SlideShare a Scribd company logo
1 of 24
Download to read offline
Future of Cyber
March 28, 2019
Future of Cyber
Copyright © 2019 Deloitte Development LLC. All rights reserved. 3
Cyber and the challenge of digital transformation
Top ranked cyber transformation initiatives for the next 12 months
Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte
Development LLC. See www2.deloitte.com/us/cyber
Copyright © 2019 Deloitte Development LLC. All rights reserved. 4
Most challenging aspects of cybersecurity management across enterprise infrastructure
Cyber and the challenge of digital transformation
Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte
Development LLC. See www2.deloitte.com/us/cyber
Chief
Information Security
Officers
Chief
Technology
Officers
Chief
Risk
Officers
Chief
Security
Officers
Chief
Information
Officers
Copyright © 2019 Deloitte Development LLC. All rights reserved. 5
Organizations’ cyber budget is somewhat evenly
spread to broadly protect them from risks
How cybersecurity organizations spend their $$$
Percentage of cyber budget allocated
to digital transformation
Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte
Development LLC. See www2.deloitte.com/us/cyber
Copyright © 2019 Deloitte Development LLC. All rights reserved. 6
Most challenging aspects of cybersecurity
management across the organization
The enterprise challenges of cybersecurity management
Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte
Development LLC. See www2.deloitte.com/us/cyber
Copyright © 2019 Deloitte Development LLC. All rights reserved. 7
Frequency cybersecurity issues are on the board’s agenda
Cyber needs leaders with the authority to drive change
Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte
Development LLC. See www2.deloitte.com/us/cyber
Chief
Information Security
Officers
Chief
Technology
Officers
Chief
Risk
Officers
Chief
Security
Officers
Chief
Information
Officers
Copyright © 2019 Deloitte Development LLC. All rights reserved. 8
It takes a village: creating a cyber team
Outsourced cybersecurity operations
Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte
Development LLC. See www2.deloitte.com/us/cyber
Chief
Information Security
Officers
Chief
Technology
Officers
Chief
Risk
Officers
Chief
Security
Officers
Chief
Information
Officers
Copyright © 2019 Deloitte Development LLC. All rights reserved. 9
Cybersecurity functions outsources to third parties
It takes a village: creating a cyber team
Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte
Development LLC. See www2.deloitte.com/us/cyber
Copyright © 2019 Deloitte Development LLC. All rights reserved. 10
Strategizing for perpetual resilience
Timing of most recent cyber incident
or breach among total participants
Biggest impacts of cyber incidents or
breaches on organizations
Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte
Development LLC. See www2.deloitte.com/us/cyber
Copyright © 2019 Deloitte Development LLC. All rights reserved. 11
Strategizing for perpetual resilience
Methods for reviewing and testing cyber incident response process and procedures
Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte
Development LLC. See www2.deloitte.com/us/cyber
Chief Information
Security Officers
Chief Technology
Officers
Chief Risk
Officers
Chief Information
Officers
Chief Security
Officers
Enterprises in the Era of Cyber Everywhere
Information Technology Operational Technology
Innovation
ICS YIR 2018: Threat Activity Groups
New ActivityNew Activity Group
Copyright © 2017 Deloitte Development LLC. All rights reserved. 14
Key Considerations for
Executives
• How do we know if we’re
underspending or
overspending on ICS
cybersecurity?
• What is the best thing we can
do to get started that will help
move us forward?
• If a major attack happens,
what is the role of the
government?
Copyright © 2017 Deloitte Development LLC. All rights reserved. 15
Are We
Underspending or
Overspending?
Copyright © 2017 Deloitte Development LLC. All rights reserved. 16
• Organizations are
underspending on
industrial/OT
cybersecurity, because it
has largely not been
considered part of the
overarching
cybersecurity strategy
Are We
Underspending or
Overspending?
What is the best way
to move forward?
What is the best way
to move forward?
• Boards should ask
security teams to
create tabletop
exercises that
include them at
some point
Copyright © 2017 Deloitte Development LLC. All rights reserved. 19
What is the role of
the government?
Copyright © 2017 Deloitte Development LLC. All rights reserved. 20
What is the role of
the government?
• Government agencies
play certain roles, but
boards should have
points of contact at each
government agency and
ensure written
communication
Key recommendations for industrial organizations
1. Ensure investment into industrial and operations networks are
appropriate for risks
2. Understand the threat landscape
3. Seek top to bottom understanding of requirements
4. Utilize threat hunting and tabletop exercises to bring together
security and operations teams
5. Don’t expect enterprise security teams to cover missions
without adding new resources for them
Executive Insights Into Industrial Cybersecurity Strategies
Dragos 2018 Year in Review
https://dragos.com/year-in-review/
Copyright © 2019 Deloitte Development LLC. All rights reserved.
What does the future hold?
The future of cyber survey 2019
Cyber everywhere. Succeed anywhere.
www.deloitte.com/us/cyber
Executive insights
About Deloitte
This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a
substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should
consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation.
As used in this presentation, “Deloitte” means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of our legal structure. Certain services may not be available to attest
clients under the rules and regulations of public accounting.
Copyright © 2019 Deloitte Development LLC. All rights reserved.

More Related Content

More from Dragos, Inc.

Securing Electric Utility Infrastructure
Securing Electric Utility InfrastructureSecuring Electric Utility Infrastructure
Securing Electric Utility InfrastructureDragos, Inc.
 
Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Dragos, Inc.
 
Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction Dragos, Inc.
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDragos, Inc.
 
Consequence Informed Cyber Security
Consequence Informed Cyber Security Consequence Informed Cyber Security
Consequence Informed Cyber Security Dragos, Inc.
 
Dragos year in review (yir) 2018
Dragos year in review (yir) 2018Dragos year in review (yir) 2018
Dragos year in review (yir) 2018Dragos, Inc.
 
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...Dragos, Inc.
 
2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity Groups2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity GroupsDragos, Inc.
 
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...Dragos, Inc.
 
The Current ICS Threat Landscape
The Current ICS Threat LandscapeThe Current ICS Threat Landscape
The Current ICS Threat LandscapeDragos, Inc.
 
Industrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology SelectionIndustrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology SelectionDragos, Inc.
 
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks  Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks Dragos, Inc.
 
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityHow Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityDragos, Inc.
 
Debunking the Hacker Hype: The Reality of Widespread Blackouts
Debunking the Hacker Hype: The Reality of Widespread BlackoutsDebunking the Hacker Hype: The Reality of Widespread Blackouts
Debunking the Hacker Hype: The Reality of Widespread BlackoutsDragos, Inc.
 
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors Dragos, Inc.
 
PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019Dragos, Inc.
 
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeMeet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeDragos, Inc.
 
Threat Activity Groups - Dragos
Threat Activity Groups - Dragos Threat Activity Groups - Dragos
Threat Activity Groups - Dragos Dragos, Inc.
 
The Four Types of Threat Detection and Use Cases in Industrial Security
The Four Types of Threat Detection and Use Cases in Industrial SecurityThe Four Types of Threat Detection and Use Cases in Industrial Security
The Four Types of Threat Detection and Use Cases in Industrial SecurityDragos, Inc.
 
TRISIS in Perspective
TRISIS in PerspectiveTRISIS in Perspective
TRISIS in PerspectiveDragos, Inc.
 

More from Dragos, Inc. (20)

Securing Electric Utility Infrastructure
Securing Electric Utility InfrastructureSecuring Electric Utility Infrastructure
Securing Electric Utility Infrastructure
 
Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response
 
Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
 
Consequence Informed Cyber Security
Consequence Informed Cyber Security Consequence Informed Cyber Security
Consequence Informed Cyber Security
 
Dragos year in review (yir) 2018
Dragos year in review (yir) 2018Dragos year in review (yir) 2018
Dragos year in review (yir) 2018
 
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
 
2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity Groups2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity Groups
 
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
 
The Current ICS Threat Landscape
The Current ICS Threat LandscapeThe Current ICS Threat Landscape
The Current ICS Threat Landscape
 
Industrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology SelectionIndustrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology Selection
 
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks  Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
 
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityHow Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
 
Debunking the Hacker Hype: The Reality of Widespread Blackouts
Debunking the Hacker Hype: The Reality of Widespread BlackoutsDebunking the Hacker Hype: The Reality of Widespread Blackouts
Debunking the Hacker Hype: The Reality of Widespread Blackouts
 
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
 
PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019
 
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeMeet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
 
Threat Activity Groups - Dragos
Threat Activity Groups - Dragos Threat Activity Groups - Dragos
Threat Activity Groups - Dragos
 
The Four Types of Threat Detection and Use Cases in Industrial Security
The Four Types of Threat Detection and Use Cases in Industrial SecurityThe Four Types of Threat Detection and Use Cases in Industrial Security
The Four Types of Threat Detection and Use Cases in Industrial Security
 
TRISIS in Perspective
TRISIS in PerspectiveTRISIS in Perspective
TRISIS in Perspective
 

Recently uploaded

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Future of Cyber: Deloitte Survey, Dragos Exec Insights

  • 3. Copyright © 2019 Deloitte Development LLC. All rights reserved. 3 Cyber and the challenge of digital transformation Top ranked cyber transformation initiatives for the next 12 months Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte Development LLC. See www2.deloitte.com/us/cyber
  • 4. Copyright © 2019 Deloitte Development LLC. All rights reserved. 4 Most challenging aspects of cybersecurity management across enterprise infrastructure Cyber and the challenge of digital transformation Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte Development LLC. See www2.deloitte.com/us/cyber Chief Information Security Officers Chief Technology Officers Chief Risk Officers Chief Security Officers Chief Information Officers
  • 5. Copyright © 2019 Deloitte Development LLC. All rights reserved. 5 Organizations’ cyber budget is somewhat evenly spread to broadly protect them from risks How cybersecurity organizations spend their $$$ Percentage of cyber budget allocated to digital transformation Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte Development LLC. See www2.deloitte.com/us/cyber
  • 6. Copyright © 2019 Deloitte Development LLC. All rights reserved. 6 Most challenging aspects of cybersecurity management across the organization The enterprise challenges of cybersecurity management Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte Development LLC. See www2.deloitte.com/us/cyber
  • 7. Copyright © 2019 Deloitte Development LLC. All rights reserved. 7 Frequency cybersecurity issues are on the board’s agenda Cyber needs leaders with the authority to drive change Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte Development LLC. See www2.deloitte.com/us/cyber Chief Information Security Officers Chief Technology Officers Chief Risk Officers Chief Security Officers Chief Information Officers
  • 8. Copyright © 2019 Deloitte Development LLC. All rights reserved. 8 It takes a village: creating a cyber team Outsourced cybersecurity operations Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte Development LLC. See www2.deloitte.com/us/cyber Chief Information Security Officers Chief Technology Officers Chief Risk Officers Chief Security Officers Chief Information Officers
  • 9. Copyright © 2019 Deloitte Development LLC. All rights reserved. 9 Cybersecurity functions outsources to third parties It takes a village: creating a cyber team Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte Development LLC. See www2.deloitte.com/us/cyber
  • 10. Copyright © 2019 Deloitte Development LLC. All rights reserved. 10 Strategizing for perpetual resilience Timing of most recent cyber incident or breach among total participants Biggest impacts of cyber incidents or breaches on organizations Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte Development LLC. See www2.deloitte.com/us/cyber
  • 11. Copyright © 2019 Deloitte Development LLC. All rights reserved. 11 Strategizing for perpetual resilience Methods for reviewing and testing cyber incident response process and procedures Source: The future of cyber survey 2019 | Cyber everywhere. Succeed anywhere. Deloitte Development LLC. See www2.deloitte.com/us/cyber Chief Information Security Officers Chief Technology Officers Chief Risk Officers Chief Information Officers Chief Security Officers
  • 12. Enterprises in the Era of Cyber Everywhere Information Technology Operational Technology Innovation
  • 13. ICS YIR 2018: Threat Activity Groups New ActivityNew Activity Group
  • 14. Copyright © 2017 Deloitte Development LLC. All rights reserved. 14 Key Considerations for Executives • How do we know if we’re underspending or overspending on ICS cybersecurity? • What is the best thing we can do to get started that will help move us forward? • If a major attack happens, what is the role of the government?
  • 15. Copyright © 2017 Deloitte Development LLC. All rights reserved. 15 Are We Underspending or Overspending?
  • 16. Copyright © 2017 Deloitte Development LLC. All rights reserved. 16 • Organizations are underspending on industrial/OT cybersecurity, because it has largely not been considered part of the overarching cybersecurity strategy Are We Underspending or Overspending?
  • 17. What is the best way to move forward?
  • 18. What is the best way to move forward? • Boards should ask security teams to create tabletop exercises that include them at some point
  • 19. Copyright © 2017 Deloitte Development LLC. All rights reserved. 19 What is the role of the government?
  • 20. Copyright © 2017 Deloitte Development LLC. All rights reserved. 20 What is the role of the government? • Government agencies play certain roles, but boards should have points of contact at each government agency and ensure written communication
  • 21. Key recommendations for industrial organizations 1. Ensure investment into industrial and operations networks are appropriate for risks 2. Understand the threat landscape 3. Seek top to bottom understanding of requirements 4. Utilize threat hunting and tabletop exercises to bring together security and operations teams 5. Don’t expect enterprise security teams to cover missions without adding new resources for them
  • 22. Executive Insights Into Industrial Cybersecurity Strategies Dragos 2018 Year in Review https://dragos.com/year-in-review/
  • 23. Copyright © 2019 Deloitte Development LLC. All rights reserved. What does the future hold? The future of cyber survey 2019 Cyber everywhere. Succeed anywhere. www.deloitte.com/us/cyber Executive insights
  • 24. About Deloitte This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation. As used in this presentation, “Deloitte” means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of our legal structure. Certain services may not be available to attest clients under the rules and regulations of public accounting. Copyright © 2019 Deloitte Development LLC. All rights reserved.