security not being incorporated into the design or products and ecosystems Insufficient security awareness and training for engineers and architects04 05 Lack of IoT and product security and privacy resources Insufficient monitoring of devices and systems to detect security events 07 06 08 Lack of post-market/ implementation security and privacy risk management Lack of visibility of products without having a full product inventory. Identifying and treating risks of fielded and legacy devices/products09 10 Inexperienced/immature incident response processes
  • 9. Copyright © 2019 Deloitte Development LLC. All rights reserved. 9The Internet of Things and cybersecurity: A secure-by-design approach Media contact Nicole Hockin Public Relations Deloitte & Touche LLP nhockin@deloitte.com Full press release available on Deloitte.com 8
  • 10. Copyright © 2019 Deloitte Development LLC. All rights reserved. 10The Internet of Things and cybersecurity: A secure-by-design approach This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation.
  • 11. About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the “Deloitte” name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms. Copyright © 2019 Deloitte Development LLC. All rights reserved.