Skip to main content

Cyber Security

With the proliferation of Internet-enabled devices, cyber culture is growing more rapidly than cyber security. Everything that depends on cyberspace is potentially at risk.

Private data, intellectual property, cyber infrastructure, and even military and national security can be compromised by deliberate attacks, inadvertent security lapses, and the vulnerabilities of a relatively immature, unregulated global Internet. Working hand-in-hand with member firm clients, Deloitte helps organizations plan and execute an integrated cyber approach to harness the power of information networks to enhance business operations, increase mission performance, and improve customer support, without compromising security or privacy.

Deloitte Touche Tohmatsu Limited (DTTL) is pleased to announce that Kennedy Consulting Research and Advisory, a leading analyst firm, has named Deloitte a global leader in cyber security consulting.

Kennedy’s recently released report, entitled Cyber Security Consulting 2013, addresses clients’ increasing need to seek help from consulting firms to guide them through the complexities of cyber security. As such, the report provides an assessment of cyber security consulting providers in terms of the relative breadth and depth of their cyber security consulting capabilities.

The imperative to be secure, vigilant and resilient

Most reports on cyber security revolve around a common theme: despite heightened attention and unprecedented levels of security investment, the number of cyber incidents — and their associated costs — continues to rise. They typically point to the growing sophistication of hackers and other adversaries as a particularly intractable problem and some deliberate over whether being secure is even possible in today’s rapidly evolving landscape of cyber attacks. Important questions, though, remain unaddressed. In particular: what are the underlying reasons for this trend and how can organizations actually reverse it to start winning the cyber risk battle?

Enterprises have to go on the offense to protect themselves from a rising tide of cyber crime. Collective intelligence and human judgment supported by advanced security analytics can help.

As personal, commercial, and government activities continue to migrate to the digital realm, so do criminals. Large-scale cyber attacks are becoming more frequent and more costly for businesses in the United States. Attackers are better funded, more sophisticated, and better organized than in the past, often representing criminal networks or states. Dozens of US banks have suffered cyber attacks over the last year at the hands of foreign attackers.

As enterprises and government agencies increasingly adopt cloud, mobile, and social computing, information technology (IT) environments are becoming more difficult to defend. Increasingly, organizations need to accept that security breaches are inevitable.

Perspectives of Health Care Information Security Executives

Networked medical devices and other mobile health (mHealth) technologies are a double-edged sword: They have the potential to play a transformational role in health care but also may be a vehicle that exposes patients and health care providers to safety and cybersecurity risks such as being hacked, being infected with malware and being vulnerable to unauthorized access.

Patient safety issues—injury or death—related to networked medical device security vulnerabilities are a critical concern; compromised medical devices also could be used to attack other portions of an organization’s network.

The world and the environment in which decisions are made are experiencing profound transformations. Consequently, new risks appear, old ones are changing - and the ability to cleverly understand and manage risks will be crucial.

Thus, one year after the last governance, risk management & compliance edition of Inside, this first issue of 2015 points out key topics in these areas. It focuses on the roles and challenges of Boards of Directors, Board Committees, Chief Risk Officers, Chief Information Security Officers, Chief Compliance Officers and Chief Internal Auditors. We hope you will find this publication insightful.

 

Inside magazine Issue 7 - Download the report