How to avoid a security own goal during the World Cup

Bzi_foc_glb_ho_2092_lo

Debating the merits of the 4-4-2 format. Post-match analysis round the watercooler. Catching the match after work.

Whether you’re a die-hard fan or only ever watch the odd international match, many of us enjoy the excitement around the World Cup: no one more so than cyber criminals who see popular events like this as their ticket to a quick profit.

Continue reading

Posted on 13/06/2018 | 0 Comments

Is GDPR a competitive advantage for FinTechs?

Blog pic

Complying with GDPR is forcing financial services organisations to undergo considerable (and expensive) change, but it might be a blessing in disguise for smaller FinTechs looking to gain an edge.

Continue reading

Posted on 01/06/2018 | 0 Comments

What can you learn from the GDPR for your next regulatory programme

Untitled

With the EU General Data Protection Regulation (GDPR) implementation date upon us, we’re taking a look at the most common errors we’re seeing in financial services (FS) firms’ approaches to their data programmes in readiness for the deadline and for ongoing compliance. 

Continue reading

Posted on 25/05/2018 | 0 Comments

Armed with the skills to join the Deloitte Cyber Risk team

Untitled

Deloitte Cyber Risk Services has benefitted from a number of Armed Forces leavers. Ex-military personnel are at all levels and working in all sectors of our team. With an intrinsic understanding of security, strong communication skills and practiced problem-solving capabilities, many Armed Forces leavers naturally have a number of key skills and experience relevant to this industry. The Deloitte UK Cyber Risk Services practice is growing and on the lookout for talented individuals.

Continue reading

Posted on 17/04/2018 | 0 Comments

Revenge of the Patch

Revenge of the patch image

Since the public announcement of the Spectre and Meltdown vulnerabilities, vendors have been scrambling to release patches. It is yet unclear whether the vulnerabilities have been successfully exploited by hackers, however, well over 100 strains of malware are known to target Spectre and Meltdown, at least in proof-of-concept code (1).    

Continue reading

Posted on 28/03/2018 | 0 Comments

Hacking your way into cyber security

 Kent

43 54 46 7b 48 65 6c 6c 6f 20 77 6f 72 6c 64 21 7d

Following on from the success of previous competitions, the Deloitte Cyber Risk practice ran their third annual Capture the Flag competition on Monday 26th February. To reach the live final in London, each team had to compete in an online qualifier in January and finish in one of the top eight spots.

Continue reading

Posted on 08/03/2018 | 0 Comments

The journey to diversity in cyber security

Diversity

As we celebrate International Women’s Day, the Deloitte EMEA Women in Cyber team are proud of the steps we are taking to make gender parity a core part of the cyber security industry agenda. As a team with diverse backgrounds, we are working to engage our colleagues and clients to be part of the journey to gender inclusivity. 

Continue reading

Posted on 07/03/2018 | 0 Comments

Cyber risk and regulation for European banks

 

SRcircuitboard_lo

 

2018 will be an important year for the regulation of cyber resilience in banks. Indeed, almost three quarters of the G20 Financial Stability Board’s members recently indicated that they intend to release new standards or supervisory initiatives on cyber security in the year ahead. 

Continue reading

Posted on 07/03/2018 | 0 Comments

Dinner at the Arctic Circle

Eh5ep2_loDespite the red weather warning from Storm Emma, a group of cyber security leaders and start-ups gathered to a roundtable evening amidst the snowy scenes. It’s safe to say that there has always been a degree of healthy friction, both culturally and operationally, between large organisations and start-ups and the two don’t always see eye-to-eye.

Continue reading

Posted on 07/03/2018 | 0 Comments

The CPU strikes back

Computer chipIn an era of computing dominated by software, the hardware is striking back with a vengeance via vulnerabilities named Meltdown and Spectre. Together they affect the central processing units (CPUs) in the majority of computers and devices manufactured in the past decade, from the largest servers down to the smallest mobile devices. 

Continue reading

Posted on 14/02/2018 | 0 Comments