SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
A GLOBAL OVERVIEW FROM 2013 TO 2016
THE EVOLUTION OF DATA BREACHES
Criminal attack
System Glitches
Human Error
48%
25%
27%
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
US AB IN DE UK BZ FR AU IT JP
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
AU 34,249US 28,765 IN 26,586
1 32
2013
AB 29,199IN 28,798 US 28,070
1 32
IN 31,225AB 30,179 US 29,611
1 32
2015
US 29,087AB 28,690 IN 26,586
1 32
2014
2016
US $5.40 mil.
DE $5.09 mil. FR $3.97 mil.
1 32
2013
US $6.53 mil.
UK $4.89 mil. AU $4.34 mil.
1 32
US $7.01 mil.
DE $5.01 mil. IN $4.72 mil.
1 32
2015
US $5.85 mil.
UK $4.74 mil. JP $4.19 mil.
1 32
2014
2016
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
Healthcare
Financial
Pharmaceuticals
Transportation
Communications
Services
Technology
Research
Energy
Hospitality
Consumer
Education
Media
Industrial
Public Services
Retail
233
215
207
169
150
134
129
125
114
113
111
103
103
81
78
Healthcare
Financial
Pharmaceuticals
Transportation
Communications
Services
Technology
Research
Energy
Hospitality
Consumer
Education
Media
Industrial
Public Services
Retail
$8.00
$7.00
$6.00
$5.00
$4.00
$3.00
$2.00
$1.00
$0.00
35000
30000
25000
20000
15000
10000
5000
0
0 300005000 10000 20000 25000 $0 $5,000,000$1,000,000 $2,000,000 $3,000,000 $4,000,000 $7,000,000$6,000,000
2013 2016
0 25050 100 150 200 $0 $250 $300 $350 $400$50 $100 $150 $200
The main causes of data breaches in 2016
Sample: 383 Organisations 10 Countries 16 Industry sectors
US AB IN DE UK BZ FR AU IT JP
Passwordless Security

Contenu connexe

Similaire à The Evolution Of Data Breaches From 2013 To 2016

Trendeo industrial investment in the United States, may 2018
Trendeo industrial investment in the United States, may 2018Trendeo industrial investment in the United States, may 2018
Trendeo industrial investment in the United States, may 2018Trendeo
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDell World
 
External data perspectives: Key Exhibits
External data perspectives: Key ExhibitsExternal data perspectives: Key Exhibits
External data perspectives: Key ExhibitsGalytix Limited
 
03 disruptive-medicine-brain-research
03 disruptive-medicine-brain-research03 disruptive-medicine-brain-research
03 disruptive-medicine-brain-researchMazhar Syed
 
03 disruptive-medicine-brain-research
03 disruptive-medicine-brain-research03 disruptive-medicine-brain-research
03 disruptive-medicine-brain-researchMazhar Syed
 
Beyond the Code Itself: How Programmers Really Look at Pull Requests
Beyond the Code Itself: How Programmers Really Look at Pull RequestsBeyond the Code Itself: How Programmers Really Look at Pull Requests
Beyond the Code Itself: How Programmers Really Look at Pull RequestsDenae Ford
 
Rp dbir 2016_report_en_xg
Rp dbir 2016_report_en_xgRp dbir 2016_report_en_xg
Rp dbir 2016_report_en_xgAndrey Apuhtin
 
2016 Data Breach Investigations Report
2016 Data Breach Investigations Report2016 Data Breach Investigations Report
2016 Data Breach Investigations ReportSneha Kiran
 
Verizon Data Breach Investigation Report
Verizon Data Breach Investigation ReportVerizon Data Breach Investigation Report
Verizon Data Breach Investigation Reportxband
 
Rp dbir 2016_report_en_xg
Rp dbir 2016_report_en_xgRp dbir 2016_report_en_xg
Rp dbir 2016_report_en_xgAndrey Apuhtin
 
2016 data breach investigations report
2016 data breach investigations report2016 data breach investigations report
2016 data breach investigations reportSneha Kiran
 
Study on International Cross-Border Data Flow Management and Implications for...
Study on International Cross-Border Data Flow Management and Implications for...Study on International Cross-Border Data Flow Management and Implications for...
Study on International Cross-Border Data Flow Management and Implications for...APNIC
 
Drug User Development Projects - Public
Drug User Development Projects - PublicDrug User Development Projects - Public
Drug User Development Projects - PublicRui Coimbra
 

Similaire à The Evolution Of Data Breaches From 2013 To 2016 (19)

IDC Digital Universe 2014
IDC Digital Universe 2014IDC Digital Universe 2014
IDC Digital Universe 2014
 
Idc digital-universe-2014
Idc digital-universe-2014Idc digital-universe-2014
Idc digital-universe-2014
 
Trendeo industrial investment in the United States, may 2018
Trendeo industrial investment in the United States, may 2018Trendeo industrial investment in the United States, may 2018
Trendeo industrial investment in the United States, may 2018
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
 
External data perspectives: Key Exhibits
External data perspectives: Key ExhibitsExternal data perspectives: Key Exhibits
External data perspectives: Key Exhibits
 
03 disruptive-medicine-brain-research
03 disruptive-medicine-brain-research03 disruptive-medicine-brain-research
03 disruptive-medicine-brain-research
 
03 disruptive-medicine-brain-research
03 disruptive-medicine-brain-research03 disruptive-medicine-brain-research
03 disruptive-medicine-brain-research
 
Beyond the Code Itself: How Programmers Really Look at Pull Requests
Beyond the Code Itself: How Programmers Really Look at Pull RequestsBeyond the Code Itself: How Programmers Really Look at Pull Requests
Beyond the Code Itself: How Programmers Really Look at Pull Requests
 
Rp dbir 2016_report_en_xg
Rp dbir 2016_report_en_xgRp dbir 2016_report_en_xg
Rp dbir 2016_report_en_xg
 
2016 Data Breach Investigations Report
2016 Data Breach Investigations Report2016 Data Breach Investigations Report
2016 Data Breach Investigations Report
 
Verizon Data Breach Investigation Report
Verizon Data Breach Investigation ReportVerizon Data Breach Investigation Report
Verizon Data Breach Investigation Report
 
Rp dbir 2016_report_en_xg
Rp dbir 2016_report_en_xgRp dbir 2016_report_en_xg
Rp dbir 2016_report_en_xg
 
2016 data breach investigations report
2016 data breach investigations report2016 data breach investigations report
2016 data breach investigations report
 
Verizon DBIR-2016
Verizon DBIR-2016Verizon DBIR-2016
Verizon DBIR-2016
 
Study on International Cross-Border Data Flow Management and Implications for...
Study on International Cross-Border Data Flow Management and Implications for...Study on International Cross-Border Data Flow Management and Implications for...
Study on International Cross-Border Data Flow Management and Implications for...
 
Drug User Development Projects - Public
Drug User Development Projects - PublicDrug User Development Projects - Public
Drug User Development Projects - Public
 
le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Trends in mortality_v0.9
Trends in mortality_v0.9Trends in mortality_v0.9
Trends in mortality_v0.9
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

The Evolution Of Data Breaches From 2013 To 2016

  • 1. A GLOBAL OVERVIEW FROM 2013 TO 2016 THE EVOLUTION OF DATA BREACHES Criminal attack System Glitches Human Error 48% 25% 27% 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 US AB IN DE UK BZ FR AU IT JP 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 AU 34,249US 28,765 IN 26,586 1 32 2013 AB 29,199IN 28,798 US 28,070 1 32 IN 31,225AB 30,179 US 29,611 1 32 2015 US 29,087AB 28,690 IN 26,586 1 32 2014 2016 US $5.40 mil. DE $5.09 mil. FR $3.97 mil. 1 32 2013 US $6.53 mil. UK $4.89 mil. AU $4.34 mil. 1 32 US $7.01 mil. DE $5.01 mil. IN $4.72 mil. 1 32 2015 US $5.85 mil. UK $4.74 mil. JP $4.19 mil. 1 32 2014 2016 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 Healthcare Financial Pharmaceuticals Transportation Communications Services Technology Research Energy Hospitality Consumer Education Media Industrial Public Services Retail 233 215 207 169 150 134 129 125 114 113 111 103 103 81 78 Healthcare Financial Pharmaceuticals Transportation Communications Services Technology Research Energy Hospitality Consumer Education Media Industrial Public Services Retail $8.00 $7.00 $6.00 $5.00 $4.00 $3.00 $2.00 $1.00 $0.00 35000 30000 25000 20000 15000 10000 5000 0 0 300005000 10000 20000 25000 $0 $5,000,000$1,000,000 $2,000,000 $3,000,000 $4,000,000 $7,000,000$6,000,000 2013 2016 0 25050 100 150 200 $0 $250 $300 $350 $400$50 $100 $150 $200 The main causes of data breaches in 2016 Sample: 383 Organisations 10 Countries 16 Industry sectors US AB IN DE UK BZ FR AU IT JP Passwordless Security