The document discusses cybersecurity threats to organizations based on survey findings, including that 89% of organizations believe they are susceptible to insider threats, 54% of breaches are caused by internal sources, and the average breach goes undetected for 8 months, costing organizations $1.6 million on average. It suggests that cyber threat intelligence platforms can provide greater visibility and faster detection and response to help organizations protect against evolving threats.
2. 89%
of global organizations surveyed
believe they are at least somewhat
susceptible to insider threats.1
ibm.co/cyberthreatanalysis
3. 54%
of organizations surveyed
cite an internal source as
having been responsible for
their most recent breach.2
ibm.co/cyberthreatanalysis
4. and causes untold damage
in the meantime.
The average breach goes undetected for approximately
8 months
3
ibm.co/cyberthreatanalysis
5. confirmed breaches were reported
across 70 organizations over the
course of a single year.4
2,000+
ibm.co/cyberthreatanalysis
6. 69%
of enterprises surveyed say
existing security tools lack the
contextual information needed to
detect system fraud and abuse.5
ibm.co/cyberthreatanalysis
7. 56%
of enterprises surveyed also
say their security tools yield
too many false positives.5
ibm.co/cyberthreatanalysis
8. of confirmed breaches in surveyed
organizations were the result of
stolen credentials that leveraged
legitimate partner access.
97%
6
ibm.co/cyberthreatanalysis
10. The loss of business resulting from a
single data breach reached an average of
$1.6 million in 2015.
7
ibm.co/cyberthreatanalysis
11. 63%
of organizations surveyed that
have implemented a cyber threat
intelligence platform report greater
visibility into attack methodologies.
8
ibm.co/cyberthreatanalysis
12. 51%
see faster and more
accurate detection and
response than ever before.8
ibm.co/cyberthreatanalysis
13. A solution such as IBM® i2®
Enterprise Insight Analysis can
help protect organizations from—and
disrupt—today’s ever-evolving threats.
ibm.co/cyberthreatanalysis
14. Don’t leave anything to chance when
it comes to protecting your enterprise.
ibm.co/cyberthreatanalysis
15. 1 2015 Vormetric Insider Threat Report
2 Data Security Confidence Index April 2015
3 Data Breaches: Don't Blame Security Teams, Blame Lack of Context
4 Verizon Data Breach Report 2015
5 “Privileged User Abuse & The Insider Threat” Ponemon Institute Research Report, May 2014
6 Verizon 2016 Data Breach Investigations Report
7 “2015 Cost of Data Breach Study: Global Analysis” Ponemon Institute Research Report, May 2015
8 “Who’s Using Cyberthreat Intelligence and How?” SANS Institute InfoSec Reading Room, February 2015
Sources