|By PR Newswire||
|February 20, 2014 12:35 PM EST||
NEW YORK, Feb. 20, 2014 /PRNewswire/ -- Despite heightened attention to cyber security and unprecedented levels of security investment, the number of cyber incidents – and their associated costs – continues to rise, and adversaries continue to evolve their attack techniques. As the challenges to secure complex enterprise and public sector environments continue to mount, Deloitte, an acknowledged market leader in security, privacy, and resilience solutions, today announced its new Secure.Vigilant.Resilient. approach to help organizations maximize business performance through a cyber risk management program that extends beyond traditional information security practices.
Deloitte's Secure.Vigilant.Resilient. approach acknowledges that with perpetual change and increasing complexity, it is economically infeasible for organizations to be 100 percent secure. It remains critical to invest in cost-justified and risk-prioritized security controls, but it is equally important – if not more important – to focus effort on improving threat visibility and detection, and responding more rapidly and effectively to reduce the impact of cyber incidents. Secure.Vigilant.Resilient. efforts require strong executive guidance and governance processes, and the creation of an active defense culture throughout the organization.
Simultaneously, Deloitte announced it has changed the name of its Security, Privacy, and Resilience practice to Cyber Risk Services, reflecting awareness that gaining ground in the battle against cyber threats is fundamentally a risk management challenge.
Cyber Risk Services is an integral component of Deloitte's risk advisory services business, the market leader in providing end-to-end risk advisory services. Deloitte's risk advisory services business helps organizations build value by taking a risk intelligent approach to managing financial, technology and business risks. This approach helps organizations focus on areas of increased risk, bridge silos to effectively manage risk across organizational boundaries and pursue not only risk mitigation but also intelligent risk taking as a means to value creation.
"Senior executives are flooded with news and information about the damages that cyber incidents can inflict, but this in itself doesn't help them move forward," said Ed Powers, the national managing principal for Deloitte's Cyber Risk Services practice. "The fact is that innovation and cyber risk are inextricably linked; cyber risk is an inherent byproduct of virtually every growth and efficiency effort. The recent spate of attacks waged through point-of-sale systems is a case in point. Electronic payments processing has heralded new levels of efficiency for retailers and their customers – but the attendant risks can exact significant costs, both direct and indirect."
"Our approach helps organizations gain confidence in their ability to innovate by helping them be better prepared for potential cyber incidents. Through a Secure.Vigilant.Resilient. program, they can embrace cyber risk management not as a necessary evil, but as a positive and an integral component of strategic planning that supports the achievement of their core mission and strategic objectives," Powers added.
The underpinning concepts for the framework are spelled out in a new point of view paper entitled, "Changing the game on cyber risk: the imperative to be secure, vigilant, and resilient." www.deloitte.com/us/cyberrisk
To get started, leaders of the organization need to understand the key threats prevalent in their industry and specific to their organization. By reviewing potential actors and their motives, they can establish program components that better prevent impact by known threats, and also be better equipped to anticipate what might happen in the future, and respond more nimbly when incidents occur.
Deloitte Cyber Risk Services – Leading From the Front
Deloitte's Cyber Risk Services comprises more than 1,500 professionals focused in cyber risk, information security, privacy and business resilience. Deloitte is recognized by Forrester Research, Inc. as a leader in information security consulting services and ranked No. 1 globally and in North America in security consulting, based on revenue by Gartner., 
Today's announcement follows a series of aggressive activities Deloitte initiated in 2013 to build upon its position as the clear market leader. Deloitte acquired the assets of Vigilant, Inc. last spring. Renamed Vigilant by Deloitte, this segment of the practice specializes in cyber risk detection, situational awareness, and cyber threat intelligence, providing consulting, managed services, and information services that help organizations detect and respond to emerging cyber threats.
Former senior-ranking Federal Bureau of Investigation (FBI) Special Agent in Charge Mary E. Galligan, who supervised some of the FBI's largest and most high profile investigations – including the September 11th terrorist attacks, joined Deloitte's Cyber Risk Services practice last fall. The addition of Galligan, who retired from the FBI after more than 25 years' service, brought a national security and law enforcement leadership to the incident response portion of the cyber security equation.
Deloitte served as the objective observer of the Securities Industry and Financial Markets Association Quantum Dawn 2 simulated systemic cyber attack on the U.S. financial system and co-authored the after action report that identifies ways to improve the industry's responses to cyber events.
Most recently, Deloitte helped the National Institute of Standards and Technology (NIST) to develop a Cybersecurity Framework to reduce cyber security risks for critical infrastructure. The NIST Framework, mandated by an Executive Order signed by President Obama one year ago, is based on five core functions: identify, protect, detect, respond and recover, which is consistent with Deloitte's Secure.Vigilant.Resilient. cyber risk management approach.
Deloitte's market-leading Cyber Risk Services practice helps organizations address pressing and pervasive strategic information and technology risks, such as cyber security, data leakage, identity and access management, data security breaches, operational resilience and system outages, privacy and application integrity. Deloitte provides industry-tailored solutions, using demonstrated methodologies and tools in a consistent manner, with the goal of enabling ongoing, secure, and reliable operations across the enterprise. Deloitte can help lead your organization to an agile, rapid risk response approach to enable greater insight and informed business decisions tied to business value. Our breadth of capability across risk management, IT consulting and organizational transformation allows us to define an approach that can efficiently and effectively align people, process and technology.
As used in this document, "Deloitte" means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.
 "Cost of a Security Breach," Ponemon Institute, 2013
 "The Forrester Wave™: Information Security Consulting Services, Q1 2013," Forrester Research, February 1, 2013
 Source: Gartner, Market Share Analysis: Security Consulting, Worldwide, 2012, Lawrence Pingree, 16 May, 2013.
 References by Forrester Research, Inc. and Gartner are to the security & privacy practices of the member firms of Deloitte Touche Tohmatsu Limited, including those member firms outside the U.S., in the aggregate.
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Feb. 21, 2017 03:00 AM EST Reads: 1,586
910Telecom exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and exchanges.
Feb. 21, 2017 02:45 AM EST Reads: 1,308
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, discussed how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a practic...
Feb. 21, 2017 02:00 AM EST Reads: 4,558
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and micro services. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your contain...
Feb. 21, 2017 01:15 AM EST Reads: 3,251
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services a...
Feb. 21, 2017 01:00 AM EST Reads: 6,258
Niagara Networks exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Feb. 21, 2017 12:30 AM EST Reads: 703
Zerto exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016. Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform™, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The company’s flagship product, Zerto Virtual...
Feb. 21, 2017 12:30 AM EST Reads: 1,030
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
Feb. 20, 2017 10:15 PM EST Reads: 6,193
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Feb. 20, 2017 10:15 PM EST Reads: 3,323
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Feb. 20, 2017 10:15 PM EST Reads: 5,905
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
Feb. 20, 2017 09:15 PM EST Reads: 905
"Plutora provides release and testing environment capabilities to the enterprise," explained Dalibor Siroky, Director and Co-founder of Plutora, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Feb. 20, 2017 09:15 PM EST Reads: 4,503
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
Feb. 20, 2017 08:45 PM EST Reads: 4,336
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and 21st International Cloud Expo, which will take place in November in Silicon Valley, California.
Feb. 20, 2017 08:30 PM EST Reads: 1,504
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Feb. 20, 2017 07:00 PM EST Reads: 8,234