venturebeat.com Open in urlscan Pro
192.0.66.2  Public Scan

Submitted URL: https://event.qualys.com/dc/grnTTqDuZhpQFTeO1hdH-aGZzfmCeg1O8Tm9mRsDBnqFWk1ohAlGHp0hHgAxEDzTt_qV_Yfe_QzTNQkLytmJPCx_JsC8r...
Effective URL: https://venturebeat.com/security/deloitte-cybersecurity-predictions-2023/?utm_source=marketo&utm_medium=email&utm_campai...
Submission: On December 28 via api from IE — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://venturebeat.com/

<form method="get" action="https://venturebeat.com/" class="search-form" id="nav-search-form">
  <input id="mobile-search-input" class="" type="text" placeholder="Search" name="s" aria-label="Search" required="">
  <button type="submit" class="">
    <svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
      <g>
        <path fill-rule="evenodd" clip-rule="evenodd"
          d="M14.965 14.255H15.755L20.745 19.255L19.255 20.745L14.255 15.755V14.965L13.985 14.685C12.845 15.665 11.365 16.255 9.755 16.255C6.16504 16.255 3.255 13.345 3.255 9.755C3.255 6.16501 6.16504 3.255 9.755 3.255C13.345 3.255 16.255 6.16501 16.255 9.755C16.255 11.365 15.665 12.845 14.6851 13.985L14.965 14.255ZM5.255 9.755C5.255 12.245 7.26501 14.255 9.755 14.255C12.245 14.255 14.255 12.245 14.255 9.755C14.255 7.26501 12.245 5.255 9.755 5.255C7.26501 5.255 5.255 7.26501 5.255 9.755Z">
        </path>
      </g>
    </svg>
  </button>
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products. With your
permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
partners’ processing as described above. Alternatively you may click to refuse
to consent or access more detailed information and change your preferences
before consenting. Please note that some processing of your personal data may
not require your consent, but you have a right to object to such processing.
Your preferences will apply to this website only. You can change your
preferences at any time by returning to this site or visit our privacy policy.
MORE OPTIONSDISAGREEAGREE

Skip to main content
Events Market with Us
VentureBeat Homepage

Subscribe

 * Artificial Intelligence
   * View All
   * AI, ML and Deep Learning
   * Auto ML
   * Data Labelling
   * Synthetic Data
   * Conversational AI
   * NLP
   * Text-to-Speech
 * Security
   * View All
   * Data Security and Privacy
   * Network Security and Privacy
   * Software Security
   * Computer Hardware Security
   * Cloud and Data Storage Security
 * Data Infrastructure
   * View All
   * Data Science
   * Data Management
   * Data Storage and Cloud
   * Big Data and Analytics
   * Data Networks
 * Automation
   * View All
   * Industrial Automation
   * Business Process Automation
   * Development Automation
   * Robotic Process Automation
   * Test Automation
 * Enterprise Analytics
   * View All
   * Business Intelligence
   * Disaster Recovery Business Continuity
   * Statistical Analysis
   * Predictive Analysis
 * More
   * Data Decision Makers
   * Virtual Communication
     * Team Collaboration
     * UCaaS
     * Virtual Reality Collaboration
     * Virtual Employee Experience
   * Programming & Development
     * Product Development
     * Application Development
     * Test Management
     * Development Languages


Subscribe Events Market with Us



DELOITTE REVEALS 10 STRATEGIC CYBERSECURITY PREDICTIONS FOR 2023 

Tim Keary@tim_keary
November 21, 2022 2:07 PM
 * Share on Facebook
 * Share on Twitter
 * Share on LinkedIn

Cybersecurity hacking
Image Credit: Reuters/Kacper Pempel

Check out all the on-demand sessions from the Intelligent Security Summit here.

--------------------------------------------------------------------------------




TABLE OF CONTENTS

 * 1. Board cybersecurity readiness will become business imperative 
 * 2. Connected device visibility and security will be a major area of focus for
   most organizations
 * 3. Security in emerging technologies will be critical in their adoption 
 * 4. Data-centric security and privacy will become imperative to building brand
   and customer trust 
 * 5. Focus of future-forward readiness 
 * 6. Organizational resilience will continue to be the focus 
 * 7. Complex supply chain security risks will continue to emerge 
 * 8. Organizational talent consolidation and outsourcing will evolve due to
   severe cyber talent shortage and growing labor cost 
 * 9. Cloud security approaches, products and technology will mature at an
   accelerated pace 
 * 10. Evolving threats to operational technology in manufacturing and other
   environments 

Cybersecurity isn’t easy. Over the past few months, organizations including
Uber, Cisco, Twilio and Rockstar Games have all fallen victim to data breaches
as a result of cyber attacks. Recently, some of Deloitte’s leading analysts
spoke with VentureBeat to share their top strategic cybersecurity predictions
for 2023.

>>Don’t miss new special issue: Zero trust: The new security paradigm.<<

1
/
5
Accelerating transformation and unlocking your talent with citizen development -
Low-Code/No-Code Summit
Read More

804.6K
5




Video Player is loading.
Play Video
Unmute

Duration 0:00
/
Current Time 0:00
Playback Speed Settings
1x
Loaded: 0%

0:00

Remaining Time -0:00
 
FullscreenPlayUp Next

This is a modal window.



Beginning of dialog window. Escape will cancel and close the window.

TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaque
Font Size50%75%100%125%150%175%200%300%400%Text Edge
StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional
Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall
Caps
Reset restore all settings to the default valuesDone
Close Modal Dialog

End of dialog window.

Share
Playback Speed

0.25x
0.5x
1x Normal
1.5x
2x
Replay the list
 * Powered by AnyClip
 * Privacy Policy


TOP ARTICLES








Accelerating transformation and unlocking your talent with citizen development -
Low-Code/No-Code Summit


Deloitte’s analysts reveal a range of predictions, including the importance
cybersecurity and future-forward readiness and organizational resilience will
play in helping enterprises to better control their exposure to threat actors in
future. 

Below is an edited transcript of their responses. 


EVENT

Intelligent Security Summit On-Demand

Learn the critical role of AI & ML in cybersecurity and industry specific case
studies. Watch on-demand sessions today.

Watch Here


1. BOARD CYBERSECURITY READINESS WILL BECOME BUSINESS IMPERATIVE 

advertisement


“As the cyber threat landscape continues to evolve and grow more sophisticated,
the role board of directors play in cyber risk oversight is becoming
increasingly important. As organizations prioritize customer trust alongside
continued growth, the board can help position cyber as a strategic enabler to
foster stronger relationships across customers, vendors, employees, and
shareholders. 

Recognizing the value a robust cybersecurity posture can directly have on
financial impact allows boards to more effectively oversee cybersecurity risk
management activities. Recent SEC proposals emphasizing governance, risk
management, strategy and timely notification to investors should encourage
leaders to consider evolving and shaping their current and future business
models with cyber risk and the board at the center of these initiatives,” 

— Deloitte’s US Cyber Crisis Management Leader Mary Galligan 


2. CONNECTED DEVICE VISIBILITY AND SECURITY WILL BE A MAJOR AREA OF FOCUS FOR
MOST ORGANIZATIONS

advertisement


“IoT-connected devices have been deployed by most organizations over the years,
but often without adequate security governance. As the number of connected
devices grows, the attack surface for the networks and ecosystems to which
they’re connected grows as well, creating exponentially more security, data and
privacy risks. 

Leading organizations will focus in the year ahead on connected device cyber
practices by establishing or updating related policies and procedures, updating
inventories of their IoT-connected devices, monitoring and patching devices,
honing both device procurement and disposal practices with security in mind,
correlating IoT and IT networks, monitoring connected devices more closely to
further secure those endpoints, manage vulnerabilities, and respond to
incidents.” 

— Deloitte’s US Cyber IoT leader, Wendy Frank 


3. SECURITY IN EMERGING TECHNOLOGIES WILL BE CRITICAL IN THEIR ADOPTION 

“As applications of IoT, Blockchain, 5G, Quantum and other technologies continue
to accelerate, cybersecurity risks associated with these technologies continue
to become evident. 

advertisement


Adoption of these technologies will be instrumental to manage organization’s
strategic growth initiatives, however, their sustained success will be based on
organization’s ability to navigate and implement appropriate technology security
measures.” 

— Deloitte’s US Transformation & Emerging Technology leader in cyber & strategic
risk, Kieran Norton


4. DATA-CENTRIC SECURITY AND PRIVACY WILL BECOME IMPERATIVE TO BUILDING BRAND
AND CUSTOMER TRUST 

“Digital engagement between businesses and customers is a new way of life —
nearly 72% of an organization’s customer engagements are digital. This has
heightened expectations from customers to have greater control over their data
and increased transparency about organizations’ policies. 

advertisement


This has heightened expectations from customers to have greater control over
their data and increased transparency about organization’s policies surrounding
data handling — often in exchange for increased willingness to share more data
and become more engaged if the company is trusted. 

As a result, there’s a growing sense of urgency for organizations to enable
dimensions of trust and to embrace data privacy, security, and compliance as
mechanisms to bolster traditional methods for strengthening customer experience
and brand perception.” 

— Deloitte’s US Data & Privacy leader for cyber & strategic risk, Criss
Bradbury 


5. FOCUS OF FUTURE-FORWARD READINESS 

“As we look back, the past few years have shown us how quickly changes happen —
from industry dynamics to the geopolitical climate, disruptive technologies, and
enterprise priorities, which emphasizes the need to be future ready. Change
being the only constant, it brings us an opportunity to evolve and innovate
cyber risk management practices. 

advertisement


With more technology breakthroughs and frequently changing market trends, there
is a huge opportunity for organizations to leverage cyber to introduce more
value and competitive differentiation for their customers while preemptively
addressing unexplored risks and threats on the horizon. 

Whether planning for near-term market innovations or complying with increased
regulatory and reporting requirements, organizations need to actively assess and
build a unified cyber strategy to position the business to be agile enough to
seize future opportunities before they emerge.” 

— Deloitte’s US Cyber & Strategic Risk leader, Deborah Golden 


6. ORGANIZATIONAL RESILIENCE WILL CONTINUE TO BE THE FOCUS 

advertisement


“As the digitization of business continues, organizations are becoming more
connected within the global marketplace thus expanding the attack surface and
increasing the frequency and impact of disruptions. The multitude of supply
chain, geopolitical, environment and cyberattack events organizations are facing
challenge traditional risk programs and are drawing increased regulatory
scrutiny. 

By leading with an integrated view of scenarios that threaten core business
operations, organizations can employ new techniques and technologies which
develop situational awareness to emerging threats and improve their ability to
respond to disruptions.” 

— Deloitte’s US Technical Resilience leader for the Cyber Risk Services
Infrastructure practice, Pete Renneker 


7. COMPLEX SUPPLY CHAIN SECURITY RISKS WILL CONTINUE TO EMERGE 

“Today’s hyperconnected global economy has driven organizations to heavily
depend on their supply chains — from the components within their physical and
digital products to the services they require to run their day-to-day
operations. 

advertisement


This critical interdependence makes supply chain security and risk
transformation an imperative for today’s globally connected businesses. 

Organizations now require a holistic approach, which includes shifting away from
point-in-time third-party assessments toward real-time monitoring of third-party
risks and vulnerabilities in inbound packaged software and firmware components. 

For instance, this includes implementing leading practice techniques around
ingesting Software Bill of Materials (SBOMs) and correlating the output to
emerging vulnerabilities, identifying risk indicators such as geographical
origin of the underlying components, and providing visibility to transitive
dependencies. 

Organizations are also focusing on deploying and operating identity and access
management (IAM) and Zero Trust capabilities that better enforce authorized
third-party access to systems and data and reduce the consequences of a
compromised third-party.

advertisement


The threats introduced into the supply chain continue to evolve in complexity,
scale, and frequency, so organizations need to continue the momentum with
innovating and maturing their supply chain security and risk transformation
capabilities.” 

— Deloitte US Cyber Risk Secure Supply Chain leader, Sharon Chand 


8. ORGANIZATIONAL TALENT CONSOLIDATION AND OUTSOURCING WILL EVOLVE DUE TO SEVERE
CYBER TALENT SHORTAGE AND GROWING LABOR COST 

advertisement


“With the breadth, complexity and frequency of cyber security risks
exponentially increasing by the day and the increased pressure from stakeholders
(regulatory, boards and employees) to manage cyber security risks –
organizations have a huge demand for skilled and experienced cyber talent. 

This need compounded by cyber talent market shortages, particularly of highly
trained specialized skillsets, makes attracting and training niche, hard-to-find
talent extremely difficult. Organizations are scrambling to fill required
positions, impacting their ability to manage cyber risks.

As this talent shortage continues to grow, more organizations will consider
alternatives such as outsourcing and management of core cybersecurity functions.
To remain agile and optimize operational processes, organizations will need to
focus on hiring and retention of niche cyber talent along with outsourcing
strategies.” 

— Deloitte’s US Cyber & Strategic Risk leader, Deborah Golden 

advertisement



9. CLOUD SECURITY APPROACHES, PRODUCTS AND TECHNOLOGY WILL MATURE AT AN
ACCELERATED PACE 

“The proliferation of cloud services and the advent of new development
methodologies like devops are creating unprecedented possibilities, driving many
organizations to migrate to the cloud and modernize existing applications. This
evolution presents opportunities for business growth through accelerated
development, enhanced scalability and collaboration, new revenue streams,
business agility, and greater technical resilience. 

As these deployments mature and more data and business functions are hosted in
the cloud, there is increasing awareness that benefits can be wiped out by
costly regulatory missteps and damaging cyberattacks if security is not woven
into the transformation process. 

By embracing security and digital transformation together, and leveraging
intersectionality of cloud-based architectures, modernized “secure-by-design”
processes to enhance developer experience and adoption of zero-trust principles,
organizations can enable agile secure transformation to promote greater
confidence.” 

— Deloitte’s US Cyber Cloud leader, Vikram Kunchala 

advertisement



10. EVOLVING THREATS TO OPERATIONAL TECHNOLOGY IN MANUFACTURING AND OTHER
ENVIRONMENTS 

“Cyber attackers are increasingly weaponizing Operational technology (OT)
environments to attack hardware and software that control industrial processes
and secure OT networks. Skilled workforce shortages and overlapping IT and OT
environments can make cyber incident containment difficult. 

Organizations can implement cyber threat identification, detection, and
prevention controls to address OT security risks by taking steps inclusive of
increasing visibility to devices, implementing OT network segmentation,
implementing security tools for the OT environment, correlating security
information from OT and IT networks, and establishing security operations
centers (SOCs) that address both.” 

— Deloitte’s US and Global Cyber OT Leader, Ramsey Hajj 

VentureBeat's mission is to be a digital town square for technical
decision-makers to gain knowledge about transformative enterprise technology and
transact. Discover our Briefings.




INTELLIGENT SECURITY SUMMIT ON-DEMAND

Did you miss a session at Intelligent Security Summit? Head over to the
on-demand library to hear insights from experts and learn the importance of
cybersecurity in your organization.

Watch Here


 * VentureBeat Homepage
 * Follow us on Facebook
 * Follow us on Twitter
 * Follow us on LinkedIn
 * Follow us on RSS

 * Press Releases
 * Contact Us
 * Advertise
 * Share a News Tip
 * Contribute to DataDecisionMakers

 * Careers
 * Privacy Policy
 * Terms of Service
 * Do Not Sell My Personal Information

© 2022 VentureBeat. All rights reserved.