Business as usual
The General Data Protection Regulation (GDPR) came into force in May 2018. It is now a year on and the widespread effects of GDPR have been made known to all.
Deloitte is proud to present our new report 'After the dust settles: How Financial Services are taking a sustainable approach to GDPR compliance in a new era for privacy, one year on '.
Over the past two years, we’ve seen a sustained level of high-profile technology glitches, cyber attacks and system outages. While all sectors have been affected, the financial sector has been a particular target, leading to increased scrutiny from customers and regulators.
As we celebrate International Women’s Day, we are proud of our efforts to make the cyber security industry a welcome place for everyone. We come from a variety of backgrounds and are actively engaged in promoting a diverse and balanced workplace, as well as inspiring the younger generation to consider cyber security as an area to study or potential career path.
A guide for you
Are you planning your 2019 approach to cyber risk and wondering which security initiatives are out there and would best fit your organisation? Do you already know the answers, but want to easily and succinctly highlight your organisation’s involvement?
For the fourth consecutive year, the Deloitte Cyber Risk practice held its Capture the Flag competition, aiming to find the best and brightest ethical hackers from across the country. Following a remote qualifying event involving 14 university teams, the top eight received an invitation to the Deloitte’s London offices on Friday 23rd November.
Registration is now open for the National Cyber Security Centre (NCSC) CyberFirst Girls competition. The competition is an excellent way for young women to gain cyber security and problem-solving skills, work as a team and most importantly have fun. Technology touches on pretty much every part of daily life, so you don't have to be code breaker to get involved.
On 27 September, Deloitte held our annual Women in Cyber (WiC) event to discuss how companies can promote diversity within the cyber security industry and what the industry can learn from other sectors.
The Board gathers in a room in a pensive mood. Everyone is fully aware that they must protect their infrastructure estate and critical data. However, the question of whether these are adequately protected, is causing our C-suite sleepless nights. Additional questions include:
Debating the merits of the 4-4-2 format. Post-match analysis round the watercooler. Catching the match after work.
Whether you’re a die-hard fan or only ever watch the odd international match, many of us enjoy the excitement around the World Cup: no one more so than cyber criminals who see popular events like this as their ticket to a quick profit.