This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.

Bookmark Print page


When a cyber incident occurs the response must be fast, thorough and decisive. Immediate action is required on several fronts. The nature of the incident must be established and the losses and damage understood. Further attacks must be prevented by urgent action, while a longer-term solution is found.   Respond

How Deloitte can help

Deloitte’s cyber response services have been designed to provide organisations with access to the skills, experience and knowledge that are needed during times of crisis.

We work with a number of high profile organisations affected by incidents to help them manage their response, investigate and understand the root causes behind their incidents and put remediation plans in place.

Cyber incident response: Effective cyber incident response requires flexibility and the ability to make proactive decisions, often with limited intelligence. Deloitte’s ability to draw upon a broad range of in-house specialists allows us to provide incident response services along with investigation and remediation to help steer organisations through cyber incidents.

Our specialist team is able to deal with the full spectrum of incidents that can affect your organisation:

Advanced targeted attacks Advanced targeted attacks
Targeted attack from nation state or other credible organisation with an intention to exfiltrate corporate data.
Improper usage Improper usage
Any incident resulting from violation of an organisation’s acceptable usage policies by an authorised user.
Malicious code Malicious code
Successful installation of malicious software that infects an operating system or application.
Loss or theft of equipment Loss or theft of equipment
The loss or theft of a computing device or media used by the organisation.
Attrition Attrition
An attack that employs brute force methods to compromise, degrade, or destroy systems, networks, or services.
Unauthorised access Unauthorised access
An individual gains logical or physical access without permission to a network, system, application, data, or other resource.


Key Contact

  • James Nunn-Price
    Cyber Lead, UK
    +44 20 7303 8708
  • Nick O’Kelly
    Senior Manager
    +44 20 7007 0136

Victim of cyber attack?

For immediate assistance contact our cyber incident response team on:

+44 207 007 9660 or email

Useful downloads

Fast, thorough and decisive Fast, thorough and decisive
Learn more about our approach to cyber incident response.

Related Insights

Cyber hype and the boardroom bubble   Cyber hype and the boardroom bubble
Read our latest cyber blog.
  Top priority for CEOs
Chief executives encouraged to commit to Principles for Cyber Resilience.
  What you don’t know could hurt you
A company’s approach to cyber security can give insights on its cyber risk management strengths and weaknesses.
  Questions on managing risk
Answers to five questions about actions company’s should take to manage and mitigate cyber risk.


Share this page

Email this Send to LinkedIn Send to Facebook Tweet this More sharing options

Get in touch

More on Deloitte