Deloitte To Invest £430 Million On Cybersecurity Defences

As cyber threats continue to evolve, threatening the security of consulting firms and clients alike, Deloitte has announced plans to significantly boost its cyber security offering. Having already commenced a hiring spree in the field in Europe, the firm will now invest £430 million into its cybersecurity line, following a major breach of its defences in 2017.

As of last year, Deloitte remains the largest global provider of cybersecurity consulting. The firm raked in $2.8 billion in revenues from the service line in 2016 alone, the largest part of a billion more than its nearest competitor, fellow Big Four firm EY. 

Meanwhile, top ten competitors such as BAE Systems have actually scaled back spending on the lucrative business, meaning Deloitte’s position as the leader of the pack looked increasingly reassured.

However, 2017 was also the year that the Deloitte was hit by a major breach of security. A hacker compromised the firm’s global email server through an “administrator’s account” that, in theory, gave them privileged, unrestricted “access to all areas”, including significant aspects of US governmental apparatus. 

Despite Deloitte referring to the process as a “sophisticated hack” meanwhile, the Guardian newspaper revealed the breach to the public, also reported sources having stated that the account required only a single password, and did not have “two-step” verification.

While a subsequent investigation from disgraced former New York Attorney General Eric Schneiderman seems to have vanished following his exit from office amid sexual abuse allegations, Deloitte remains keen to avoid any further controversy on the matter. As a result, the Big Four firm has announced plans to pump £430 million into bolstering its own cybersecurity defences. 

As well as helping to restore the trust of clients in the firm’s security, Deloitte’s increased cyber security budget will go towards advanced monitoring capabilities, more staff for the cyber team and new technologies to improve data protection. 

The news follows the announcement of the company’s European practice in March that it planned to hire another 500 staff to work in cyber security by the end of 2018. The first marquee hire of this intake was former Executive Director of European law enforcement agency Europol, Rob Wainwright, who arrives at the firm in June with a remit to focus on cyber-crime and fraud.

Larry Quinlan, Deloitte’s global Chief Information Officer, said the firm was upping its spending in the area to combat cyber threats which are “evolving and persistent”. He further explained, “Cyber threat management is a fundamental part of doing business today and requires more than just the right technology and infrastructure. It requires the right behaviours as well.”

Quinlan then pointedly added, “No company or industry is immune from a cyber incident.”

This is something that entities of all shapes and sizes will be well aware of. Last year fellow consultancy Accenture was caught out with lax cyber defences, having left client information in a unprotected cloud server. 

Financial institutions are the most common target, perhaps unsurprisingly, with large companies including Equifax, JPMorgan, Merck and DLA Piper among those that have fallen victim to high-profile hacks of late. 
The implementation of Europe’s long heralded General Data Protection Regulation in May has also added further pressure on companies to boost their defences, with fines for breaching the rules of up to €20 million, or 4% of a company’s turnover, depending which is higher.

Similarly, to Deloitte, the UK National Health Service was also caught out by a low-level hack in 2017. The WannaCry ransomware which breached patient data was able to enter the system via a gap left by legacy software which had not been updated beyond Windows XP as a cost-cutting measure for the cash-strapped NHS. Now the NHS is set to spend £150 million on cyber security to avoid future breaches of this kind.

Consultancy UK:

You Might Also Read: 

Deloitte Hit by Cyber Attack: Clients' Private Data Exposed:

Europol Chief Moves to Deloitte:

 

« British Universities Have Many Cyber Threats
Trump / Kim Summit Attracts A Heavy Wave of Cyber Attacks »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Vanguard Integrity Professionals

Vanguard Integrity Professionals

Vanguard Integrity Professionals is an independent provider of enterprise security software solutions that address complex security and regulatory compliance challenges.

CyberPolicy

CyberPolicy

CyberPolicy is a cyber protection solution for small businesses. It combines three important components against cyber threats - Cyber Plan, Cybersecurity and Cyber Insurance.

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

Garrison Technology

Garrison Technology

Garrison SAVI® is a unique technology for secure remote browsing that can dramatically change the risk profile for enterprise cyber security.

OGiTiX

OGiTiX

OGiTiX Software AG is a German software manufacturer specializing in Identity and Access Management.

DataProtect

DataProtect

DataProtect is a specialized information security company providing consultancy, information management, integration and training services.

Rizikon Assurance

Rizikon Assurance

Rizikon Assurance is an Online System that improves Third-Party Assurance and Risk Management, through efficiency, automation and better visibility.

Infinidat

Infinidat

Infinidat delivers enterprise-proven solutions for data storage, data protection, business continuity, and sovereign cloud storage.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

PhishFirewall

PhishFirewall

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform.

Hayes Connor Solicitors

Hayes Connor Solicitors

Hayes Connor Solicitors is a specialist data breach and cybercrime law firm. We act for clients on individual data breaches and also where a group has been compromised as part of a targeted attack.

Infinipoint

Infinipoint

Infinipoint pioneers the first Device-Identity-as-a-Service (DIaaS) solution, addressing Zero Trust device access and enabling enterprises of all sizes to automate cyber hygiene.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Softsource vBridge

Softsource vBridge

Softsource vBridge are an ICT systems integrator providing specialist technology solutions, professional services, technical expertise and data centre services.

Quantum Knight

Quantum Knight

Quantum Knight is the most performant commercial-grade embeddable cryptography. Lock down any resource from any location or device. Take control of your data now.

Spektion

Spektion

Spektion are transforming how organizations meet the challenge of third-party software risk.