The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
2013 Data Breach Highlights
1. Verizon 2013 Data Breach Investigations
Report Highlights
Source: 2013 Data Breach Investigations Report
1
2. Some organizations will be a
target REGARDLESS of what they do.
Most become a target BECAUSE of
what they do.
Source: 2013 Data Breach Investigations Report
2
3. Industries Impacted Most
Analysis of more than 47,000 reported security incidents and 621 confirmed data
breaches from the past year
Breaches affected
financial organizations
Breaches occurred in
retail environments
and restaurants
Network intrusions
involved manufacturing,
transportation, and
utilities
Network intrusions
hit information and
professional
services firms
Breaches impacted
larger organizations
27 different countries are represented
Source: 2013 Data Breach Investigations Report
Presented by:
wwt.com
3
4. Who Are the Perpetrators?
92% OUTSIDERS
14% INSIDERS
1% BUSINESS PARTNERS
7% MULTIPLE PARTIES
19% STATE-AFFILIATED
ACTORS
Source: 2013 Data Breach Investigations Report
Read the Full Report from Verizon
Presented by:
wwt.com
4
5. How Do Breaches Occur?
Used some form of hacking
Network intrusions exploited
weak or stolen credentials
Incorporated malware
Involved physical attacks
Leveraged social tactics
Resulted from privilege
misuse and abuse
The proportion of breaches incorporating social tactics like phishing was
FOUR TIMES HIGHER in 2012.
Source: 2013 Data Breach Investigations Report
Read the Full Report from Verizon
Presented by:
wwt.com
5
6. Top 10 Threat Actions for All Companies
See the top 20 threat actions broken down by company size in the full report.
Source: 2013 Data Breach Investigations Report
Read the Full Report from Verizon
Presented by:
wwt.com
6
7. We’re Not Seeing Improvement
While it may be difficult to detect, positively identify, and respond to an intrusion
within seconds or minutes, our ability to do so should ostensibly increase the
longer they poke around our internal networks. But unfortunately, we’re not really
seeing that improvement.
Figure 42: Percent of breaches that remain undiscovered for months or more
Source: 2013 Data Breach Investigations Report
Read the Full Report from Verizon
Presented by:
wwt.com
7
8. Get the full report and learn more about:
1.
Mobile device threats
2.
Most common motives behind the threats
3.
Most common abusers – this may surprise you
4.
What can your organization do
Read the Full Report from Verizon
Source: 2013 Data Breach Investigations Report
Presented by:
wwt.com
8