ing in and out of their systems and products as well
as micro-transactions that use this data. “The same
things happening in manufacturing also are occurring
in healthcare, utilities and other industries,” Wheeler
adds. “Everything is getting more digitized.”
Digital transformation now tends to occur hand-in-
hand with the adoption of new and emerging tech-
nologies, whose information security risks need to be
understood and addressed, notes Group Technology
Officer of Accenture Security Tom Parker. “Clients
are implementing tools that create new exposures that
have not been considered in the past,” he explains.
“If you look at things like blockchain and machine
learning, there are some new and interesting vulner-
abilities that can arise if these types of technology are
not implemented correctly. We’re trying to help com-
panies think ahead regarding the ebb and flow of new
technology implementations.”
3. Cybersecurity Consulting Practices
Those changes are causing consulting firms to make
more frequent and dramatic changes to how they organize and deliver cybersecurity services. Last year, Deloitte completed a significant realignment of its cyber
practices so that offerings can be provided in a solu-tion-centric manner, notes Emily Mossburg, the firm’s
advisory and implementation leader for cyber risk services. Similar overhauls have taken place within most
other large firms. “We’ve changed drastically over the
past 18 months,” reports PwC’s Joyce.
Cybersecurity leaders say they continually recalibrate their offerings to reflect the fast-changing threat
environment and the technology changes occurring
within client companies. “In the past 18 months, our
teams have become more cross-functional to help
solve larger, more complex problems,” Protiviti’s
Laliberte reports, noting that his cyber team often
works closely with the firm’s data analytics and data
visualization specialists.
Among the many structural changes and recalibra-tions cybersecurity leaders promote, a few stand out.
Deloitte Risk and Financial Advisory has a ventures
portfolio “that allows for the incubation of new risk-driven technology solutions designed to address clients’ most challenging problems,” Mossburg reports.
This cyber venture team, she adds, “works in tight co-ordination with our broader cyber practice to introduce
new solutions into the practice and to listen to the needs
of industry and organizations.”
Three Areas of Focus
As complex as the external cyber risk situation
and internal technology environments are becom-
Cybersecurity leaders
say they continually
recalibrate their
offerings to reflect the
fast-changing threat
environment and
technology changes
occurring within client
companies.