Deloitte Future of Cyber ​​attacks due to digital transformation

Η Deloitte he published the world fair"Future of Cyber”Of 2021, in which approximately 600 high-ranking officials participated (C-Level) executives they have στις λειτουργίες κυβερνοασφάλειας των οργανισμών τους.

The goal of the report is to bring to the fore the discussion around the implementation of cybersecurity measures at the core of every business, as well as to offer useful information regarding how organizations can increase the visibility of complex technological ecosystems, but also apply best practices to to prepare for the future pro of cyberspace.inet

Her research Deloitte showed that 69% of global business leaders surveyed noted that their businesses experienced a significant increase in cyber attacks last year, amid accelerating the digital transformation.

Ωστόσο, την ίδια στιγμή που οι αυξάνονται, οι ηγέτες σχεδιάζουν σημαντικές επενδύσεις στον ψηφιακό μετασχηματισμό. Συγκεκριμένα, σχεδόν καθολική είναι η στρατηγική των επικεφαλής των οικονομικών επιτελείων προς αυτή την κατεύθυνση, με το 94% να δηλώνει ότι σκοπεύει να μεταφέρει τα financial information systems in an environment cloud. In fact, according to her research Deloitte, while there are no simple solutions, the simultaneous adoption of a series of measures can help a business to implement cybersecurity in every aspect of its operation.

According to Emily Mossburg, Global enviroment Cyber leaders of Deloitte, businesses are working hard this year to stay competitive amid rapid technological change as the acceleration of the digital transformation has drastically increased their vulnerability to cyber attacks.

She notes that as complexities increase, leaders must prioritize the implementation of cybersecurity in every aspect of business, otherwise they run the risk of suffering the consequences of inadequate protection.

Digital transformation reinforces the need for a cybersecurity strategy

With more than half of businesses experiencing an increase in threats by 2020, the risks are higher than ever, as the adoption of remote and hybrid work models is increasingly applied to businesses around the world. Organizations continue to face challenges in balancing investments in digital transformation to stay competitive and protect their systems from potential attacks. Responding to her research Deloitte, the heads of IT Departments (CIOs) and Security (CISOS), 41% recognize that the biggest challenge they face is transforming and gaining visibility into increasingly complex hybrid ecosystems.

The wave of "Zero Trust"

As its global research shows Deloitte, the points that are the biggest challenges in terms of cyber risk management are hybrid IT technologies at a rate of 41% and cyber-hygiene (cyber hygiene) at a rate of 26%. Therefore, companies use the practice of Zero Trust (Zero Trust), ie an architecture based on the fundamental principle of "never trust, always confirm", in order to bridge the gap between business, information technology and cyberspace. Thus, the reduction of the operational complexity and the simplification of the integration of different ecosystems are achieved. Businesses that take advantage of the "Zero Trust" principle are leading the way in organizational change to achieve digital transformation by building security infrastructure with which they can handle the speed of that transformation.

Investing in cybersecurity means investing in information systems security (CISO)

Με τους κυβερνοεγκληματίες να γίνονται ολοένα και πιο ικανοί, οι επιχειρήσεις τείνουν να αυξάνουν τους προϋπολογισμούς τους για την κυβερνοασφάλεια. Σχεδόν το 75% των συμμετεχόντων ηγετών με πάνω από 30 δισ. δολάρια σε κέρδη συνολικά, δήλωσαν ότι θα επενδύσουν περισσότερα από 100 εκ. δολάρια στην κυβερνοασφάλεια φέτος. Ενώ αυτές οι επενδύσεις μοιράζονται σχετικά ισορροπημένα, η έρευνα κατέδειξε ότι μεγαλύτερη προσοχή δίνεται σε ζητήματα ανίχνευσης και ς απειλών, μετασχηματισμού του κυβερνοχώρου και προστασίας δεδομένων.

Converging technological capabilities and increasing cyber threats are changing the role of information security leaders. As technology is increasingly being integrated into business operations on a daily basis, the responsibilities of managers are being strengthened. According to her research Deloitte, there is an increase in the direct reporting of information security chiefs (CISOS) to business leaders (CEOs) from 32% in 2019 to 42% in 2021 in the US, while reaching 33% worldwide. This trend enhances the transparency of business initiatives and commitment at many levels, especially at C-Level, which is critical to tackling cyber threats and creating authentic and secure customer experiences.

Research shows that within the next three years CIOs and CISOS will continue to prioritize cybersecurity, with 64% prioritizing security capabilities, 59% enhancing privacy, 50% compliance, and 45% improving operational efficiency and information as the main reasons for adopting new technologies.

The research methodology

It is noted that in the 2021 survey Future of Cyber which was held by Deloitte Global enviroment and Wakefield Research, almost 600 executives participated C-Level asked about cybersecurity in companies with at least $ 500 million in annual profits, including nearly $ 200 million CISOS, 100 CIOs, 100 CFOs and 100 CMOs. The survey was conducted online between June 6 and August 24, 2021.

You can visit the following link for its full results Deloitte Global enviroment's 2021 Future of Cyber Survey, www.deloitte.com/futureofcyber

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.
Deloitte, iguru

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).