DOWNLOAD INFOGRAPHIC

Cyber Talking Points

Q1. Is cyber security just an issue for businesses today?
It is not just an issue today, it will continue to require attention from businesses. In addition, it is also very important for all individuals and government as all actors in our society are vulnerable to cyber attacks. Q2. What are the most common types of cyber attacks?
The most common type of attacks vary between different actors. For example, a state sponsored attack will not look at phishing to access your bank account. They would use more advanced types of attacks. For businesses, similar advanced techniques would be used in order to achieve the attacked goals. One of these goals could indeed be to capture credit card information from a customer base. Basic techniques such as phishing are mostly used to obtain user credentials and/or other sensitive information. Q3. What shift in cyber security is currently happening?
The major shift is that cyber threats are all over. No one is exempted from these cyber attacks. Therefore, people, businesses and governments should all be very vigilant in their adoption and use of new technologies and online services. Everyone needs to create new skills to deal with this new environments. Q4. Can companies predict cybercrime rather than simply respond to it?
Businesses can indeed predict cyber attacks to a certain extend, however, the cyber capabilities to detect cyber attacks in the environment become even more important. Given the increased complexity of the attacks, we have to assume that we have already been subject to successful cyber attacks. Q5. Is there any way to “eliminate” cybercrime?
No. However, there are ways to significantly reduce the level of risk against cyber attacks. Deloitte has a world-class Cyber Resilience Framework that helps global business to protect against cyber attacks. This global resilience framework has been developed in Deloitte Belgium and in being rolled out globally.
1/
A
Govern cyber resilience
Manage cyber across the enterprise
B
Manage all internal and external stakeholders
C
Understand what is at risk
D
Define clear roles and responsibilities
E
Manage third parties
F
Create cyber awareness
2/
Prevent Cyber incidents
A
Understand your data and information
B
Manage the user community
C
Secure your applications appropriately
D
Ensure a solid infrastructure
3/
Detecting the cyber attack
A
Understand the cyber threats
B
Ensure advanced cyber security analytics

4/

Responding to cyber incidents
A
Are you ready to respond?
B
Crisis management
C
Forensics are key