Global Future of Cyber Survey 2023 - Deloitte
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
2023 Global Future of Cyber Survey Building long-term value by putting cyber at the heart of the business
2 The answer is cyber Today, we are seeing the emergence of powerful new attitudes when it comes to cyber. Leaders are looking at cyber through a sharp, new lens—one that reveals the inherent business value that can come by embedding cyber. Not only across the enterprise, but as a crucial part of a powerful growth strategy. No longer just an obligation or a collection of tech- We are excited about the future of cyber, and I focused hygiene practices, cyber has grown into invite you to join us in exploring some of the key a critical function for helping businesses deliver findings in this report. In addition to data derived outcomes, and the results of Deloitte’s 2023 Future from the survey results, the report also includes of Cyber Survey illuminate this. This year’s global observations and insights taken directly from survey—Deloitte’s largest cyber survey to date— survey respondents, as well as additional Deloitte polled leaders across industries in order to get a insights on cyber, cloud, and other technologies clearer picture of where cyber stands and where it is enabling the future of business. going. What we discovered is that cyber’s profile as an enabler is growing. Among organizations of all sizes, Stay well, cyber is consistently earning a place on the agenda, becoming a focal point for business-critical initiatives and investment. Emily Mossburg, Deloitte Global Cyber Leader
3 What’s inside 1 View from the top Cyber beyond 4 5 Why maturity matters Understanding what it means to be cyber mature 14 2 Methodology How we developed the insights 7 Connecting maturity to value, for the entire enterprise 15 3 The imperative The future is cyber 8 Key insights 20 4 Historical perspective 6 Outlook So where do we go from here? 24 Looking at how the landscape has evolved 9 The role of cyber 11 7 Conclusion Onward 26
VIEW FROM THE TOP 4 Cyber is evolving into a distinct functional area of the Cyber beyond business, transcending its traditional IT roots and becoming an essential part of the framework for Building long-term value by putting cyber at the heart of the business delivering business outcomes. The future of cyber is coming into sharper focus as Today, a new reality is taking shape, based on Deloitte’s organizations worldwide begin to look beyond the 2023 Global Future of Cyber Survey, which asked tech-centric and threat focus toward the potential hundreds of leaders across industries and across the positive outcomes they can achieve by deeply globe to share their views on cyber threats, enterprise integrating cyber thinking and cyber actions across activities, and the future. The survey included C-suite their businesses. executives across the enterprise, as well as other senior leaders with responsibility for IT, security, and risk. This The world is increasingly interconnected, bringing new reality is grounded by the following findings. about new risks alongside the new growth opportunities. Digital technologies, exponential Cyber is evolving into a distinct functional area of the growth of data, and evolving business needs are business, transcending its traditional IT roots and expanding attack threat surfaces and bringing new becoming an essential part of the framework for challenges that elevate cyber as a strategic business delivering business outcomes. issue. Collaboration across cyber, risk management, and business units is critical to neutralizing Relationship transformation cyberthreats, protecting business value, and “W e’re starting to see a far more significant focus sustaining customer trust. on cybersecurity as an enterprise business risk. Across the organization, there is a significant shift In recent years, many enterprise leaders were in partnership in viewing cybersecurity as a core focusing on the continued transition to digital ingredient of our transformation and not a side business processes, as well as their technology garnish or afterthought. We’re doing a lot in terms environments and the rapid evolution of the cyber of embedding cyber—whether it’s DevSecOps or threat landscape. In fact, managing hybrid IT and in product development—where we’re starting digital transformation have emerged as two of the to co-create with the (internal) partners to make greatest challenges businesses face—solidifying sure that we’re building things securely. It’s like complexity as the new norm for the enterprise.1 cultural transformation.” —Allan Cockriel, Group CIO/CISO, Shell
VIEW FROM THE TOP 5 Organizations increasingly recognize Looking ahead to 2023 and beyond, cyber is growing far beyond its technology roots. For many board’s agenda on a regular basis, either monthly or quarterly. This clearly demonstrates that cyber has the role cyber plays in enabling organizations, cyber now weaves more tightly into earned an important seat at the table where high- business operations, outcomes, and opportunities. level, strategic business decisions are made. broad business success. Cyber is more than technology-focused. It is foundational. Among cyber decision-makers across Organizations increasingly recognize the role cyber an organization, it has become part of the structure plays in enabling broad business success. of the business, an embedded element for supporting business ambitions. An overwhelming majority of survey respondents identified a strong connection between cyber and Just as cyber threats shifted from an IT problem to a business impact—with 86% reporting that cyber business problem, we also now see a shift in cyber initiatives made a significant, positive contribution strategies from IT to the business—ultimately to on at least one key business priority. And most support strategic business objectives and growth. organizations are looking to build on that value Cyber as a business priority is becoming more proposition, with 58% planning to increase their evident at the board level. In this year’s survey, 70% cyber investment in the next year. of respondents reported that cyber was on their Savvy boards 70% “Boards clearly care about cybersecurity, and they will allocate resources at an impressive level. Boards are now educated enough to identify Reported that cyber was where is their competent security leadership and on their board’s agenda where is someone who’s buying their way out of on a regular basis, either the problem. And as they recognize the difference, monthly or quarterly. it’s going to change the senior executives’ and board’s tolerance.” —CISO, Consumer Organization
VIEW FROM THE TOP 6 Despite cyber’s potential as a business enabler, the ability to leverage it effectively can be inconsistent These organizations, especially, are making the connection between cyber efforts and business value. Despite cyber’s potential as a business enabler, across organizations. Some organizations have They are more likely to report that cyber initiatives the ability to leverage it effectively can be emerged as clear leaders, defining a path to value for made a positive impact to a large extent on: others to follow. • Brand reputation inconsistent across organizations. Some As part of this year’s survey, Deloitte identified high- • Customer and digital trust organizations have emerged as clear leaders, performing, cyber-mature organizations based on • Operational stability, including the supply chain defining a path to value for others to follow. their level of cyber planning, their engagement on and partner ecosystem cyber at the board level, and the level of strategic • Revenue action they have taken on cyber. These organizations are fully implementing actions that are important for Organizations with high cyber maturity also are cyber hygiene, including: an operational and strategic more likely to report that cyber brings value to key plan, an action plan to continuously improve the business strategies—providing the organization with organization’s information security, and a cyber risk confidence to try new things, increasing business program to monitor and track the security posture of agility, and enabling efficiency. And they are more partners and suppliers. likely to report seeing very high value from the third- party cyber services that they engage. Moving the business forward 54% 71% “Projects, initiatives, business objectives can’t be met without thinking through information security and privacy impacts, and having that embedded into the appropriate processes. Companies with Companies with We’re brought in during the ideation phase as US$5 billion or more US$500 million to it relates to business components and aspects. in revenue are spending US$5 billion in revenue Our strategy is 100% focused on supporting the more than US$250 are spending less business, recognizing that cyber and privacy do million annually on cyber than US$250 million not exist without the business. We want to ensure annually on cyber that we are meaningfully contributing to moving the business forward, driving growth, and doing so in a manner that’s compliant and secure.” —Arno Van Der Walt, SVP and CISO, Marriott
METHODOLOGY 7 How we Deloitte designed its 2023 Global Future of Cyber geographies, to glean more detailed insights and Survey based on the complexity of today’s business to help validate our observations. Our approach and technology landscape, focusing on the needs covered every aspect relevant to the future of cyber, developed of enterprise leaders who may recognize the from strategy to tactics to culture to technology importance of cyber yet struggle to harness its value. implementation. Deloitte based its research on a survey of more than 1,000 cyber decision-makers at the director level or At the core of this research, we focused our the insights higher (C-suite executives and C-suite direct reports), intentions and efforts on: across 20 countries and limited to organizations • Exploring how cyber has changed since Deloitte’s with at least 1,000 employees and US$500 million in 2021 report annual revenue. • Applying a forward-thinking lens, to help bring the future of cyber into sharper focus To accurately capture the increased impact that cyber has on businesses today, we nearly doubled • Understanding the business value and impact of Methodology the sample size from the 2021 research, from almost cyber that organizations are experiencing, and the 600 respondents to 1,110. Deloitte also conducted distinct actions leading organizations are taking to in-depth interviews with a number of senior cyber gain more value from cyber decision-makers across various industries and Headquarters locations of the organizations we surveyed 35% 25% Americas APAC North America, South America Asia Pacific 40% EMEA Europe/Middle East/Africa
THE IMPERATIVE 8 The future is cyber In addition to providing essential context for how cyber has evolved over the past two years, we developed a view on cyber maturity to understand the business impact that leading organizations make when they adopt more mature cyber strategies. By separating high-cyber-maturity organizations Put another way, cyber should be embedded across from their medium- and low-cyber-maturity the broader business strategy. It should be included counterparts, we can identify a distinct class of in every functional area, as an essential ingredient cyber leaders and more fully understand the for success—to drive continuous business value, not extent to which cyber underpins business success simply mitigate risks to IT. and value. Today, cyber means business, and it is difficult to overstate the importance of cyber as a foundational and integral business imperative. For any enterprise, Demonstrating impact the future of cyber will be shaped by the C-suite and “Where we minimize risk, we can clearly articulate the board’s commitment, and by the business value where and how we have made an impact and how that the entire organization can envision with cyber. we’ve allowed operations to continue in a smooth Altogether, the results of our research show a new and effective way—especially relative to our dynamic emerging as the CISO and the rest of the business partners that in many cases have had C-suite, along with the board, work in partnership to either operational or integration challenges.” lead the business and enable innovation—together. —CISO, Consumer Organization
HISTORICAL PERSPECTIVE 9 Looking at how the landscape has evolved Since our previous report in the last quarter of 2021, global industries have continued to navigate constant disruption on multiple fronts, while adjusting their priorities, business initiatives, and capabilities accordingly. Both the 2021 survey and this latest survey asked The continued importance of cloud brings with it the respondents about their organizations’ digital complex cyber considerations that are inherent in transformation priorities—to help identify which hosting data and applications off premises and often technologies were important to the organization across various environments. While cloud—and cyber and would, therefore, need to be considered as cloud—maturity varies considerably, findings in our part of future cyber strategies. recent Future of Cloud Survey suggest that many organizations are overcoming those concerns and Compared to companies’ top two priorities in 2021, achieving highly positive outcomes for risk-related cloud moved from the #2 spot to the #1 spot, cloud use cases. In fact, 83% of organizations say their displacing data analytics. Operational technology/ cloud investments are driving positive outcomes in industrial control systems and artificial intelligence/ terms of mitigating business and regulatory risk.2 This cognitive computing remained in the top five, moving is a positive signal regarding maturing cyber cloud up slightly. Joining the top-5 list this year is newcomer capabilities, shared responsibility models, and data 5G, reflecting the growing role of the standard in privacy programs being put into place. organizations’ business ambitions.
HISTORICAL PERSPECTIVE 10 Digital transformation priorities Then and now. 2021 Data Analytics Cloud New/Upgrade Operational Artificial Intelligence/ ERP Program Technology/Industrial Cognitive Computing Control Systems 2023 Cloud Data Analytics Operational Artificial Intelligence/ 5G Technology/Industrial Cognitive Computing Control Systems
THEN AND NOW 11 The role of cyber As part of our latest Global Future of Cyber survey, While digital priorities and emerging technologies have Figure 1: Cyber in the spotlight we asked about the role that cyber plays in each evolved, so too have the effects of cyber incidents on Cyber is expected to play a leading role in companies’ digital transformation initiatives of these leading digital transformation initiatives. organizations we analyzed. Even as the organization’s (Percentages may not add up to 100% due to rounding.) The results are clear: executives see cyber playing a focus shifts to the positive benefits and long-term crucial role for all digital transformation priorities, business value that cyber readiness can bring, it especially when it comes to cloud, data analytics, is important to keep sight of cyber’s core ability to and 5G (Figure 1). counter cyber threats, mitigating negative business 33 32 31 29 35 consequences and risks. 41 38 43 42 42 50 39 40 41 43 45 40 40 42 45 43 38 22 23 19 20 15 15 14 14 18 12 10 7 8 5 7 1 2 3 3 3 2 2 Cloud Data analytics 5G Internet of Things Artificial Intelligence/ Cognitive computing New or upgrade for Operational Technology/ Industrial Control Systems New or upgrade for Enterprise Resource Planning (ERP) Program Blockchain/cryptocurrency Metaverse Quantum computing Physical Robotics At the top “Everyone is having this (cyber) topping the agenda, and they are incorporating that in the design of the strategies, in the design of the budgets, and in the design of their solutions.” —CISO, Financial Services Organization Not at all To a small extent To a medium extent To a large extent
THEN AND NOW 12 Insights on incidents and impact Figure 2: Number of significant cybersecurity events The frequency of cyber incidents or breaches has (Precentage) remained steady, with 91% of organizations reporting at least one, compared to 88% in the 2021 survey. A multitude of actors, sources, tools, and techniques are part of the cyber concerns for organizations. High-maturity organizations seem more concerned about cyber criminals and terrorists, as well as Overall 36% phishing, malware, and ransomware attacks. Low- and Overall medium-maturity companies have greater concern 38% about denial-of-service attacks. It is worth noting that 45 organizations with low maturity report experiencing more significant cybersecurity events (Figure 2). 41 38 38 31 29 Overall 14% 17 Overall 9% 13 11 91% Overall 9 3% 9 8 4 4 Organizations reporting 2 at least one cyber incident or breach. 1–5 events 6–10 events 11–15 events 16 or above None Low cyber maturity (AL) (n=421) Medium cyber maturity (AM) (n=458) High cyber maturity (AN) (n=231)
THEN AND NOW 13 Meanwhile, operational disruption continues to be the In the context of these significant impacts, the need for Figure 3: Feeling the pain most significant impact of cyber incidents, although a risk-based cyber strategy—across the organization’s Cyber incidents and breaches are resulting in the following negative consequences for organizations loss of revenue and loss of customer trust jumped in ecosystem of cyber strategies, solutions, and controls— (Based on frequency of top 2 ranking in 2021, top 2 box selection in 2023) the rankings—to second and third place—with 56% is ever more important for the future of cyber. A zero of respondents reporting that they suffered related trust architecture can enable modern enterprise Negative consequences resulting from cyber incidents 2021 2023 2023 consequences to a moderate or large extent. One environments by strengthening security posture, and breaches (Rank) (Rank) (Percent) potential hypothesis in play here: Organizations with a simplifying security management, and improving end- higher level of maturity may view the impacts differently, user experience. And the journey to zero trust requires Operational disruption 1 1 58% as they have a deeper understanding of what is actually a strategy aligned to business outcomes plus significant (including supply chain/or partner ecosystem) happening in their business. Less mature organizations effort and planning, including addressing foundational Loss of revenue 9 2 56% may be evaluating theoretical impacts. Regardless, cyber issues, automating manual processes, and Loss of customer trust/negative brand impact 4 3 56% high-maturity organizations do appear to be reaping planning for transformational changes to the security significantly more positive benefits from cyber organization, the technology landscape, and the Reputational loss 5 4 55% initiatives—including improved brand reputation and enterprise itself.3 Defunding of a strategic initiative N/A 5 55% trust, operational benefits, and financial benefits. Low- Loss of confidence in tech integrity N/A 6 55% and medium-maturity groups seem more likely to gain benefits around brand reputation and improving trust, Negative talent recruitment/retention impact 8 7 54% as opposed to other areas. Intellectual property theft 2 8 54% Drop in share price 3 9 52% Regulatory fines 7 10 52% Change in leadership 5 N/A N/A More than zero A zero trust implementation is much more than a technological implementation, it is also a business and cultural transformation that 56% Respondents reporting is dependent on culture, communications, and awareness. that they suffered A comprehensive zero trust implementation should address a related consequences number of elements, including governance (architecture and to a moderate or large operations), enablers such as analytics and automation, and core extent. domains such as identities, data, and devices.
WHY MATURITY MATTERS 14 Understanding Defining maturity what it means to To define cyber maturity and identify the high performers who are shaping the future of cyber, we used three sets of leading practices to rate organizations: be cyber mature Robust cyber planning, indicated by the presence of strategic, operational, and tactical plans to defend against and Key cyber activities, such as qualitative and quantitative risk assessment, industry benchmarking, and incident- Effective board engagement, exemplified by organizations whose boards address cyber- related issues on a regular basis respond to cyber threats response scenario planning In today’s environment of heightened cyber A closer look at maturity groups By assigning point values to each set of leading practices, we were able to segment the surveyed organizations importance, we drew from our experience into three groups: working with thousands of organizations worldwide to segment respondents according to their cyber maturity. Maturity at any size, in any industry In looking across the three groups, we dug into their broader characteristics to identify any trends or traits for maturity. All three of the segments (low, medium, high) spanned industries as well as organization size and revenue—indicating that maturity 38% 41% 21% Low cyber maturity Medium cyber High cyber maturity level may not be significantly organizations, adhering maturity organizations, organizations, dependent on a company’s to none of the sets adhering to 1 of the sets adhering to 2–3 sets industry or size. of leading practices of leading practices of leading practices
WHY MATURITY MATTERS 15 Connecting maturity to value, for the entire enterprise Crucially, the three leading practices that we identified—cyber planning, activities, and board involvement—hinge on stakeholders recognizing the importance of cyber responsibility and engagement across the whole organization. While CISOs can serve as organizational The high-maturity organizations that we identified champions for cyber, many of these leading recognize the effectiveness of distributing cyber practices only become possible through responsibilities throughout the organization. Such enterprisewide engagement. efforts align with Deloitte’s common guidance of embedding cyber professionals within business That can take the form of: units, or at least having someone in each business • Having a governing body that comprises unit with a clear responsibility for coordinating IT and senior business leaders to oversee the with the cyber team. They are 31% less likely to cite cyber program inadequate governance across their organization as a top challenge in managing cyber (35% for low cyber • Conducting incident-response scenario planning and maturity vs. 34% for medium cyber maturity vs. 22% simulation at the organizational and/or board level for high cyber maturity). • Regularly providing cyber updates to the board, to secure funding • Annual cyber awareness training among all employees
WHY MATURITY MATTERS 16 Figure 4: Where industries stand Industry Organization size Of the six industries included in this study, three of The research also indicated that companies with them have five or more cyber activities implemented— 20,000 or more employees are more likely to: Cyber activities implemented slightly higher than the overall average. Those three • Understand the importance of business strategies industries include government/public services (GPS); around risk management, digital transformation, energy/resources/industrials (ERI); and technology/ digital trust, and technology modernization. media/telecom (TMT). • Recognize the importance of cyber in these business strategies. Two industries (ERI and life sciences/healthcare) have five or more cyber planning strategies implemented, at • Engage in cyber planning and implementing key a level slightly higher than the overall average. cyber activities. Meanwhile, the financial services industry is The bottom line Energy, Resources Government Technology, Financial Consumer Life Sciences implementing four out of eight cyber planning strategies Any organization, regardless of industry or size, can & Industrials & Public Services Media & Telecom Services & Healthcare at levels slightly higher than the overall average. That move toward high cyber performance and maturity. industry, however, is behind the overall average when Success should not depend solely on your ability it comes to cyber activities, with only one activity rising to “buy” maturity through increased investments in above the overall average. cyber. Rather, the actions that you take and the culture that you build will be primary factors for improving And our data showed that the consumer industry is performance. Cyber planning strategies slightly behind other industries and the overall average, with seven out of the ten key cyber activities, slightly Slightly ahead of the pack Slightly behind Behind behind the overall average, and with all of the cyber planning strategies being implemented at levels below the overall average. Examples of cyber activities Examples of cyber planning strategies • Analyzes and updates cyber plans annually • Annual cyber awareness training among all employees • Has a governing body composed of senior business and • A cyber incident-response plan that gets updated and IT leaders, to oversee the cyber program tested annually • Employs risk quantification tools to measure and ensure • Comprehensive plan to assess how to protect data at The survey defined small the return on cyber investments each step, as to where data is stored, processed, and companies as those with • Conducts incident-response scenario planning at the transmitted revenue of US$500 million to organizational and/or board level • Cyber risk program to monitor and track the security US$1 billion. Large companies • Gets external help/outsourcing to manage cyber posture of partners and suppliers included organizations with initiatives • Ongoing “voice of the customer” input for cyber and data US$10 billion or more in revenue. privacy preferences
WHY MATURITY MATTERS 17 Bolstering the business with cyber Building a bigger business case for cyber Generating confidence and much more Figure 5: Recognizing the bigger potential Regardless of an organization’s maturity, there is no More than half of these leaders (55%) reported that Where cyber is making a specific impact on businesses initiatives cyber architecture or approach that can guarantee cyber provides them with confidence to try new (Percentage) absolute security and risk mitigation. Instead, the most things—compared to 45% for medium-maturity striking feature of highly cyber-mature organizations organizations and 40% for low-maturity organizations. is their ability to extract value from their cyber 69 68 69 investments. And nearly 70% of highly mature organizations said 65 65 cyber was making an impact on both enhancing trust High performers are doing more when it comes to and enabling efficiency—significantly higher than the 57 engaging leadership, planning, and acting—and it low- and medium-maturity organizations. 54 55 55 52 52 appears to be generating more business value from 50 49 their cyber efforts. In terms of seeing impacts like Likewise, a majority of highly mature leaders (65%) also 53 46 47 46 45 increased efficiency, resiliency, and agility, those highly cited resilience and agility as benefits of cyber—once 42 40 mature organizations are ahead of the pack, and they again far ahead of their low-maturity and medium- 38 are recognizing benefits that may not be typically maturity peers (Figure 5). associated with cyber. 55% Enhances trust Enable efficiency Detects potential problems sooner Improves resilience Increase agility Prevents bad things from happening Provides confidence to try new things Highly mature organizations said cyber provides them with confidence to try new things. Low cyber maturity (AL) (n=421) Medium cyber maturity (AM) (n=458) High cyber maturity (AN) (n=231)
WHY MATURITY MATTERS 18 Figure 6: Reaping real benefits The highest-performing organizations also were more And based on the data from our 2023 Global Future Cyber initiatives are making a positive contribution in the following areas likely to report positive contributions from their cyber of Cyber Survey, global organizations can clearly see (Percentage) initiatives in areas such as improved brand reputation the connection to benefits including trust. While (64%), increased revenue (47%), improved operational organizations that are investing in cyber are seeing stability involving the supply chain and partner significant gains across a range of value measures, ecosystem (59%), talent recruitment and retention the highest performers get more of that value across (49%), long-term sustainability (64%), improved every strategic measure (Figure 6). 64 64 customer trust and brand impact (62%). 62 62 61 59 59 56 Trust is an issue of paramount importance when 53 it comes to cyber. As an “ecosystem” that can help 49 50 47 47 deliver outcomes, trust needs to be built with all of 45 your human stakeholders. A trusting workforce, for 42 Customer expectations 39 example, achieves 2x improved customer satisfaction, 38 37 “The customer—my personal guess—is not 36 35 35 36 35 and customers who trust a brand are 88% more likely 33 34 34 willing to pay a lot extra for cybersecurity (in our 31 31 31 to buy again. Building customer trust also affects 29 29 30 products). They will expect to have it. It will be a 27 27 27 27 27 partners and improves up to 4x market capitalization, 25 26 25 differentiator.” 24 with trusted companies ultimately outperforming 22 their peers by up to 400%. — CISO, Automotive Organization 400% Improved digital trust (for customers and employees) Improved customer Built long term sustainability Minimized Intellectual Improved brand reputation in tech integrity Improved operational stability including supply chain/ trust/brand impact Increased talent recruitment/retention impact or partner ecosystem Increased resiliency property theft Increased revenue Increased funding of a strategic initiative Avoid regulatory fines Increase in share price Improved confidence Improved agility Building customer trust affects partners and improves market capitalization, with trusted companies ultimately outperforming their peers. Low cyber maturity (AL) (n=421) Medium cyber maturity (AM) (n=458) High cyber maturity (AN) (n=231)
WHY MATURITY MATTERS 19 One other area in which highly mature cyber cloud, infrastructure security, and application security. organizations exceeded their peers in the low and Meanwhile, a minority of low- and medium-maturity medium group: the value they are seeing from using companies reported value across those areas. third-party cyber services. Importantly, to take advantage of the value that third- A majority of these high performers reported party cyber services can bring, organizations should Lessons to learn: measurable value when it came to third-party services consider ways they can manage their growing services Following the leaders for cyber strategy, data protection and privacy, cyber ecosystems and the inherent complexity (Figure 7). Given the ability of these high-performing organizations to extract significant business wide benefits from their cyber investments, other organizations should look to the example set by cyber-mature companies— Figure 7: Getting value with vendors using it as a set of guideposts for achieving broader enterprise engagement Where companies are reporting seeing value from third-party cyber services on cyber. (Percentage) Overall Based on the success that these high-maturity organizations have derived Overall 38% Overall Overall from cyber, it may be time for your business to take a deeper dive into 39% 36% 34% Overall questions such as: 34% Overall Overall Overall Overall 59 31% 30% 29% 29% 55 53 53 51 Do we have the right Are we investing in Are we investing in 45 44 46 46 technology and the right ways and in the right ways and in partner ecosystem in the right areas—and the right areas—and 35 34 35 31 32 place—and how can do we have the right do we have the right 28 29 29 26 27 26 we manage a growing, framework in place to “value frame” in place 24 23 22 21 21 20 20 complex network of understand how and to understand how third parties? where cyber is adding and where cyber is value across the adding value across organization? the organization? Emerging technologies Detect & Respond Recover & Transform Cyber strategy Data protection and privacy Cyber cloud Application security Infrastructure security (OT, 5G, AI, Quantum computing) Identity and access management Low cyber maturity (AL) Medium cyber maturity (AM) High cyber maturity (AN)
KEY INSIGHTS 20 Key insights to shape the future of cyber: Five areas of focus 1 Multidirectional engagement 2 Criticality to digital transformation initiatives As we have already noted, high-performing High-maturity organizations are much more likely to Managing these risks can have a major impact on Aiming for results with AI organizations engage the entire organization in cyber value cyber as central to key digital transformation an organization’s AI efforts. In fact, the AI survey “But in a nutshell we are promoting our activities. While high-maturity organizations, by priorities (Figure 8). found that 50% of respondents cited management knowledge and awareness (about cyber), as definition, leverage more cyber leading practices than of AI-related risks as one of the top inhibitors to well as quantum computing and metaverse— their medium- and low-maturity counterparts, the Adoption of these digital transformation priorities is scaling AI projects. Despite such sentiments, only AI too—while approaching cybersecurity as disparities in organizational engagement are among essential to ensuring operational agility and business 33% of respondents have aligned their AI risk the enabler for the business.” the starkest. success. But each carries significant cyber risks, and management with their organization’s broader risk —Mesfer Almesfer, CISO, NEOM high-maturity organizations may be especially attuned management efforts. However, 33% of high-outcome Leadership. High-maturity organizations are nearly to that reality. surveyed organizations and 29% of low-outcome three times as likely as low-maturity organizations, and surveyed organizations do engage outside vendors to nearly twice as likely as medium-maturity organizations, For example, AI can be an enabler of cyber strategies independently audit their AI systems. to have a governing body comprising senior business and companies’ digital business ambitions, but it and IT leaders, to oversee their cyber programs (60% also introduces the potential for cyber risk that can high vs. 36% medium, 22% low). come with any digital technology. Beyond the leading Figure 8: Evolving with cyber practices we have highlighted here, our recent State How each maturity group views cyber’s importance to specific digital transformation initiatives Scenario planning. Similarly, high-maturity of AI in the Enterprise survey report also underscores (Percentage) organizations are three times as likely as low-maturity how engaging in specific risk-mitigation steps can also 71 organizations, and twice as likely as medium-maturity help drive better outcomes, such as cost reduction 66 64 organizations, to conduct incident-response scenario and entry into new markets. AI-related risks represent 61 61 planning at the organizational and/or board level (60% an issue of high importance to organizations. It also high vs. 30% medium, 20% low). found explainability and transparency in AI decisions, 48 data privacy or consent mismanagement, and safety 42 41 40 38 37 concerns about AI systems, among others, all loom 33 34 33 34 large as ethical risks that concern organizations.5 Cloud Data analytics 5G Internet of Things Artificial Intelligence/ cognitive computing Low cyber maturity (AL) (n=421) Medium cyber maturity (AM) (n=458) High cyber maturity (AN) (n=231)
KEY INSIGHTS 21 3 Robust planning Planning is proving to be paramount for creating Figure 9: The planning reality, across maturity groups cyber strategies that effectively mitigate risk and Organizations that are fully implementing these actions drive business value. And the high-performing (Percentage) organizations identified in this report appear to be abundantly aware of planning’s importance (Figure 9). Overall Overall 62% Overall Overall 59% 58% 58% Overall Overall Highly cyber-mature organizations are more likely to 57% 56% Overall have robust plans in place, with elements that may 91 Overall 51% include: 89 87 88 54% 85 85 • A cybersecurity incident-response plan that 80 77 gets updated and tested annually (87% of high- maturity organizations) • An operational and strategic plan to defend 61 against cyber threats (91%) 55 56 55 55 53 51 • A comprehensive plan to assess how it 47 46 45 45 45 protects data in each step, covering where that 44 44 43 42 data is stored, processed, and transmitted (88%) 91% High-maturity An operational and strategic plan to defend Annual cybersecurity awarenesss A cyber security incident Compre- hensive plan to assess how we Cybersecurity risk program to monitor and Action plan for continuously improving and Purchasing cybersecurity Insurance Ongoing, voice-of-the- customer against training among response plan protect data in track the developing the input to organizations an cybersecurity all employees that gets each step as to security organization’s cybersecurity operational and threats updated and where that posture of our hygiene with and data strategic plan to tested data is stored, partners and cyversecurity privacy annually processed, and suppliers and preferences defend against transmitted information cyber threats. security Low cyber maturity (AL) (n=421) Medium cyber maturity (AM) (n=458) High cyber maturity (AN) (n=231)
KEY INSIGHTS 22 4 Appreciating and investing in talent Cyber issues and activities are ultimately about Overall, high-maturity organizations appreciate the Figure 10: How they are tapping their talent people—whether it is an attacker trying to exploit importance that experienced talent can bring to Strategies organizations are taking to engage, retain, and develop existing talent vulnerabilities, decision-makers responsible for cyber cyber efforts, and they are taking meaningful steps to strategies and tactics, or the frontline employees retain valuable talent. High-maturity organizations are Overall running digital business processes and cyber significantly more likely to cite a lack of skilled cyber 54% Overall 50% programs. Strong talent—in the form of people who professionals as a top challenge in managing cyber are skilled, experienced, and cyber-focused—is a (47% high cyber maturity vs. 38% medium, 37% low). 64 prerequisite for strong performance. Looking beyond 63 Overall 45% traditional talent profiles has become crucial for For more mature organizations, their robust programs securing the right people to drive cyber initiatives. may be part of the talent challenge. As they engage Overall Overall 40% 39% For example, a customer experience designer might more broadly and deeply in cyber-related activities, 53 54 Overall Overall bring needed insights for cyber initiatives, helping they may find that they have stretched their teams 50 39% 36% 49 to identify potential vulnerabilities when it comes to and capabilities to the maximum, and they may 48 48 transactional processes, data collection, or privacy. recognize the need to bring in more people with 43 43 43 43 advanced and diverse skills to support their more 42 Attracting and retaining talent—the right talent—is mature programs. 38 38 difficult. Stress and other pressures come naturally 37 37 37 37 with any position of cyber responsibility. And it can But are low-maturity organizations really not facing 34 33 be intense. In fact, one respondent interviewed as the same level of talent challenges—or are they simply part of the study—a financial industry leader in the not putting enough emphasis on having the right skills United Kingdom—pointed out that his designation as in place? If the latter, emphasizing talent acquisition a “senior responsible manager” means that cyber risk should be a priority—and something that ultimately effectively sits with the CISO and that “there could be could help them become more mature organizations serious, personal consequences” for certain events. It (Figure 10). is also a powerful argument for the inherent business focus of cyber—and how responsibility should transcend a single enterprise role or department. Training and Flexible/hybrid Specialized Differentiated Rotational International Offering MBAs certification working options career paths compensation roles/internal mobility (or similar programs models mobility opportunities executive programs) Low cyber maturity (AL) (n=42)1 Medium cyber maturity (AM) (n=458) High cyber maturity (AN) (n=231)
KEY INSIGHTS 23 5 A diverse ecosystem of tools and services While deploying tools and services increases cyber readiness, it also creates a need for strong ecosystem Figure 11: Relying on others Organizations are using third-party cyber services providers in these areas As they look to lead in the future of cyber, high- planning, management, and operations. Working maturity organizations are acutely aware that they with multiple vendors to solve complex, evolving cannot do it alone. They must rely on an extended problems—and to run, monitor, and update cyber 88 85 ecosystem of technologies, capabilities, and external capabilities as part of an integrated environment— 82 82 81 81 offerings to create future-facing cyber capabilities presents its own set of complex needs. 80 that can also support business value. 73 74 Ironically, the complexity that can come with 72 71 71 69 70 Compared with their low- and medium- multiple cyber vendors could provide an entrée to 68 67 64 65 performing counterparts, these high-performing new risks, including breaches. In some situations, 62 61 61 62 60 62 organizations are more likely to have in place a consolidating vendor oversight is one way to bring 60 60 broad assortment of products and services from simplicity to the challenge. 55 third parties (Figure 11), including: • Application Security As the average number of cyber vendors used is expected to increase in the next two years, so • Cyber Cloud does the case for simplifying and consolidating • Cyber Strategy oversight. One other approach to consider: working • Data Protection and Privacy with convening bodies, such as industry groups, • Detect & Respond to better understand technology developments and emerging practices that can influence how you • Emerging Technologies (OT, 5G, AI Quantum manage your ecosystem. Computing) • Identity and Access Management • Infrastructure Security • Recover & Transform Clyber cloud Data Application Infrastructure Cyber Emerging Identity Detect and Recover and protection security security strategy technologies and access respond transform and privacy (OT, 5G, AI management Quantum Change in behavior Gaining perspective Computing The use of automated behavior-analytic tools “A 100% internal strategy doesn’t work. It doesn’t to detect and mitigate potential cyber risk scale; it doesn’t work and it has a tendency that Low cyber maturity (AL) (n=421) Medium cyber maturity (AM) (n=458) High cyber maturity (AN) (n=231) indicators among employees has increased it becomes an ivory tower. We work with a wide significantly. In this survey, 76% of respondents range of partners, and this is mainly to get new reported using such tools; in the 2021 survey, ideas and to help in guiding us strategically.” 53% reported using them. — CISO, Automotive Organization
OUTLOOK 24 So where do we go from here? If enterprise leaders expect their businesses to be able to expand and grow, they should expect cyber to be an integral part of their plans. Cyber should also be an integral part of all the tools they will use to support their business ambitions going forward. The days of “cyber as an afterthought” are For starters, a zero trust approach should be gone. And for any business, new technological central to your efforts involving new technology. capabilities will be more effective when strong By removing the assumption of trust from the cyber strategies are part of the picture. Emerging security architecture and authenticating every technologies will bring along with them innovative action, user, and device, zero trust helps enable solutions that can support future business a more robust and resilient security posture. The models and also present unforeseen challenges organizational benefits are complemented by a on the cyber front. How will you harness these considerable end-user perk: seamless access to technologies for business value while ensuring that the tools and data needed to work efficiently. your cyber strategies and investments keep pace? “Zero trust transformation journeys become very complex in large IT estates like ours. We must transform at the pace of business while managing the complexity of an ever-expanding ecosystem of partners looking to connect with a wide range of devices in order to process diverse workloads—all securely.” —Allan Cockriel, Group CIO/CISO, Shell
OUTLOOK 25 “We will have a more diverse range of digital When it comes to adopting innovations, begin with Looking ahead solutions, including highly business-specific or your strategy and understand the technologies data-intensive ones like AI and supercomputing, available that support that strategy from a cyber Sensing the risks and opportunities inherent in new Meanwhile, AI, which remains among the top 5 which require a constant update on how our cyber perspective—then apply a critical lens. How does the technology is one way to keep up with the evolving priorities in the survey, can help organizations address environment is effectively protected and meets use of a data service or platform, for example, align threat landscape. You do not want your cyber efforts to complexity on a number of fronts, including cyber. As regulatory standards.” with your purpose, reinforce your ability to create have to play catch-up with fast-moving tech trends. The organizations struggle with security breaches, cyber AI —Charlie Huang, Data Protection Officer, BASF trust, and open up the organization to risks and less prepared you are for technological change, the less can be a force multiplier, enabling security teams not threats? From there, work to apply the right solution prepared you are for managing cyber risk. only to respond faster than cyberattackers can move for the right needs. but also to anticipate these moves and act in advance. One case in point is the rising importance of 5G, which With AI and automation, organizations could also appeared as a new entrant on this survey’s list of eliminate the tedious functions of some analysts—and top 5 digital transformation priorities. While 5G can then train those analysts for more strategic roles that enable new use cases—such as telemedicine, asset may be challenging to fill. tracking in manufacturing, and augmented reality for advanced training—it also presents a large attack And it is never too early to begin thinking about surface. Designing and embedding security from the technologies that are much farther down the road, start will be crucial for 5G adoption, but it also will bring including quantum computing, which only 4% of survey a tremendous amount of complexity. respondents said would be a digital priority in the next few years. While quantum computing unleashes tremendous potential computing power for the enterprise, it also can provide a tool for cyberattackers to wield—and calls for a new enterprise footing of “quantum readiness.” Security by design “We’re actually investing in what we call ‘secure by design’ to make sure that security is one of the many elements of our value proposition. We are investing in policies, tooling, and controls across the software and product lifecycles to ensure we are creating great—and secure—technology. Our customers expect it.” —Allan Cockriel, Group CIO/CISO, Shell
CONCLUSION 26 Onward The future of cyber and the future of business are tightly Get started intertwined. How you embed cyber thinking, planning, and action into all of your business initiatives will directly How you approach cyber says a lot about how you will approach the future of your business, and how well you will achieve your business influence the success of those initiatives. aims. No matter where you are today—and no matter where you want to go—it helps to start with a clear understanding of what is possible and what may lie on the road ahead. Put another way: cyber is foundational. It is the Brand reputation. Customer trust and loyalty. Acknowledgements bedrock for enabling and sustaining the digital trust Operational stability. Revenue growth. It is all Ian Blatchford, Scott Buzik, Luca Covolo, Deborah Elder, Jaya Gopalan, on which the future of your business will stand. connected to how well you plan and execute Jeremy Guterl, Matthew Holt, Dan Konigsburg, Daphne Lucas, Diana As business continues to shift ever more sharply when it comes to cyber—on how strong you Kearns-Manolatos, Emily Mossburg, Mike Nash, Kelly Nelson, Jud Payne, into the digital realm, creating effective digital make your cyber foundation. Thinking “cyber Sean Peasley, Ashley Reichheld, Heather Saxon, Daniel Soo, Scott Tillett, ecosystems will depend on creating effective cyber first” is imperative—when embarking on new Niels van de Vorle, Marius von Spreti, Emily Werner strategies that drive business outcomes. cloud initiatives, when developing new products and services, when adding third parties to your Contacts ecosystem, and when providing your workforce with Emily Mossburg Peter Wirnsperger César Martín Lara new tools. And the importance of cyber is woven Global Cyber Leader Central Europe Spain Cyber Leader throughout all other digital imperatives, such as the emossburg@deloitte.com Cyber Leader cmartinlara@deloitte.es need for insights, platforms, connectivity, effective +1 571 766 7048 pwirnsperger@deloitte.de +34 914381416 +49 40 320804675 experiences, and integrity. Ian Blatchford Deborah Golden Asia Pacific Cyber Leader Niels van de Vorle United States iblatchford@deloitte.com North and South Cyber Leader +61 474 288 278 Europe Cyber Leader debgolden@deloitte.com nvandevorle@deloitte.nl +1 571 882 5106 Amir Belkhelladi +31882882186 Canada Cyber Leader abelkhelladi@deloitte.ca +1 514 393 7035
27 Endnotes 1. Deloitte 2021 Future of Cyber Survey. 2. Closing the cloud strategy, technology, and innovation gap. Deloitte US Future of Cloud Survey Report, 2022. 3. Future of Digital Trust: Driving forces, trends and their implications on our digital tomorrow. Deloitte. 2021. 4. The Four Factors of Trust: How Organization Can Earn Lifelong Loyalty. 5. Fueling the AI transformation: Four key actions powering widespread value from AI, right now. Deloitte’s State of AI in the Enterprise, 5th Edition report, October 2022. 6. Take 5: 5G cybersecurity, Part of Deloitte’s ‘Take 5 on 5G’ article series. 7. Cyber AI: Real Defense, Deloitte Tech Trends 2022. 8. Quantum Cyber Readiness Deloitte’s perspective on transitioning to a quantum secure economy
To find out more, please visit www.deloitte.com/2023futureofcyber. This publication contains general information only and Deloitte is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this publication. About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the “Deloitte” name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms. Copyright © 2022 Deloitte Development LLC. All rights reserved.
You can also read