SlideShare a Scribd company logo
1 of 32
2012 Data Breach
Investigations Report
       A study conducted by the Verizon RISK Team with
    cooperation from the Australian Federal Police, Dutch
         National High Tech Crime Unit, Irish Reporting &
Information Security Service, Police Central e-Crime Unit,
                       and United States Secret Service.
Data Breach Investigations Report (DBIR) series



                                           An ongoing study into the
                                             world of cybercrime that
                                       analyzes forensic evidence to
                                       uncover how sensitive data is
                                           stolen from organizations,
                                          who’s doing it, why they’re
                                        doing it, and, of course, what
                                         might be done to prevent it.




Available at: http://verizonbusiness.com/databreach
Updates/Commentary: http://securityblog.verizonbusiness.com
Hold on… Wha???
Why is my telco investigating breaches?
Enterprise Solutions to Meet Business Imperatives

                                                    Communications                 Networking
    IT Services           Security Services                                                                     Mobility
                                                       Services                     Services



• Cloud-based Services    • Government, Risk and    • Contact Center          • Internet                 • Advanced
                            Compliance                Services                                             Communications
• Data Center Services                                                        • Private WAN
                          • Identity and Access     • Unified                                            • Applications and
• Managed Applications                                                        • Private Point to Point
                            Management                Communications                                       Content
• Managed IT                                                                  • Access Services
                          • Managed Security        • Video, Web and Audio                               • Global
• Equipment and                                       Conferencing            • Managed Networks           Communications
                          • Equipment and
  Services
                            Services                • Traditional Voice       • Equipment and            • Hardware
• Professional Services                                                         Services
                          • ICSA Labs               • Emergency                                          • Mobile Data
                                                      Communications          • Professional Services
                          • Professional Services                                                        • Voice and Messaging
                                                      Services
                                                                                                         • Professional Services
                                                    • Equipment and
                                                      Services
                           RISK Team                • Professional Services
                            falls here
2012 DBIR Contributors
Methodology: Data Collection and Analysis


• DBIR participants use the
 Verizon Enterprise Risk and
 Incident Sharing (VERIS)
 framework to collect and
 share data.

• Enables case data to be
 shared anonymously to RISK
 Team for analysis


VERIS is a (open and free) set of metrics designed to provide a common
language for describing security incidents (or threats) in a structured and
repeatable manner.


VERIS: https://verisframework.wiki.zoho.com/
Unpacking the 2012 DBIR
An overview of our results and analysis
Threat Agents
Threat Agents: Larger Orgs
Threat Agents
Threat Agents: External
Threat Actions
Threat Actions: Larger Orgs
Top Threat Actions
Top Threat Actions: Larger Orgs
Compromised Assets
Most Compromised Assets
Asset Ownership, Hosting, and Management
Compromised Data
Compromised Data
Attack Difficulty
Attack Targeting
The 3-Day Workweek
Timespan of events
Timespan of events: Larger Orgs
Breach Discovery
Breach Discovery
Recommendations: Smaller Orgs
Recommendations: Larger Orgs
DBIR: www.verizonbusiness.com/databreach
VERIS: https://verisframework.wiki.zoho.com/
Blog: securityblog.verizonbusiness.com
Email: dbir@verizonbusiness.com

More Related Content

What's hot

Carol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practiceCarol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practicecschlein
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
Blockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesBlockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesVeridium
 
GOV-IT OEF's Governance Network (to be)
GOV-IT OEF's Governance Network (to be)GOV-IT OEF's Governance Network (to be)
GOV-IT OEF's Governance Network (to be)OneEarthFuture
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Towards Patient Controlled Privacy
Towards Patient Controlled PrivacyTowards Patient Controlled Privacy
Towards Patient Controlled PrivacyOwen Sacco
 
Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Joshua L. Davis
 
Internet of things
Internet of thingsInternet of things
Internet of thingsvarungoyal98
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantVladimir Jirasek
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fdGlobalForum
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Dr Lendy Spires
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trendsSatya Harish
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introductionerry wardhana
 

What's hot (20)

Carol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practiceCarol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practice
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Blockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesBlockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial Services
 
GOV-IT OEF's Governance Network (to be)
GOV-IT OEF's Governance Network (to be)GOV-IT OEF's Governance Network (to be)
GOV-IT OEF's Governance Network (to be)
 
Towards a Privacy-Friendly Internet of Things
Towards a Privacy-Friendly Internet of ThingsTowards a Privacy-Friendly Internet of Things
Towards a Privacy-Friendly Internet of Things
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
Towards Patient Controlled Privacy
Towards Patient Controlled PrivacyTowards Patient Controlled Privacy
Towards Patient Controlled Privacy
 
Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014
 
Blackberry in Government
Blackberry in GovernmentBlackberry in Government
Blackberry in Government
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introduction
 

Viewers also liked

Terremark Intro
Terremark IntroTerremark Intro
Terremark Intromartyburks
 
Mastering SAP Technologies Keynote - Simon Dale - Making Sense of the New SAP
Mastering SAP Technologies Keynote - Simon Dale - Making Sense of the New SAPMastering SAP Technologies Keynote - Simon Dale - Making Sense of the New SAP
Mastering SAP Technologies Keynote - Simon Dale - Making Sense of the New SAPLen Augustine
 
Realizziamo una presentazione multimediale 1
Realizziamo una presentazione multimediale 1Realizziamo una presentazione multimediale 1
Realizziamo una presentazione multimediale 1Elvira De Marco
 
Realizziamo una presentazione multimediale 2
Realizziamo una presentazione multimediale 2Realizziamo una presentazione multimediale 2
Realizziamo una presentazione multimediale 2Elvira De Marco
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

Viewers also liked (7)

Terremark Intro
Terremark IntroTerremark Intro
Terremark Intro
 
Mastering SAP Technologies Keynote - Simon Dale - Making Sense of the New SAP
Mastering SAP Technologies Keynote - Simon Dale - Making Sense of the New SAPMastering SAP Technologies Keynote - Simon Dale - Making Sense of the New SAP
Mastering SAP Technologies Keynote - Simon Dale - Making Sense of the New SAP
 
Identity Online
Identity OnlineIdentity Online
Identity Online
 
Realizziamo una presentazione multimediale 1
Realizziamo una presentazione multimediale 1Realizziamo una presentazione multimediale 1
Realizziamo una presentazione multimediale 1
 
Ipads
IpadsIpads
Ipads
 
Realizziamo una presentazione multimediale 2
Realizziamo una presentazione multimediale 2Realizziamo una presentazione multimediale 2
Realizziamo una presentazione multimediale 2
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similar to 2012 DBIR

Broadview Networks Site Seller R2011
Broadview Networks Site Seller R2011Broadview Networks Site Seller R2011
Broadview Networks Site Seller R2011dshetterly
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtimeAFCOM
 
IT Infrastructure Specialist
IT Infrastructure SpecialistIT Infrastructure Specialist
IT Infrastructure Specialistmomentuminfocare
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013Mydex CIC
 
Richard Nespola - Presentation at Emerging Communications Conference & Awards...
Richard Nespola - Presentation at Emerging Communications Conference & Awards...Richard Nespola - Presentation at Emerging Communications Conference & Awards...
Richard Nespola - Presentation at Emerging Communications Conference & Awards...eCommConf
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityBob Rhubart
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...BIOVIA
 
Ireland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsIreland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsMartina Naughton
 
Nfa workshop introductions_wdonnelly
Nfa workshop introductions_wdonnellyNfa workshop introductions_wdonnelly
Nfa workshop introductions_wdonnellyShane Dempsey
 
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...Cloudera, Inc.
 
Telaid: Technology Lifecycle Solutions
Telaid: Technology Lifecycle SolutionsTelaid: Technology Lifecycle Solutions
Telaid: Technology Lifecycle Solutionsajackson88
 
Meet Xo Core Presentation 2012
Meet Xo Core Presentation 2012Meet Xo Core Presentation 2012
Meet Xo Core Presentation 2012crancer
 
Strativia Overview
Strativia OverviewStrativia Overview
Strativia Overviewstrativia01
 

Similar to 2012 DBIR (20)

Freedom infotech pvt. ltd. company profile
Freedom infotech pvt. ltd. company profileFreedom infotech pvt. ltd. company profile
Freedom infotech pvt. ltd. company profile
 
Broadview Networks Site Seller R2011
Broadview Networks Site Seller R2011Broadview Networks Site Seller R2011
Broadview Networks Site Seller R2011
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtime
 
IT Infrastructure Specialist
IT Infrastructure SpecialistIT Infrastructure Specialist
IT Infrastructure Specialist
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
 
Meet XO
Meet XOMeet XO
Meet XO
 
Keynote lessard
Keynote lessardKeynote lessard
Keynote lessard
 
Richard Nespola - Presentation at Emerging Communications Conference & Awards...
Richard Nespola - Presentation at Emerging Communications Conference & Awards...Richard Nespola - Presentation at Emerging Communications Conference & Awards...
Richard Nespola - Presentation at Emerging Communications Conference & Awards...
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 
Ireland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsIreland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firms
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Meet XO
Meet XOMeet XO
Meet XO
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Nfa workshop introductions_wdonnelly
Nfa workshop introductions_wdonnellyNfa workshop introductions_wdonnelly
Nfa workshop introductions_wdonnelly
 
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
 
Telaid: Technology Lifecycle Solutions
Telaid: Technology Lifecycle SolutionsTelaid: Technology Lifecycle Solutions
Telaid: Technology Lifecycle Solutions
 
Meet Xo Core Presentation 2012
Meet Xo Core Presentation 2012Meet Xo Core Presentation 2012
Meet Xo Core Presentation 2012
 
Strativia Overview
Strativia OverviewStrativia Overview
Strativia Overview
 

2012 DBIR

Editor's Notes

  1. This is the “see everything in one glance” visual. See pg 15 in the DBIR for talking points.