SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
2015 was the year of more. More breaches
became public than in any prior year, and
more cyber threat groups were at work
around the world with a wider array of
motives. The groups infiltrated and destroyed
systems, stole personal information and
targeted networking devices. This resulted
in more stress for those who had to deal
with the loss of data and reputation, more
time and money spent in recovering from an
attack and more reasons for organizations to
strengthen their security posture.
BY THE
NUMBERS
THREAT LANDSCAPE:
MANDIANT CONSULTING / M-TRENDS 2016
ENERGY 1%
AGRICULTURE
AND FORESTRY 1%
HIGH TECH 13%
GOVERNMENT AND
INTERNATIONAL
ORGANIZATIONS 3%
LEGAL SERVICES 3%
TRANSPORTATION 3%
BUSINESS AND
PROFESSIONAL
SERVICES 11%
MEDIA AND ENTERTAINMENT 11%
FINANCIAL SERVICES
AND INSURANCE 10%
RETAIL 10%
EDUCATION 8%
BIOTECHNOLOGY AND
PHARMACEUTICALS 7%
CONSTRUCTION AND ENGINEERING 6%
HEALTHCARE 5%
AEROSPACE AND DEFENSE 5%
TELECOMMUNICATIONS 2%
ORGANIZATIONS MORE
VIGILANT ABOUT
DISCOVERY
In 2015, the median time from
compromise to discovery was cut
by 59 days, down from 205 days.
TIME FROM COMPROMISE TO DISCOVERY
MEDIAN
EXTERNAL
NOTIFICATION
INTERNAL
DISCOVERY
146DAYS
320DAYS
56DAYS
MORE LESSONS LEARNED
A year of disruptive breaches resulted in new lessons regarding defense
and response.
1 Confirm there is a breach. 6 Engage experts before a breach for forensic,
legal and PR support.
2
Remember: you’re dealing with
human adversaries. They can be
unpredictable.
7 Consider all options when asked to pay a
ransom. There are no guarantees.
3 Timing is critical — validate and scope
the breach, fast. 8 Ensure strong segmentation and controls
over your backups.
4 Stay focused — you’re racing
against time. 9 After an incident has been handled, focus on
broader security improvements.
5 Carefully evaluate whether to
confront an attacker (see lesson 2). 10 If you kick the attackers out, be prepared:
they may come back.
LEARN MORE Get the M-Trends 2016 special report at fireeye.com/M-Trends-2016.html
FireEye, Inc.
1440 McCarthy Blvd. Milpitas, CA 95035
408.321.6300 / 877.FIREEYE (347.3393) / info@fireeye.com
fireeye.com
© 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye,
Inc. All other brands, products, or service names are or may be trademarks or service
marks of their respective owners. INFO.MTRENDS.EN-US.032016
Disrupting
business
Stealing personally
identifiable information
Attacking routers
and switches
THREE NEW TRENDS APPEARED IN 2015:
Using persistence
mechanisms
Targeting outsourced
service providers
TWO OLD TRENDS CONTINUED:
THE YEAR IN ATTACKS
47%
53%
External Notification
Internal Discovery
MORE BREACHES
DISCOVERED INTERNALLY
Compared to 2014, the percentage
of victims discovering a breach
internally rose 16%. 16%
INDUSTRIES WHERE
MANDIANT INVESTIGATED
Percentage of total attacks by industry.
MORE AND LESS
Some industries saw an increase in attacks
compared to 2014. Some saw a decrease.
HIGH TECH BUSINESS AND
PROFESSIONAL SERVICES
6%6%

Contenu connexe

En vedette (10)

шевченко т г 1
шевченко т г 1шевченко т г 1
шевченко т г 1
 
TOP 10 HONEYMOON DESTINATIONS_ABTA MAG_FEB 2016
TOP 10 HONEYMOON DESTINATIONS_ABTA MAG_FEB 2016TOP 10 HONEYMOON DESTINATIONS_ABTA MAG_FEB 2016
TOP 10 HONEYMOON DESTINATIONS_ABTA MAG_FEB 2016
 
Apa style course work chile earthquake 2010
Apa style course work   chile earthquake 2010Apa style course work   chile earthquake 2010
Apa style course work chile earthquake 2010
 
Desições sobre guarda
Desições sobre guardaDesições sobre guarda
Desições sobre guarda
 
Винтовая симметрия и золотое сечение
Винтовая симметрия и золотое сечениеВинтовая симметрия и золотое сечение
Винтовая симметрия и золотое сечение
 
EXTRA FASHION - AW1617 Trend Report
EXTRA FASHION - AW1617 Trend ReportEXTRA FASHION - AW1617 Trend Report
EXTRA FASHION - AW1617 Trend Report
 
WUD 2009 - User Experience Design a telefony komórkowe
WUD 2009 - User Experience Design a telefony komórkoweWUD 2009 - User Experience Design a telefony komórkowe
WUD 2009 - User Experience Design a telefony komórkowe
 
Thyatira
ThyatiraThyatira
Thyatira
 
Planificador de proyectos actual (1)
Planificador de proyectos actual (1)Planificador de proyectos actual (1)
Planificador de proyectos actual (1)
 
Medicina veterinaria
Medicina veterinariaMedicina veterinaria
Medicina veterinaria
 

Plus de FireEye, Inc.

Plus de FireEye, Inc. (20)

Asia Pacific & The Security Gap: Don't Stand Still
Asia Pacific & The Security Gap: Don't Stand StillAsia Pacific & The Security Gap: Don't Stand Still
Asia Pacific & The Security Gap: Don't Stand Still
 
EMEA & The Security Gap: Don't Stand Still
EMEA & The Security Gap: Don't Stand StillEMEA & The Security Gap: Don't Stand Still
EMEA & The Security Gap: Don't Stand Still
 
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers
 
M-Trends 2015: 최일선에서 본 관점
M-Trends 2015: 최일선에서 본 관점 M-Trends 2015: 최일선에서 본 관점
M-Trends 2015: 최일선에서 본 관점
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du front
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

[Infographic] M-Trends 2016

  • 1. 2015 was the year of more. More breaches became public than in any prior year, and more cyber threat groups were at work around the world with a wider array of motives. The groups infiltrated and destroyed systems, stole personal information and targeted networking devices. This resulted in more stress for those who had to deal with the loss of data and reputation, more time and money spent in recovering from an attack and more reasons for organizations to strengthen their security posture. BY THE NUMBERS THREAT LANDSCAPE: MANDIANT CONSULTING / M-TRENDS 2016 ENERGY 1% AGRICULTURE AND FORESTRY 1% HIGH TECH 13% GOVERNMENT AND INTERNATIONAL ORGANIZATIONS 3% LEGAL SERVICES 3% TRANSPORTATION 3% BUSINESS AND PROFESSIONAL SERVICES 11% MEDIA AND ENTERTAINMENT 11% FINANCIAL SERVICES AND INSURANCE 10% RETAIL 10% EDUCATION 8% BIOTECHNOLOGY AND PHARMACEUTICALS 7% CONSTRUCTION AND ENGINEERING 6% HEALTHCARE 5% AEROSPACE AND DEFENSE 5% TELECOMMUNICATIONS 2% ORGANIZATIONS MORE VIGILANT ABOUT DISCOVERY In 2015, the median time from compromise to discovery was cut by 59 days, down from 205 days. TIME FROM COMPROMISE TO DISCOVERY MEDIAN EXTERNAL NOTIFICATION INTERNAL DISCOVERY 146DAYS 320DAYS 56DAYS MORE LESSONS LEARNED A year of disruptive breaches resulted in new lessons regarding defense and response. 1 Confirm there is a breach. 6 Engage experts before a breach for forensic, legal and PR support. 2 Remember: you’re dealing with human adversaries. They can be unpredictable. 7 Consider all options when asked to pay a ransom. There are no guarantees. 3 Timing is critical — validate and scope the breach, fast. 8 Ensure strong segmentation and controls over your backups. 4 Stay focused — you’re racing against time. 9 After an incident has been handled, focus on broader security improvements. 5 Carefully evaluate whether to confront an attacker (see lesson 2). 10 If you kick the attackers out, be prepared: they may come back. LEARN MORE Get the M-Trends 2016 special report at fireeye.com/M-Trends-2016.html FireEye, Inc. 1440 McCarthy Blvd. Milpitas, CA 95035 408.321.6300 / 877.FIREEYE (347.3393) / info@fireeye.com fireeye.com © 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. INFO.MTRENDS.EN-US.032016 Disrupting business Stealing personally identifiable information Attacking routers and switches THREE NEW TRENDS APPEARED IN 2015: Using persistence mechanisms Targeting outsourced service providers TWO OLD TRENDS CONTINUED: THE YEAR IN ATTACKS 47% 53% External Notification Internal Discovery MORE BREACHES DISCOVERED INTERNALLY Compared to 2014, the percentage of victims discovering a breach internally rose 16%. 16% INDUSTRIES WHERE MANDIANT INVESTIGATED Percentage of total attacks by industry. MORE AND LESS Some industries saw an increase in attacks compared to 2014. Some saw a decrease. HIGH TECH BUSINESS AND PROFESSIONAL SERVICES 6%6%