This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.

Bookmark Print page

IT risks and security challenges

A series of Deloitte perspectives as published in the Wall Street Journal.

Read more on the following topics

Cyber Security in a borderless world
Three prevalent technologies - social media, mobile devices, and cloud computing - substantially expand the attack surface of your enterprise.

Rapid adoption of social media, mobile devices and cloud computing has expanded the traditional borders of the enterprise- creating new entry points for cyber attacks.

Cyber Security in a borderless world

Making the real case for cyber security
How to talk to senior executive about the realities of the evolving cyber security landscape.

Despite increasing attention to security in the press and the boardroom, the security capabilities in many companies have not kept pace with a rapidly changing world.

Making the real case for cyber security

IT literacy in the boardroom
Boards of directors need a clearly defined approach to understanding and actively governing the enterprise IT operations under their purview.

Until recently, IT was not an area of focus for most boards of directors. Increasingly, however, many directors view IT as being crucial to their companies.

IT literacy in the boardroom

Is your IT security approach due for a refresh?
Update traditional security measures to address today’s threats.

Three broad practices form the foundation of most IT security strategies: access management, software vulnerability management, and personally identifiable information (PII) management.

Is your IT security approach due for a refresh?

What you don’t know could hurt you
To assess exposure to cyber threats, companies need to go beyond generalities and focus on specific questions about security practices.

Could it happen to us? Alarmed by an uptick in cyber attacks on high-profile businesses, may boards of directors are asking their CIOs and CISOs just that question.

What you don’t know could hurt you

Cyber intelligence today: proactive and predictive
IT leaders and business executives need to understand how the critical discipline of cyber intelligence is evolving.

Individual cyber intelligence capabilities have been applied for decades, some since the earliest days of IT system design.

Cyber intelligence today: proactive and predictive

The technology blocks of cyber intelligence
Organisations should establish the technological foundation that enables them to take a proactive stance against cyber threats.

Cyber intelligence is as dependent on the underlying technology as it is on governance and organizational change.

The technology blocks of cyber intelligence

Getting smart about cyber intelligence
Protecting vital information assets demands a broad approach to cyber intelligence.

In recent years, IT security and privacy concerns have graduated from the IT department to C-suites and boardrooms.

Getting smart about cyber intelligence

Cyber espionage: A proactive approach to cyber security
To mitigate the risks of advanced cyber threats, organizations should enhance their capabilities to proactively gather intelligence and monitor and remediate vulnerabilities.

Many organizations are still using a reactive, defensive posture to address cyber security incidents.

Cyber espionage: A proactive approach to cyber security

Cyber espionage: The harsh reality of advanced security threats
Many organizations are unprepared to protect themselves against the latest generation of automated cyber attacks. Is yours?

Legend has it that ostriches bury their heads in sand to avoid danger - the belief is that if I cannot see peril, it cannot see me. For decades, some businesses have been operating as though they were ostriches with respect to cyber threats, burying their heads in a protective sand of compliance requirements and safe practice regulations.

Cyber espionage: The harsh reality of advanced security threats<br /> Many organizations are unprepared to protect themselves against the latest generation of automated cyber attacks. Is yours?

Cyber espionage: Playing defence with employees
Organizations can go beyond background checks to address the cyber risks stemming from their employees’ behaviour, both intentional and unwitting.

When it comes to cyber security, employees can be your frontline of defence or your biggest threat, sometimes without even realizing it. Checks to address the cyber risks stemming from their employees’ behaviour, both intentional and unwitting.

Cyber espionage: Playing defence with employees

What’s different about the “Capability Cloud”?
The “capability cloud” is significantly improving the acquisition, implementation, and management of IT services for the business.

“Cloud computing” is continuously growing and maturing - in the adoption and sophistication of offerings and the vendor landscape. Recently, the adoption of the “capability cloud” - through which deployments move from improving capacity to enabling business capabilities - has demonstrated the substantial disruptive potential of this technology.

What’s different about the “Capability Cloud”?

Capturing the potential of the capability cloud
As the cloud market evolves from capacity to capabilities and beyond, companies are increasingly obtaining services that directly address business objectives and enterprise goals.

In the recent cloud past, the IT crowd was enamoured primarily by “as-a-service” cloud concepts that unleashed the power of distributed computing, virtualization, and ubiquitous networking.

Capturing the potential of the capability cloud

Risk intelligent governance: A profile of maturity
A “maturity” assessment can help your organization understand its capabilities for managing and mitigating the ever-present risk posed by cyber threats.

How effective is your company at keeping its exposure to cyber threats within acceptable limits? CIOs and chief information security officers (CISOs) can expect business leaders to be asking them precisely that question as cyber attacks become increasingly common and sophisticated.

Risk intelligent governance: A profile of maturity

Risk intelligent governance: Controlling software and information sharing
How well prepared is your organization to address cyber threat vulnerabilities relating to the software running on devices and the information shared by employees?

Because cyber threats are both relatively new and constantly evolving, many organizations may not be as effective at managing  cyber threat risks as they are at managing risk in other areas.

Risk intelligent governance: Controlling software and information sharing

Risk intelligent governance: Tracking outbound information and logins
Is your enterprise prepared to address cyber threats relating to outbound digital information and logins to the organisation’s systems?

In this article, we cover tracking two critical vulnerabilities: the digital information that leaves the organization and who is logging  onto the organization’s systems.

Risk intelligent governance: Tracking outbound information and logins

5 mobile security mistakes IT organizations make
In an effort to balance the needs of mobile business users with security imperatives, IT departments sometimes make mistakes.

In study after study, IT professionals cite security and data privacy concerns as the top inhibitor to mobile adoption. Their apprehensions about mobile devices and mobile access to corporate systems are justified because the risks are real.

5 mobile security mistakes IT organizations make

Aligning enterprise mobility goals with solutions
Let the business and technology objectives of your mobility plan drive your approach.

Providing employees with powerful mobile devices allows them to be productive from anywhere and may allow for innovative, or potentially even disruptive, ways of doing business.

Aligning enterprise mobility goals with solutions

Considerations for BYOD programs
The decision to allow employees to bring their own mobile devices into the enterprise needs to be made with care.

Mobile devices such as smartphones, tablets, and e-readers have become so portable, powerful, connected and user-friendly that they have penetrated every facet of our personal and professional lives. Almost any application imaginable can be developed on, or accessed from, a mobile device.

Considerations for BYOD programs

The changing landscape of digital identity management
Digital identity management has been around for decades, but today’s challenges - and solutions - have become increasingly complex.

Executives of enterprises large and small face the same challenges of managing and securing identities. The swift proliferation of digital identities, increased regulatory requirements, and heightened corporate fraud and security risks are creating the need for enhanced management capabilities.

The changing landscape of digital identity management

The security agenda for digital identities
Harry D. Raduege, Jr., chairman of the Deloitte Centre for Cyber Innovation, discusses three priorities for managing and securing digital identities.

Leaders today, both in government and industry, have a growing recognition that managing security is about managing risk. Every month, their digital-age organizations face billions of attacks from infiltrators seeking to manipulate, steal, deface, or shut down networks.

The security agenda for digital identities

The Power of One: Moving toward a unified digital identity
Managing digital identities isn’t just a security issue - it’s also a smart business move.

Our digital identities are becoming increasingly complex. Not so long ago, an individual’s entire digital presence existed almost exclusively at work, and he or she was identified by a single user name. As enterprise technology expanded to include new tools and platforms, the number of digital identities grew.

The Power of One: Moving toward a unified digital identity

Secure digital assets ahead of new privacy
Setting standards now to provide transparency, assess and mitigate risk, and confirm compliance may protect the business model and stave off competitors.

A growing number of companies have created valuable business models through  buying, collecting,  and aggregating huge amounts of personal data, or mining their own databases for insights into their customers’ behaviours. For some companies, these databases may well be their most valuable asset.

Secure digital assets ahead of new privacy

Key contacts

Mike Maddison Mike Maddison
Head of Cyber Security,
EMEA Partner
+44 20 7303 0017
mmaddison@deloitte.co.uk
   
James Nunn-Price James Nunn-Price
Cyber Lead,
UK Partner
+44 20 7303 8708
jnunnprice@deloitte.co.uk

 

Related insights

  • Cyber Security. Evolved.
    Learn more about how you can improve your cyber security strategy.
  • Hot topics
    Get the latest insights on cyber threats and security issues.

Share this page

Email this Send to LinkedIn Send to Facebook Tweet this More sharing options
Follow:

Get in touch

More on Deloitte