SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
Verizon 2013 Data Breach Investigations
Report Highlights

Source: 2013 Data Breach Investigations Report

1
Some organizations will be a
target REGARDLESS of what they do.
Most become a target BECAUSE of
what they do.

Source: 2013 Data Breach Investigations Report

2
Industries Impacted Most
Analysis of more than 47,000 reported security incidents and 621 confirmed data
breaches from the past year
Breaches affected
financial organizations

Breaches occurred in
retail environments
and restaurants

Network intrusions
involved manufacturing,
transportation, and
utilities

Network intrusions
hit information and
professional
services firms

Breaches impacted
larger organizations

27 different countries are represented

Source: 2013 Data Breach Investigations Report

Presented by:

wwt.com

3
Who Are the Perpetrators?
92% OUTSIDERS
14% INSIDERS
1% BUSINESS PARTNERS
7% MULTIPLE PARTIES
19% STATE-AFFILIATED
ACTORS

Source: 2013 Data Breach Investigations Report

Read the Full Report from Verizon

Presented by:

wwt.com

4
How Do Breaches Occur?
Used some form of hacking
Network intrusions exploited
weak or stolen credentials
Incorporated malware
Involved physical attacks
Leveraged social tactics
Resulted from privilege
misuse and abuse
The proportion of breaches incorporating social tactics like phishing was
FOUR TIMES HIGHER in 2012.

Source: 2013 Data Breach Investigations Report

Read the Full Report from Verizon

Presented by:

wwt.com

5
Top 10 Threat Actions for All Companies

See the top 20 threat actions broken down by company size in the full report.
Source: 2013 Data Breach Investigations Report

Read the Full Report from Verizon

Presented by:

wwt.com

6
We’re Not Seeing Improvement
While it may be difficult to detect, positively identify, and respond to an intrusion
within seconds or minutes, our ability to do so should ostensibly increase the
longer they poke around our internal networks. But unfortunately, we’re not really
seeing that improvement.

Figure 42: Percent of breaches that remain undiscovered for months or more
Source: 2013 Data Breach Investigations Report

Read the Full Report from Verizon

Presented by:

wwt.com

7
Get the full report and learn more about:
1.

Mobile device threats

2.

Most common motives behind the threats

3.

Most common abusers – this may surprise you

4.

What can your organization do
Read the Full Report from Verizon

Source: 2013 Data Breach Investigations Report

Presented by:

wwt.com

8

Contenu connexe

Plus de World Wide Technology

World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1World Wide Technology
 
World Wide Technology (WWT) TEC37 Webinar: Customer Experience Transcript
World Wide Technology (WWT) TEC37 Webinar: Customer Experience TranscriptWorld Wide Technology (WWT) TEC37 Webinar: Customer Experience Transcript
World Wide Technology (WWT) TEC37 Webinar: Customer Experience TranscriptWorld Wide Technology
 
World Wide Technology Webinar Transcript - Software Defined Networking
World Wide Technology Webinar Transcript - Software Defined NetworkingWorld Wide Technology Webinar Transcript - Software Defined Networking
World Wide Technology Webinar Transcript - Software Defined NetworkingWorld Wide Technology
 
World Wide Technology Webinar - Software Defined Networking
World Wide Technology Webinar - Software Defined NetworkingWorld Wide Technology Webinar - Software Defined Networking
World Wide Technology Webinar - Software Defined NetworkingWorld Wide Technology
 
World Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONEWorld Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONEWorld Wide Technology
 
WWT Webinar - The Role of Adoption Services in Tech Deployments
WWT Webinar - The Role of Adoption Services in Tech DeploymentsWWT Webinar - The Role of Adoption Services in Tech Deployments
WWT Webinar - The Role of Adoption Services in Tech DeploymentsWorld Wide Technology
 
Dave Chandler Presents SDN at World Wide Technology's TECday - St. Louis
Dave Chandler Presents SDN at World Wide Technology's TECday - St. LouisDave Chandler Presents SDN at World Wide Technology's TECday - St. Louis
Dave Chandler Presents SDN at World Wide Technology's TECday - St. LouisWorld Wide Technology
 

Plus de World Wide Technology (9)

World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
 
World Wide Technology (WWT) TEC37 Webinar: Customer Experience Transcript
World Wide Technology (WWT) TEC37 Webinar: Customer Experience TranscriptWorld Wide Technology (WWT) TEC37 Webinar: Customer Experience Transcript
World Wide Technology (WWT) TEC37 Webinar: Customer Experience Transcript
 
World Wide Technology Webinar Transcript - Software Defined Networking
World Wide Technology Webinar Transcript - Software Defined NetworkingWorld Wide Technology Webinar Transcript - Software Defined Networking
World Wide Technology Webinar Transcript - Software Defined Networking
 
World Wide Technology Webinar - Software Defined Networking
World Wide Technology Webinar - Software Defined NetworkingWorld Wide Technology Webinar - Software Defined Networking
World Wide Technology Webinar - Software Defined Networking
 
World Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONEWorld Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONE
 
WWT Intelligent WAN Presentation
WWT Intelligent WAN PresentationWWT Intelligent WAN Presentation
WWT Intelligent WAN Presentation
 
WWT Webinar - The Role of Adoption Services in Tech Deployments
WWT Webinar - The Role of Adoption Services in Tech DeploymentsWWT Webinar - The Role of Adoption Services in Tech Deployments
WWT Webinar - The Role of Adoption Services in Tech Deployments
 
WWT IWAN Technical Presentation
WWT IWAN Technical PresentationWWT IWAN Technical Presentation
WWT IWAN Technical Presentation
 
Dave Chandler Presents SDN at World Wide Technology's TECday - St. Louis
Dave Chandler Presents SDN at World Wide Technology's TECday - St. LouisDave Chandler Presents SDN at World Wide Technology's TECday - St. Louis
Dave Chandler Presents SDN at World Wide Technology's TECday - St. Louis
 

Dernier

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

2013 Data Breach Highlights

  • 1. Verizon 2013 Data Breach Investigations Report Highlights Source: 2013 Data Breach Investigations Report 1
  • 2. Some organizations will be a target REGARDLESS of what they do. Most become a target BECAUSE of what they do. Source: 2013 Data Breach Investigations Report 2
  • 3. Industries Impacted Most Analysis of more than 47,000 reported security incidents and 621 confirmed data breaches from the past year Breaches affected financial organizations Breaches occurred in retail environments and restaurants Network intrusions involved manufacturing, transportation, and utilities Network intrusions hit information and professional services firms Breaches impacted larger organizations 27 different countries are represented Source: 2013 Data Breach Investigations Report Presented by: wwt.com 3
  • 4. Who Are the Perpetrators? 92% OUTSIDERS 14% INSIDERS 1% BUSINESS PARTNERS 7% MULTIPLE PARTIES 19% STATE-AFFILIATED ACTORS Source: 2013 Data Breach Investigations Report Read the Full Report from Verizon Presented by: wwt.com 4
  • 5. How Do Breaches Occur? Used some form of hacking Network intrusions exploited weak or stolen credentials Incorporated malware Involved physical attacks Leveraged social tactics Resulted from privilege misuse and abuse The proportion of breaches incorporating social tactics like phishing was FOUR TIMES HIGHER in 2012. Source: 2013 Data Breach Investigations Report Read the Full Report from Verizon Presented by: wwt.com 5
  • 6. Top 10 Threat Actions for All Companies See the top 20 threat actions broken down by company size in the full report. Source: 2013 Data Breach Investigations Report Read the Full Report from Verizon Presented by: wwt.com 6
  • 7. We’re Not Seeing Improvement While it may be difficult to detect, positively identify, and respond to an intrusion within seconds or minutes, our ability to do so should ostensibly increase the longer they poke around our internal networks. But unfortunately, we’re not really seeing that improvement. Figure 42: Percent of breaches that remain undiscovered for months or more Source: 2013 Data Breach Investigations Report Read the Full Report from Verizon Presented by: wwt.com 7
  • 8. Get the full report and learn more about: 1. Mobile device threats 2. Most common motives behind the threats 3. Most common abusers – this may surprise you 4. What can your organization do Read the Full Report from Verizon Source: 2013 Data Breach Investigations Report Presented by: wwt.com 8