Future of Cyber
Future of Cyber
Future of Cyber
THE PROMISE
OF CYBER
Enhancing transformational value
through cybersecurity resilience
2
GROWING
needs keep redefining priorities and possibilities for
organizations operating in every industry.
VALUE OF
Getting a clearer view into the future of cyber is We are excited to share key findings from the survey
a constant undertaking, allowing us to not only and invite you to explore them here. In the following
stay ahead of emerging risks but to identify new pages, you’ll find a blend of data-driven insights plus
CYBER
possibilities for business value. observations based on Deloitte’s deep global cyber
experience, as well as reflections provided directly
In this, the 4th Edition of Deloitte’s Global Future by interview respondents. Take a look and, if you are
of Cyber Survey, we get that clearer view. We see interested in a deeper dive, we would love to hear
that the link between cybersecurity and business from you.
value is growing stronger—with cyber becoming
increasingly integral to enabling tech-driven Happy reading,
programs and driving business outcomes. We
see also how the role of C-suite leaders, including
the chief information security officer (CISO), is
evolving as cyber considerations intensify across
the enterprise. Emily Mossburg
Deloitte Global Cyber Leader
3
WHAT’S INSIDE
• Connections between
cyber maturity, confidence,
and benefits 25
VIEW FROM THE TOP 4
A NEW ERA OF
TRANSFORMATIONAL
CYBER STRATEGIES
Focusing on outcomes and resilience
The future of cyber is constantly evolving That powerful connection between cybersecurity and
as organizations across the globe deal with business impact comes into sharp focus in Deloitte’s
ongoing business complexity and change, 4th Edition of The Global Future of Cyber Survey—
as well as a myriad of new threats and risks. which asked nearly 1,200 leaders in various industries
Yet one thing remains constant: Cyber and worldwide to share their views on cyber threats,
business value are deeply intertwined, enterprise activities, and the future. The survey included
and cybersecurity stays central to how C-suite executives across the enterprise, as well as other
organizations in every industry consistently senior leaders with responsibility for IT, security, risk,
deliver the outcomes they desire. and the business.
VIEW FROM THE TOP 5
52%
and becoming an essential part of the framework for organizations’ cyber maturity and having greater
delivering business outcomes. confidence in adequately navigating cybersecurity. In
fact, among high-cyber-maturity organizations, that
In this 4th edition of the survey, we see that, in confidence in the C-suite and board grows to 82%—
addition to cyber strategy being essential to unlocking compared to 52% and 39% for medium- and low-cyber-
greater business value, cybersecurity in practice maturity organizations, respectively.
has become increasingly integrated into technology of respondents are very
transformation activities. We also see that the voice of The survey’s findings indicate that, on average, 86% of confident in the C-suite and
cyber leadership—in particular, the CISO—has grown respondents are implementing actions to a moderate
board’s ability to adequately
in importance, along with the emergence of a new or large extent to increase cyber strategies and actions,
cyber-savvy C-suite. embracing cyber as an essential component of the
navigate cybersecurity.
enterprise. And, on average, 85% of respondents
Despite the growing focus on cybersecurity, expect to achieve their desired business outcomes to
only about half (52%) of all respondents are very a moderate or large extent. While this underscores the
confident in the C-suite and board’s ability to critical role cyber plays in driving successful strategy
adequately navigate cybersecurity. And specifically implementation, not all organizations will realize those
among C-suite respondents who are focused mainly benefits equally.
on cybersecurity, only 34% are very confident—
suggesting that they have less confidence in their And the more cyber-mature the organization, the
abilities than others do. bigger the potential impact. The survey found that
respondents in high-cyber-maturity organizations
anticipate almost two times the positive business
Respondents in high-cyber-maturity
outcomes compared with their peers. How these high-
cyber-maturity organizations view cybersecurity—and
organizations anticipate almost
how they are taking action—provides insights and
a potential path for others to follow as they seek to
two times the positive business
increase their own cyber maturity.
outcomes compared with their peers.
VIEW FROM THE TOP 6
The leaders of high-cyber-maturity organizations The steps organizations take today should focus WHERE ORGANIZATIONS ARE FEELING THE PAIN (FIGURE 1)
understand that being prepared to respond to and on how cyber investments can optimize, preserve, Cybersecurity incidents and breaches are resulting in these top negative consequences
recover from the inevitable attack—to get their protect, and create value for the organization. for survey respondents.
businesses back up and running quickly, and to serve That includes laying a strong foundation for future
their customers—is what matters most. growth through cyber practices that enable data Negative consequences resulting 3rd Edition 3rd Edition 4th Edition 4th Edition
security and integrity across digital products and from cyber incidents and breaches (Rank) (Percent) (Rank) (Percent)
What are organizations hoping to prepare for (or infrastructure. That foundation also should incorporate
Loss of confidence in tech integrity 6 55% 1 66%
avoid) as they become more resilient—and how has the fundamentals of a responsive infrastructure and
the picture changed? Compared with the previous digital ecosystem—for enabling future growth and Operational disruption
1 58% 2 66%
edition of the survey, a loss of confidence in tech business resilience. This edition of the survey shows (including supply chain/or partner ecosystem)
integrity (i.e., reliability, accuracy, and availability a marked trend toward cyber programs and CISOs Reputational loss 4 55% 3 65%
of systems and data) has risen to the top of the gaining greater strategic influence across all these
Negative talent recruitment/retention impact 7 54% 4 64%
list as the number one negative consequence of value streams through more integrated technology
cybersecurity incidents or breaches—becoming transformation strategies—especially among the most Loss of revenue 2 56% 5 64%
increasingly important as organizations accelerate cyber-mature organizations. Loss of customer trust/negative brand impact 3 56% 6 63%
their digital transformation journeys.
An effective approach to cybersecurity should Intellectual property theft 8 54% 7 63%
Operational disruption, including supply chain or extend beyond the traditional focus on incident Regulatory fines 10 52% 8 63%
partner ecosystem disruption, remains high on response. It should delve into the core of how
Drop in share price 9 52% 9 63%
the list, in the number two spot, underscoring the businesses need to integrate cyber—risk, security,
importance of business continuity across partners and and trust—into their overall strategy. Adopting a Defunding of a strategic initiative 5 55% 10 63%
infrastructure. However, there is also a notable shift, as holistic, business-oriented perspective allows you to
this was the top concern in the previous edition of the bridge broader business objectives and operational
“
survey. Reputational loss climbed up one place as the needs. This approach ensures that cyber is not just
number three concern (Figure 1). a reactive measure but a proactive, integral part of Our threat surface is quickly increasing.
the organization’s strategic business, technology, As we connect our factories with new
and operational framework. Moreover, Deloitte’s technologies, new risks emerge. As soon as
research illustrates that the most cyber-mature we tie in a supplier’s robot who wants to call
organizations in the market are gaining significant back to the manufacturer for maintenance
value through a similar business-oriented approach. or push a software package to an assembly
line component, things gets much more
complicated.”
HOW WE
Deloitte also conducted in-depth interviews with At the core of this research, we focused our efforts
senior cyber decision-makers across various on exploring how cybersecurity has changed
industries and geographies, to glean more detailed since the last edition of our report while applying
DEVELOPED
insights and to help validate our observations. Our a forward-looking lens, to help bring the future of
approach covered every aspect relevant to the cyber into sharper focus. We also wanted to get a
future of cyber, from strategy to tactics and culture clearer view into the cyber savviness of the C-suite
THE INSIGHTS
to technology implementation. today. Throughout the survey, we have looked to
unlock insights for better understanding the cyber-
related business value and impact organizations
are experiencing, as well as the distinct actions that
leading organizations are taking to increase value.
41%
EMEA
Europe/Middle East/Africa
KEY FINDINGS 9
CYBER INFLUENCES
STRATEGIC VALUE
Working toward a bigger business impact We will examine how…
CYBERSECURITY
REMAINS AN
Taking action is a first step,
but not the only step
Most respondents are taking the need for
These respondents are focusing on a variety of
activities for managing cybersecurity, including
but not limited to: mitigating risks, enhancing
“ It’s really about getting the basics right
and maturing them and being excellent at
them, every day, consistently. Things like
cybersecurity action seriously, with 86% of them cybersecurity controls, improving incident response, foundational controls, asset management,
ESSENTIAL ELEMENT implementing specific activities/actions to a moderate increasing employee awareness, and adopting a vulnerability management. You really need to
FOR STRATEGIC
or large extent to increase cybersecurity. This level of strategic cybersecurity plan. excel there, almost mindlessly. They just have
action suggests that organizations overwhelmingly to happen”
BUSINESS VALUE— understand the need for these activities and a robust
cybersecurity program to implement them. It also
When we project those activities through the lens of
cyber maturity, we see that organizations with high —CISO, Life Sciences and Healthcare Organization
AND THE FOCUS IS suggests that they are keeping pace as the list of
activities they need to stay on top of continues to grow.
cyber maturity undertake these actions to a greater
extent compared to less cyber-mature organizations
INTENSIFYING. (Figure 2, see also Cyber Maturity, page 25).
48 48
45 45 45 44 44 44 45
45 44 44 43 43 43 40 41 42 42
42 41 41 40 40 40 39
32
29 28 28 28 28 27 29 27
24 25 26
23
86%
A strategic Our cyber- Annual A cyber- A compre- Inventory of Enhanced Full and updated Cybersecurity Action plan Purchasing Third-party Ongoing,
cyber- security practices cybersecurity security incident hensive plan software controls and inventory of exercises are for maintaining cybersecurity cybersecurity voice-of-the-
security plan are guided awareness response plan to assess components measures to assets and conducted basic hygiene insurance risk management customer input
with the by industry- training among that gets how we protect (e.g., APIs) is protect criticality are at the C-Suite controls to monitor and to understand
organization’s specific all employees updated and data where it maintained your customer/ maintained level to stress (e.g., inventory track the security cybersecurity
of respondents reported vision for the standards and tested annually is stored, consumer test response of IT assets, posture of and data privacy
future and an practices processed, and Identity, access, plans, commu- classification of partners and preferences
implementing specific operational transmitted and reduce nications, and data, patching suppliers
plan on how to identity fraud recovery and vulnerability
activities/actions to a get there strategies management)
moderate or large extent to
increase cybersecurity. TOTAL (n=1,196) Low cyber maturity (n=421) Medium cyber maturity (n=612) High cyber maturity (n=163)
KEY FINDINGS 11
GETTING STRATEGIC ABOUT CYBERSECURITY (FIGURE 3) Guided by strategy, cybersecurity execution Overall, 83% of respondents surveyed agree or
The specific strategies respondents say they are undertaking to enhance and improve cybersecurity. gets more integrated across the business completely agree that such measures are an integral
The overwhelming majority of organizations are part of their overall cybersecurity strategy. This level
We have a governing body comprised of senior business and IT leaders, to oversee cybersecurity capabilities and investments. also embracing a number of strategic cyber actions of agreement suggests continued integration of
2 12 45 41 including: benchmarking and measurement, cybersecurity strategy into the business.
collaborating with trusted providers, participating
in consortia for information sharing, and establishing
We partner with trusted provider(s) to deliver specific cybersecurity outcomes or to operate key cybersecurity capabilities.
governing bodies that comprise senior business
3 12 46 39 and IT leaders to oversee cybersecurity capabilities
and investments.
We employ qualitative risk assessments to measure the return on our cybersecurity investments.
2 15 44 39
3 15 43 39
We employ risk quantification tools to measure the return on our cybersecurity investments.
1 3 15 43 38
3 15 45 37
83%
3 13 48 36
Eyeing bigger cybersecurity Continuously prioritizing and building cybersecurity SPENDING ON THE RISE (FIGURE 4)
investments amid increasing threats connections across business and technology 57% of respondents anticipate increasing their cybersecurity budgets over the next 12 to 24 months.
More than half of the global respondents surveyed operations, as well as leadership, is crucial for (In US dollars and percent)
(57%) anticipate increasing their budget for organizations to differentiate themselves and achieve
cybersecurity over the next 12 to 24 months. Fifty- strategic outcomes successfully. A cyber-mature $500M–$1B (n=314)
eight percent of respondents also indicated that they organization understands that cybersecurity is not 2 36 62
expect to begin integrating their cybersecurity spend just an IT issue but a business-critical imperative
with budgets for other programs, such as digital that requires integration across all functions and
$1B–$5B (n=378)
transformation initiatives, IT programs, and cloud levels of the organization. By fostering such strong
investments. This level of investment and budget cybersecurity connections, organizations can 4 43 53
integration underscores the increasingly interwoven enhance collaboration, information sharing, and
nature of cybersecurity activities across the business. decision-making related to cybersecurity. $5B–$10B (n=253)
It also emphasizes the reality that cyber funding is a
6 33 61
zero-sum game, as cybersecurity is often overlooked This approach enables leaders to make informed
during transformation projects, to save costs in a strategic decisions that align with business objectives
$10B+ (n=251)
zero-sum environment. and mitigate cyber risks effectively. Ultimately,
organizations that prioritize cybersecurity and build 8 36 56
strong cybersecurity connections—integrating cyber
across enterprise functions and leadership roles— All respondents (n=1,196)
can better protect their assets, reputation, and overall 5 57
38
resilience in an increasingly digital world.
THE THREATS THAT ARE BREAKING THROUGH (FIGURE 5) Attack realities are growing, including The survey also tracks how respondents are responding
Where cybersecurity breaches are coming from—and how many organizations are experiencing them. new threats and cyber risks related to to new cyber risks arising from the emergence of GenAI.
(Percentage, 3rd edition vs. 4th edition) Generative AI (GenAI) The analysis shows awareness of these risks is more
The expected increase in investments comes as pronounced among high-cyber-maturity organizations
Actors/sources Tools/techniques
organizations experience a growing and diverse mix versus less-mature counterparts. Among the most
42
of cyber threats. Similar to the previous edition of cyber-mature organizations, these are the top four
42% the survey, cyber criminals and terrorists make up GenAI-related risks that respondents believe will impact
34
32 the top threat actors. They were reported by 42% of their cybersecurity strategy:
28 27 respondents as the leading concern across a diverse
• Explainability in GenAI outputs (82%)
24
22 set of threat actors, which included hacktivists (threat
21
18 18 17
actors aiming to make a statement related to political • GenAI algorithms introducing information
13 13
14 or social causes), cyber criminals (perpetrating integrity risks (81%)
11 11 12
malicious activities for financial profit), and insiders
8
7 7 • Effectively developing controls related to
6 6 6 (with personal grievances and gains at stake).
4 GenAI and humans working together (81%)
As for the tools and techniques employed by • Data poisoning (e.g., corrupting the training
Cybersecurity
criminals
Cybersecurity
Unintended actions of
terrorists
well-meaning employees
resulting in a negative event
Malicious employees
Organized crime
Hacktivists
Nation-states
Phishing/malware/
ransomware
Data loss
related threats
APTs (Advanced
Persistent Threats)
DoS
(Denial-of-Service
Attacks)
cyberattackers, phishing, malware, and ransomware data set to influence GenAI outputs) (80%)
combined emerged as the top threat vector, reported
by 34% of respondents. That level is down eight As more organizations automate their processes
percentage points from the previous survey, coinciding and share their data with suppliers and other third
with a significant jump in reported threats related to parties, new vulnerabilities can emerge. These
data loss—up from 14% in the previous survey to 28% increasingly complex digital infrastructures and
in this survey. ecosystems introduce new opportunities for attack.
Number of breaches
“
Meanwhile, 40% of respondents said they have
40
36
38 publicly reported six to ten cybersecurity breaches verything—and everyone is so interconnected,
E
34
in the past year—an increase of two percentage that the risk is magnifying. Think about our entire
points compared to the previous survey. And it is supply base. Think about all the levels of security
14 15
9 9
40%
of respondents say they
no surprise that attacks continue to trend upwards.
The attack surface available to threat actors is large
and continues to grow.
capabilities across the whole spectrum of companies
out there. We feel pretty good about what is
happening on our campus and with our employees.
But how do we ensure everyone coming in contact
3 2 have publicly reported six to with our network has the same level of capability
1–5 6–10 11–15 16 None ten cybersecurity breaches and capacity to deal with security and controls?”
or more in the past year.
—Patrick Milligan, Chief Information Security Officer,
3rd Edition (n=1,110) 4th Edition (n=1,196) Ford Motor Company
KEY FINDINGS 14
Technology integrity is the top concern among TAKING A CLOSER LOOK AT THE NEGATIVE CONSEQUENCES, THROUGH THREE LENSES (FIGURE 6)
respondents as expectations for the benefits Where respondents see cybersecurity incidents having the biggest impact across financial, operational, and brand areas.
to be gained from cyber programs grow (Percentage)
Amid the persistent web of threats, organizations
are experiencing a range of negative effects, Financial Operational Brand
including impacts across three domains—financial,
operational, and brand (Figure 6). Overall, across 66 66
65
all three of these domains combined, the top two 64
63 63 63 63 64 63
concerns are loss of confidence in tech integrity
and operational disruption (Figure 1, page 7). This 56 58 56
55 55 55
continued focus underscores the importance of 54 54
52 52
having strong cybersecurity programs that can
maintain critical technologies and operations, and
boost business resilience.
in tech integrity
Loss of revenue
Defunding of a
strategic initiative
Regulatory fines
Operational
disruption ecosystem,
including supply
chain/partner
ecosystem
Negative talent
recruitment/
retention impact
Intellectual
property theft
Reputational loss
Loss customer
trust/negative brand
Loss of confidence
impact
growing importance of cybersecurity in the future
and provides a clear call to action for putting in place
robust cybersecurity plans.
These negative consequences from incidents or breaches sharply contrast with the benefits—positive business EXPECTING OUTCOMES FROM CYBERSECURITY (FIGURE 7)
outcomes—that organizations expect to achieve with their cybersecurity initiatives. According to the survey, the The benefits that respondents anticipate from cybersecurity initiatives—and the degree to which
top three expected outcomes of cybersecurity initiatives were (1) protecting intellectual property, (2) improving they are expecting them.
threat detection and response, and (3) increasing efficiency and agility (Figure 7). (Percentage)
The expected benefits speak to the enhanced operational resilience many respondents are seeing
from their cybersecurity investments, with some variance by industry:
43 42 41 41 40 40 40 40 40
46 44 44 43
The hopes for cybersecurity are clearly high. As the primary owner of the cyber function, those expectations
Improve customer
satisfaction and retention rate
response
in tech/data integrity
Strengthen confidence
Increase information
transparency
Boost revenue
Provide confidence to
experiment and innovate
supply chain, etc.)
(n=1,196)
KEY FINDINGS 16
The cloud
Quantum computing
Artificial Intelligence/
cognitive computing
Generative AI
Data analytics
5G
Operational technology
Enterprise resource
planning (ERP) program
Internet of Things
Blockchain/cryptocurrency
Metaverse
Physical robotics
Involvement significantly decreased Decreased No change Increased Involvement significantly increased
(n=1,196)
KEY FINDINGS 17
As the CISO’s voice of influence grows across The analysis indicates that cyber-mature organizations CYBERSECURITY SAVVINESS IN THE C-SUITE AND A LOOK AT THE CISO’S REPORTING ALIGNMENT
leadership, and as organizations seek to become understand that the role of the CISO has become (FIGURE 9)
more cyber-savvy, we foresee them becoming an crucial to engaging the C-suite and the board, and key A look at the level of confidence leaders have in the C-suite, as well as an overall view on who
essential partner to advise and educate the board to addressing cybersecurity risks effectively. They CISOs report to.
of directors and the C-suite on security vulnerabilities, recognize that, in taking on a more influential role, (Percentage)
risk scenerios, and actions needed for greater the CISO can provide valuable insights and guidance,
resilience. In the future, the CISO will be expected to and ensure that cybersecurity receives the attention CISO/cybersecurity leader Confidence in C-suite and board of directors
not only lead the organization’s overall cyber security and resources it deserves—as a strategic business reports to the following leaders adequately navigating cybersecurity
strategy, but will also provide strategic guidance, issue requiring continuous attention and investment. 27
collaborating closely with other C-suite executives While Deloitte sees this trend with the CISO role 4 1
to align security initiatives with business goals. growing, we recommend organizations accelerate their
actions to elevate the CISO’s role, given the evolving
Among C-suite executives focused on cybersecurity, nature of cyber threats, technology capabilities, and Very confident
only 34% are very confident their C-suite and board cybersecurity’s integration with the business. Somewhat confident
20
can adequately navigate cybersecurity. They are 18 Neither confident
43
percentage points less confident than respondents While most say the CISOs role is evolving, and 18 52 nor unconfident
overall (Figure 9). they have a seat at the table, there is still a lack of Somewhat unconfident
confidence that the C-suite can confidently navigate (n=1,196)
today’s complex cyber environment. These lower
confidence levels could indicate a sobering of the
C-suite to the complexity of today’s cyber landscape
11
as CISOs effectively educate them to risks/threats and
the organization’s ability to address them as well as an
8
over-confidence in the organizations’ cyber maturity 7
and resilience among respondents overall.
Officer (CIO)
Chief Executive
Officer (CEO)
Chief Technology
Officer (CTO)
Chief Information
Board of Directors
Chief Strategy
Officer (CSO)
Chief Security
Officer (CSO)
Chief Operating
Officer (COO)
Chief Financial
Officer (CFO)
Business Information
Security Officer (BISO)
88%
on strategic risks and corresponding actions. On
this point, Deloitte’s Tech-Forward Boardroom report
recommends that to elevate boardroom conversations,
tech leaders can translate technical jargon to business
needs, partner more closely with the CFO to articulate
business impacts, consistently structure reporting and
benchmarking, co-present to the board, workshop of respondents say that
through deep-dive technology sessions, create
their boards are addressing
feedback loops, and cascade these activities across
small board sessions and meetings.
cyber-related issues quarterly,
if not more often.
PROGRAMS AND
customer data and foster greater digital trust.
Such considerations indicate that DevSecOps
Maintains the talent and skills needed to effectively execute the cybersecurity strategy.
DIGITAL BUSINESS
processes are reaching a new level of maturity,
with cybersecurity leaders successfully embedded 3 14 44 39
2 15 44 39
The boundaries of cybersecurity are blurring,
just as the lines of digital transformation
are blurring. As organizations share data Is proactive in identifying and addressing vulnerabilities in our cybersecurity systems.
and systems access with partners and other 3 16 43 38
third parties, concerns about security and
privacy are paramount. Ultimately, the growth Places ethical considerations (e.g., fairness, transparency, accountability, inclusivity) as a top three priority shaping our
cybersecurity strategies.
of business, customer, data, and digital
trust depends on cyber. Accordingly, many 3 15 45 37
3 14 47 36
The integration of cybersecurity into more aspects of Those two majority views are not at odds; 25% of WHERE CYBERSECURITY SPEND AND DIGITAL TRANSFORMATION INTERSECT (FIGURE 11)
the business extends to spending, as well. As previously respondents selected both options—integrated How do you see the evolving digital landscape impacting your organization’s cybersecurity spend?
noted, a majority of respondents (58%) expect spending as well as siloed spending—when asked Select all that apply.
cybersecurity spend will begin to become integrated about the future of cybersecurity spend. That duality (Percentage)
with other budgets for initiatives such as digital reflects what Deloitte sees across organizations,
transformation, IT programs, and cloud investments. with cybersecurity spend often coming from a mix of Spend will begin to be INTEGRATED into/with other budgets
At the same time, a majority (55%) also see spend dedicated cybersecurity budgets, as well as budgets for (e.g., digital transformation, IT, cloud investments)
remaining siloed (Figure 11). IT, digital transformation, business areas, and products.
58
In other words, the scale of cybersecurity spend slices
25%
across many priorities, requiring leaders to explore
different, often concurrent models, to finance it. Spend will remain SILOED and SEPARATED from other
budgets (e.g., digital transformation, IT, cloud investments) Around 25% of the respondents
selected both the options—that
55 spend will be integrated in some
areas while staying siloed in others.
37
18
(n=1,196)
58%
Note: Percentages may not add up to 100% due to rounding.
of respondents expect
cybersecurity spend will
begin to become integrated
with other budgets.
KEY FINDINGS 21
That march toward cybersecurity budget integration tracks closely with another emerging reality: Cybersecurity THE ROLE CYBERSECURITY PLAYS IN SECURING TECHNOLOGY INVESTMENTS (FIGURE 12)
is a driver of business ambitions. Our survey results show that cybersecurity plays a large role in securing an How cybersecurity is influencing decisions on budgets in technology capabilities.
organization’s investment in technology capabilities—especially when it comes to the priority areas such as (Percentage)
cloud (48%), GenAI (41%), and data analytics (41%) (FIgure 12).
30
36 31
41 39 39 39 34 32
39 39
48 41
37 40 40
39
40 41 45 43
39 41
40 42
37
18 17 20
17
17 15 18
16 15 16 15
13 13
11 10 9
4 8
2 4 3 3 3 4 3 3
The cloud
Data analytics
AI/cognitive computing
Operational technology
Quantum computing
Generative AI
5G
IoT
ERP program
Metaverse
Blockchain/cryptocurrency
Physical robotics
“ For our group, which operates globally, strengthening security is a crucial activity that is
essential for promoting digital transformation. We have established an internal structure
called the JFE-Security Integration and Response Team, allocating resources such as budget and
personnel, and implementing necessary measures in terms of human, technological, and physical
aspects. We aim to enhance cybersecurity measures in various business activities, including
the development, design, manufacturing, and provision of products, systems, and services.
As a result, we contribute to strengthening cybersecurity throughout the supply chain and,
No role at all Small role Moderate role Large role
ultimately, to the overall cybersecurity enhancement of society on a global scale.”
(n=1,196)
—Akira Nitta, Chief Information Security Officer, JFE Steel Note: Percentages may not add up to 100% due to rounding.
KEY FINDINGS 22
CYBERSECURITY ACTIONS TAKEN TO REDUCE CLOUD ECOSYSTEMS (FIGURE 13) When it comes to cloud technologies, cybersecurity has a major role to play as an enabler, helping bolster security
What cybersecurity actions is your organization taking to reduce complexity across your cloud while simplifying the cloud landscape overall for organizations. The top cybersecurity actions respondents are
ecosystems? taking to reduce the complexity of cloud ecosystems include conducting regular security audits and assessments
(Percentage) (44%), implementing consistent security policies and procedures (45%), and employing cloud ecosystem
monitoring technology across multiple parties and solutions (46%) (Figure 13).
46
45
44
43 43
40
36
34
46%
Employing Implementing Conducting Deploying Establishing clear Leveraging Implementing Sharing threat
cloud ecosystem consistent regular security identity and agreements and automation tools zero trust intelligence with
monitoring security policies audits and access governance for security tasks security model others
technology and procedures assessments management measures
across multiple within the controls
parties/solutions ecosystem of respondents reported
employing cloud ecosystem
(n=1,196)
monitoring technology
across multiple parties
and solutions.
KEY FINDINGS 23
Eye on AI-enabled cyber solutions And while the future of AI is evolving, so too is AI CAPABILITIES COMING INTO FOCUS (FIGURE 14)
Given the importance of AI today, we included it the future of cyber. They are evolving together as Where and how respondents are seeing AI emerge as a tool in their cybersecurity programs.
in our index for cyber maturity in this edition of organizations leverage novel AI solutions to ease the (Percentage)
the survey. Some of the top ways organizations cybersecurity burden. Among survey respondents,
are focused on using AI to enhance cybersecurity 39%, on average, are using AI capabilities in their Deploying AI-based tools to continuously monitor the organization's digital infrastructure
capabilities include digital infrastructure monitoring, cybersecurity programs to a large extent. At the same 1 13 44 42
advanced simulations, and automated security. time, respondents have also expressed concerns
related to AI, expressing a need to update their
Generating advanced cybersecurity simulations
Artificially generated content enables attackers cybersecurity strategies to keep up with continuous
to create customized content with a much lower technology innovation (Figure 14). 2 14 44 40
time investment. A wave of artificially generated
content is now targeting enterprises, exploiting
vulnerabilities by impersonating trusted sources.
The problem is accelerating rapidly. None of this
“ Of course, the focus is keeping the bad
guys out. But we also have to look into the
impact of these new technologies (like AI) 2
Automating security processes such as network monitoring, anomaly detection, and threat response using AI
14 45 39
means enterprises are powerless against the tidal and how that will impact our landscape.
wave of artificially generated content coming their How do we make sure that we apply and Enabling faster response time to potential security threats
way. Leading enterprises are taking proactive steps use AI in a safe and secure manner, as well
to make sure they don’t become victims (Source: 2 12 47 39
as how we use AI to better deliver security
Deloitte 2024 Tech Trends: Defending reality: Truth in within our cyber framework?”
an age of synthetic media). Analyzing cybersecurity data in real-time, to understand complex relationships and identify novel attack vectors
—Director General, Cyber and IT Security, GPS Agency
1 14 46 39
2 15 45 38
39%
of respondents, on
2
Creating dynamic defense systems
14 46 38
average, reported using Using AI to analyze historical data and identify potential cybersecurity threats and vulnerabilities
AI capabilities in their
cybersecurity programs 2 15 45 38
to a large extent.
Not at all To a small extent To a moderate extent To a large extent
(n=1,196)
KEY FINDINGS 24
THE QUANTUM CONNECTION (FIGURE 15) Readying for the next wave The data shows almost 83% of respondents are
How organizations are thinking about the approaching quantum era and the need for of emerging technologies assessing quantum-related risks or taking some kind
quantum cybersecurity readiness. As organizations continue to address AI-related risks of action, whether developing strategies, implementing
(Percentage) and opportunities, other disruptive technologies pilot solutions, or implementing solutions at scale.
are also evolving and marching steadily toward While the majority (52%) of respondents are still
Currently not concerned with quantum-related risks widespread viability. Quantum cybersecurity assessing their exposure and developing quantum-
readiness is becoming a bigger focus for many related risk strategies, others (30%) are taking decisive
4 organizations, as quantum computing gets closer to action to implement solutions as early adopters.
reality—projected to become mainstream in the next
several years and providing a powerful new tool for These figures point to clear momentum on the
Aware of quantum threats but has not yet taken action
cyberattackers to use in breaking cryptography. issue, and leaders can get ahead of the challenge by
13 understanding risk potential, reviewing their data and
system governance, prioritizing vulnerabilities relative
to business operations, and developing a roadmap for
Assessing our exposure to quantum-related risks cryptographic algorithm updates. Doing so can allow
them to get a head-start on what is often a multiyear
27
initiative and introduce new algorithms in an orderly
way across broader enterprise transformations, as well
as via updates to contracting mechanisms.
Developing strategies to address quantum-related risks
25
18
30%
30%
Implementing solutions at scale to address quantum-related risks
12
of respondents reported
taking decisive action to
(n=1,196) implement solutions as
early adopters.
KEY FINDINGS 25
REALIZING GREATER
14%
• Deployment of AI capabilities within the
CYBER ACTIONS AND related actions to a large extent (see Figure 14, page
23, for full list of actions).
Expectations run high for the CYBERSECURITY DRIVING OUTCOMES (FIGURE 16)
cybersecurity function The benefits that organizations expect to see from their cybersecurity efforts.
Respondents in high-cyber-maturity organizations (Percentage shown across all three cyber-maturity groups)
are highly attuned to the potential benefits that can
come from their cybersecurity measures. On average, Differentials between high-maturity and low-maturity segments
69 70 69 69 69
Some of those benefits include ensuring 68 67
66
organizational resiliency (76%), improving threat 63
detection and response (74%), and protecting 61
Protect Improve threat Increase Improve Strengthen Improve Increase Enable Avoid Boost revenue Ensure Provide Boost customer
intellectual detection and efficiency customer confidence brand trust information our mission/ regulatory resiliency confidence loyalty to unlock
property response and agility satisfaction and in tech/data and reputation transparency purpose fines (organizational, to experiment business value
retention rate integrity supply chain) and innovate and growth
TOTAL (n=1,196) Low cyber maturity (n=421) Medium cyber maturity (n=612) High cyber maturity (n=163)
KEY FINDINGS 27
Threat detection and response approaches EXPECTED NEGATIVE CONSEQUENCES, BY MATURITY GROUP (FIGURE 17)
continue to evolve Respondents with high cyber maturity are seeing more cybersecurity incidents—likely, in part, because of their greater threat detection capabilities.
No organization is immune to the negative (Percentage)
consequences of cyber breaches and incidents—
even high-cyber-maturity organizations. On average,
our analysis suggests that high-cyber-maturity 37 37 37
organizations have a stronger ability to detect 36
35
cyber threats and stronger diligence in complying 34 34
with corresponding reporting requirements. For 33 33 33
32
example, 25% of respondents in high-cyber-maturity 31
31 31
30 30 30
organizations reported 11 or more cybersecurity
29 29
incidents in the past year, eight percentage points 28 28 28
28 28
27 27 27
higher than overall respondents. While this may seem 27 27
26
like a negative, these organizations may have stronger 25
threat detection capabilities that allow them to more 23 23 23
22 22 22
effectively identify and respond to threats. 21
19
In addition to having greater awareness of breaches
and incidents, these organizations also understand the 17
TOTAL (n=1,196) Low cyber maturity (n=421) Medium cyber maturity (n=612) High cyber maturity (n=163)
KEY FINDINGS 28
82
52 52
52
43
42
39
18
6
4
2 4
1 0
1 0
Somewhat Neither confident Somewhat Very
unconfident nor unconfident confident confident
TOTAL (n=1,196) Low cyber maturity (n=421) Medium cyber maturity (n=612) High cyber maturity (n=163)
KEY FINDINGS 29
High-cyber-maturity organizations appear to be more adept at leveraging cybersecurity to secure investments for
technology capabilities and in keeping the CISO involved in strategic conversations on digital transformation.
On average, respondents in high-cyber-maturity organizations are 2.5 times more likely than respondents in the
low-cyber-maturity group to say that cybersecurity plays a large role in securing investments in their technology
capabilities. The top areas in which they are securing those investments include cloud, data analytics, GenAI,
operational technology (e.g., industrial control systems) and AI/cognitive computing (Figure 19).
80
72
70
67 67 66 65
63 63
53 52
50 50
48
48
44
42 42 41 42 41
41 41 40
39 39 39 39 36 38
36 35 34
33 34 33
31 32 32
27 27 27 30
26 25 25 26
24 24 23
20 20
The cloud Data analytics Generative AI Artificial Operational Internet of Things 5G Enterprise Customer Quantum Physical robotics Blockchain/ Metaverse
Intelligence/ technology resource Identity & Access computing cryptocurrency
cognitive planning (ERP) Management
computing program (CIAM)
TOTAL (n=1,196) Low cyber maturity (n=421) Medium cyber maturity (n=612) High cyber maturity (n=163)
KEY FINDINGS 30
When it comes to strategy conversations around technology capabilities, compared to the low-cyber-
maturity group, the high-cyber-maturity group is 2.3 times more likely to say that involvement by their CISO
or cybersecurity leader has significantly increased. In high-cyber-maturity organizations, the areas in which
“ The role of the CISO is evolving. They need to bring in the right strategies to proactively guide
the company in making data-driven decisions. As this entails increased engagement with
executive leadership, CISOs should not only be technologically proficient but also operate with
CISO involvement is the greatest include cloud, AI/cognitive computing, the Internet of Things (IoT), GenAI, an executive-level mindset and business acumen to demonstrate how a cyber strategy will
and data analytics (Figure 20). influence the business.”
WITH CYBER MATURITY COMES MORE CISO INVOLVEMENT IN STRATEGIC CONVERSATIONS (FIGURE 20)
High-cyber-maturity groups are seeing their CISOs brought into conversations more frequently across
all areas.
(Percentage)
56 55 55 54 54
52
50 49 49
45 44 44
39
36 36 35 35
34 34
34 34 34 33 33 32
32 31 30 31
28 30 29 28
28 29 29 28 28
27
24 23 24 24 23 23 23
22 21
19 19 19 19
The cloud Artificial Internet of Things Generative AI Data analytics Customer Quantum 5G Operational Enterprise Blockchain/ Physical robotics Metaverse
Intelligence/ Identity & Access computing technology resource cryptocurrency
cognitive Management planning (ERP)
computing (CIAM) program
TOTAL (n=1,196) Low cyber maturity (n=421) Medium cyber maturity (n=612) High cyber maturity (n=163)
LOOKING TO THE FUTURE 31
INSIGHTS FOR
NAVIGATING THE
FUTURE OF CYBER
Elevating cybersecurity across the enterprise
Thriving in the future of cyber will require As organizations establish stronger leadership and
organizations to understand the emerging strengthen cyber connections, they can enhance
trends, navigate them, and, most importantly, collaboration, information-sharing, and decision-
take action on them to deliver measurable making wherever business needs intersect with
impact for the business. By focusing on cybersecurity. Doing so can enable leaders to make
the following factors and potential steps, strategic decisions that are highly informed by the
organizations can make strides toward greater realities of their business—all aligned with business
cyber maturity and set themselves apart from objectives and the effective mitigation of cyber risks.
their peers. Ultimately, by making cybersecurity a priority and by
building stronger connections to cybersecurity across
Elevate the cyber essentials, foster the enterprise, organizations can better safeguard
connections and collaboration, build their critical assets and their reputations while
greater resilience enhancing their overall resilience in an increasingly
As the focus intensifies on cybersecurity as an digital world.
element for strategic business value, leaders should
recognize that cybersecurity is not just an IT issue;
it is a business-critical issue that calls for integration
across all functions and levels of the organization.
That will require an ability to continuously build and
prioritize the connection to cyber across business
and technology operations.
LOOKING TO THE FUTURE 32
role of the CISO is evolving ensuring that the CISO is actively involved in strategic
conversations about technology capabilities and
transformation investments is an important one. It
shows that cybersecurity is receiving the recognition it
into one that helps safeguard the business. Once seen as a lead security guard for
enterprise IT, the role of the CISO is evolving into one
deserves and suggests more departments may include
cybersecurity in their funding plans going forward.
core business operations supporting innovation and the future of the business. comprehensive strategy and better outcomes for
overall security. By establishing a clear governance
the future of the business. and board are regularly engaged in cybersecurity
conversations. Because cybersecurity is a top risk
in the organization understands the importance
of cybersecurity, commits the appropriate level of
for organizations, top leadership must remain investment, and works toward a common goal.
heavily involved in its management and oversight.
With engaged CISOs providing valuable insights and By having effective governance in place, organizations
guidance to the board and the organization on cyber can ensure that cybersecurity initiatives are aligned
matters, cybersecurity can receive the attention and with other important business priorities, but there is a
resources it merits—as a strategic business issue that possible drawback to such integrated transformational
requires continuous investment. investments. If cybersecurity is not specifically stated
as a line item in budgets, it may get diminished,
because it is treated as a portion of the cost rather than
a value-enhancing investment.
“ When it comes to strategy, one of the things that we are maturing … is starting with the
outcome. So always thinking about where do we want to be X years from now. And I believe in
security creating a strategy more than two years out, you will change a whole lot because the
threats will change, the technology will change, and so on … So we’re building based on outcome
in mind, which is really critical.”
—Chief Information Security Officer, Life Sciences and Health Care Company
TAKING THE NEXT STEP 33
FUTURE MATTER Contact us to explore insights from the 4th Edition of Deloitte’s Global Future of Cyber Survey,
and discover what else the most cyber-mature organizations are doing to drive business
value and set themselves apart.
Acknowledgements
The future of cyber is being written right now—with every Saurabh Bansode, Criss Bradbury, Deborah Elder, John Gelinne, Tanneasha Gordon, Matt
second. New risks, technologies, and business choices are Holt, Pratik Joshi, Diana Kearns-Manolatos, Isaac Kohn, Daphne Lucas, Mike Morris, Kelly
Nelson, Iram Parveen, Sean Peasley, Abdul Rahman, Colin Soutar, Jan Vanhaecht,
taking shape. How your organization prepares for them and Marius von Spreti
acts on them will define your cyber maturity as well as the Contacts
future of your business. Emily Mossburg Ian Blatchford Pedro Parra
Deloitte Global Cyber Leader Asia Pacific Cyber Leader S-LATAM Cyber Leader
Principal, Deloitte & Touche LLP Partner, Deloitte Australia Partner, Deloitte Mexico
As the recognition of cybersecurity’s role grows within the enterprise, as top leadership becomes more [email protected] [email protected] [email protected]
+1 571 766 7048 +61 474 288 278 +52 55 89785689
engaged in strategic conversations about cybersecurity, and as cybersecurity becomes more integral to
transformation ambitions, a new day is dawning. How will you make the most of what comes next? How will Adnan Amjad Xavier Gracia Niels van de Vorle
you make it matter for your business? US Cyber Leader Spain Cyber Leader North and South Europe
Partner, Deloitte & Touche LLP Partner, Deloitte Spain Cyber Leader
[email protected] [email protected] Partner, Deloitte Netherlands
+1 713 982 4825 +34 931697257 [email protected]
+31 88 2882186
Amir Belkhelladi Andre Gargaro
Canada Cyber Leader Brazil Cyber Leader Peter Wirnsperger
Partner, Deloitte Canada Partner, Deloitte Brazil Central Europe Cyber Leader
[email protected] [email protected] Partner, Deloitte Germany
+1 514 393 7035 +55 11 5186 6213 [email protected]
+49 40 320804675
Yuichiro Kirihara
Japan Cyber Leader
Partner, Deloitte Japan
[email protected]
+81 803 3672805
To find out more, please visit www.deloitte.com/futureofcyber.
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited (DTTL), its global network of member firms,
and their related entities (collectively, the “Deloitte organization”). DTTL ( also referred to as “Deloitte Global”)
and each of its member firms and related entities are legally separate and independent entities, which cannot
obligate or bind each other in respect of third parties. DTTL and each DTTL member firm and related entity is
liable only for its own acts and omissions, and not those of each other. DTTL does not provide services to clients.
Please see www.deloitte.com/about to learn more.
Deloitte provides industry-leading audit and assurance, tax and legal, consulting, financial advisory, and risk
advisory services to nearly 90% of the Fortune Global 500® and thousands of private companies. Our people
deliver measurable and lasting results that help reinforce public trust in capital markets, enable clients to
transform and thrive, and lead the way toward a stronger economy, a more equitable society, and a sustainable
world. Building on its 175-plus year history, Deloitte spans more than 150 countries and territories. Learn how
Deloitte’s approximately 457,000 people worldwide make an impact that matters at www.deloitte.com.
This communication contains general information only, and none of Deloitte Touche Tohmatsu Limited (DTTL),
its global network of member firms or their related entities (collectively, the “Deloitte organization”) is, by means
of this communication, rendering professional advice or services. Before making any decision or taking any
action that may affect your finances or your business, you should consult a qualified professional adviser. No
representations, warranties or undertakings (express or implied) are given as to the accuracy or completeness
of the information in this communication, and none of DTTL, its member firms, related entities, employees
or agents shall be liable or responsible for any loss or damage whatsoever arising directly or indirectly in
connection with any person relying on this communication. DTTL and each of its member firms, and their related
entities, are legally separate and independent entities.