SlideShare une entreprise Scribd logo
1  sur  29
Understanding Today’s Security Breaches:
Ponemon Institute’s 2017 Cost of Data Breach Study
BENCHMARK RESEARCH SPONSORED BY IBM SECURITY
INDEPENDENTLY CONDUCTED BY
PONEMON INSTITUTE
JUNE 2017
2 IBM Security
Today’s speakers
Larry Ponemon
Chairman, Ponemon Institute
Wendi Whitmore
Global Lead, IBM X-Force IRIS
3 IBM Security
The 2017 Ponemon Cost of Data Breach Study covered 1,900
individuals across 419 companies in 13 countries or regions and
17 industries
Countries/regionsIndustries
Health, 1%
Media, 1%
Communications, 2%
Life science, 4%
Transportation, 5%
Hospitality, 4%
Energy, 5%
Consumer,5%
Public, 7%
Retail, 8%
Financial, 15%
Industrial, 15%
Services, 14%
Technology, 12%
Education, 1%
Research, <1%
Entertainment, <1%
South Africa, 5%
Italy, 6%
Canada, 6%
Middle East,
6%
Australia, 6%
Japan 7%
France 8% Germany 8%
Brazil, 9%
India,
9%
United
Kingdom,
10%
United States,
15%
ASEAN,
5%
4 IBM Security
Understanding these terms will help you understand the report findings
A mega-breach of more than 100,000 records is not considered typical. The cost data in this study cannot
be used to calculate the financial impact of a mega-breach over 100,000 records.
Data breach
An event in which an individual’s name plus a
medical record or financial record or debit card is
potentially at risk
Data record
Information that identifies the natural person
(individual) whose information has been lost or
stolen in a data breach
Incident
For this study, a data breach involving between
approximately 2,600 to slightly more than
100,000 compromised records
Participants
Organizations that experienced a data breach
within the target incident range
Benchmark research
The unit of analysis is the organization; in a
survey, the unit of analysis is the individual
5 IBM Security
What goes up should come down
$3.40
$3.60
$3.80
$4.00
2014 2015 2016 2017
$135
$140
$145
$150
$155
$160
2014 2015 2016 2017
Global average cost per record
in US dollars
Global average cost per incident
in millions of US dollars
• The global average cost of a data breach is down over previous years
• 48% of the per-record 11.4% decrease over last year is due to the US dollar
exchange rate
• The average size of a data breach increased 1.8% to 24,089 records
$141 $3.62M
$158
$154
$145
$4.00M
$3.79M
$3.50M
– 11.4% – 10%
6 IBM Security
Costs and trends vary widely across countries in the study
Canada $190/$4.31M
US $225/$7.35M
Brazil $79/$1.52M
UK $123/$3.10M
Germany $160/$3.68M
France $146/$3.51M
Italy $128/$2.80M
South Africa $128/
$2.53M
Australia $106
$1.92M
Middle East $155/$4.94M
India $64/$1.68M
Japan $140/
$3.47M
Currencies converted to US dollars; no comparison data for ASEAN
ASEAN $112/$2.29M
7 IBM Security
Reductions in the cost of data breach measures helped reduce overall
costs in some countries
-15.00%
-10.00%
-5.00%
0.00%
5.00%
10.00%
15.00%
AU BZ CA DE FR ID IT JP ME SA UK US
Abnormal churn Size of data breach Average total cost Per record cost
8 IBM Security
$71
$101
$119
$123
$124
$131
$132
$137
$149
$150
$154
$165
$188
$200
$223
$245
$380
Public Sector
Research
Media
Transportation
Hospitality
Entertainment
Consumer
Energy
Industrial
Communications
Retail
Technology
Life science
Education
Services
Financial
Health
The per-record cost of a data breach also varies widely by industry
Currencies converted to US dollars
Up 7%
Up 10.9%
Up 7.2%
Down 18.7%
Up 13.8%
Down 3.6%
Down 10.5%
Down 8.5%
Down 4.5%
Down 7.4%
Down 0.8%
*
Down 10.8%
Down 4.7%
Down 9.1%
Down 9.8%
Down11.3% *Comparative y-t-y data not available
Percent change over 2016:
Increase
Decrease
9 IBM Security
The largest component of the total cost of a data breach is lost business
Detection and escalation
$0.99 million
Notification
$0.19 million
Lost business cost
$1.51 million
Ex-post response
$0.93 million
Components of the $3.62 million cost per data breach
$3.62
million
Forensics, root cause
determination, organizing
incident response team,
identifying victims
Disclosure of data breach to
victims and regulators
Help desk, inbound communications,
special investigations, remediation, legal
expenditures, product discounts, identity
protection service, regulatory interventions
Abnormal turnover of
customers, increased
customer acquisition cost,
reputation losses,
diminished goodwill
Currencies converted to US dollars
10 IBM Security
Gaining visibility and responding faster help to reduce costs
Mean time to identify (MTTI) Mean time to contain (MTTC)
(The time it takes to detect that an incident
has occurred)
(The time it takes to resolve a situation and
ultimately restore service)
Total cost, in millions Total cost, in millions
Currencies converted to US dollars
$2.80
$3.83
$3.23
$4.38
MTTI < 100 days MTTI > 100 days
$2.83
$3.77
$3.18
$4.35
MTTC < 30 days MTTC > 30 days
FY 2017 FY 2016
11 IBM Security
Hackers and criminal insiders continue to cause most data breaches
Malicious or
criminal attack
47%
Human error
28%
System glitch
25%
$126per record to resolve
$156per record to resolve
$128per record to resolve
Currencies converted to US dollars
12 IBM Security
The incidence of malicious attack varies considerably by country
59%
52%
50%
50%
48%
48%
48%
46%
44%
43%
41%
40%
40%
22%
24%
19%
23%
24%
24%
22%
34%
25%
29%
33%
25%
24%
19%
24%
31%
28%
28%
28%
30%
20%
31%
29%
26%
35%
36%
Middle East
United States
France
United Kingdom
Japan
Australia
Canada
Germany
Brazil
South Africa
India
ASEAN
Italy
Malicious or criminal attack System glitch Human error
13 IBM Security
Are you focusing on the right things? What are the odds of….
Winning the
Powerball?
Getting struck by
lightning?
Being in a car
accident on a
1,000-mile trip?
Dating a
millionaire?
1
in
292,201,338
1
in
960,000
1
in
366
1
in
220
14 IBM Security
The odds are much greater that you will experience a data breach
15%
15%
17%
23%
24%
26%
26%
27%
32%
36%
39%
40%
41%
Canada
Germany
Australia
Italy
Japan
United Kingdom
ASEAN
United States
Middle East
France
Brazil
India
South Africa
Probability that an
organization in the
study will experience
a data breach over
two-year period
1 in 4
Experiencing a
data breach?
(Global average 28%)
15 IBM Security
What you can do to help reduce the cost of a data breach
$2.90
$5.10
$5.20
$5.40
$5.70
$6.20
$6.80
$8.00
$10.90
$12.50
$16.10
$19.30
CPO appointed
Board-level involvement
CISO appointed
Insurance protection
Data classification
Use of DLP
Use of security analytics
Participation in threat sharing
Business Continuity Management involvement
Employee training
Extensive use of encryption
Incident response team
Amount by which the cost-per-record was lowered
Currencies converted to US dollars
Savings are higher than 2016
*
No comparative data
*
*
*
16 IBM Security
The study also found factors that increase the per-record cost
($2.00)
($2.70)
($5.50)
($7.60)
($8.80)
($11.20)
($14.13)
($16.90)
Amount by which the cost-per-record was increased
Currencies converted to US dollars
Third party involvement
Extensive cloud migration
Compliance failures
Extensive use of mobile platforms
Lost or stolen devices
Rush to notify
Consultants engaged
Provision of ID protection
*
*
($16.90)
($14.13)
($11.20)
($8.80)
($7.60)
($5.50)
($2.70)
($2.00)
Additional costs are higher than 2016
No comparative data
*
17 IBM Security
How organizations are spending their IT security budgets in relation to a
breach
Prevention
31%
Detection
29%
Containment
20%
Remediation
20%
IT
SECURITY
SPEND
18 IBM Security
Proven Incident Response thought leadership and expertise
IBM X-Force Incident Response and Intelligence Services (IRIS)
Led by the industry’s top luminaries Do you see what we see?
WENDI
WHITMORE
Global Practice
Leader
KEVIN
ALBANO
Global Threat
Intelligence Leader
CHRISTOPHER
SCOTT
Global Remediation
Leader
CRAIG
HEILMANN
Global Delivery
Leader
Global response,
remediation, intelligence,
and team leadership
Incident response,
investigations,
threat analysis
Advanced threat
research and
information analysis
Balancing network
security with
business processes
Incident response,
remediation, and
security operations
AHMED
SALEH
Global Incident
Response Leader
AREAS OF EXPERTISE
19 IBM Security
IBM Incident Response and Intelligence Services capabilities
Built on best practice technologies and supported by industry-leading consulting
and services expertise
IBM X-Force IRIS
INTELLIGENCE
SERVICES
IBM X-Force IRIS
RESPONSE & PROACTIVE
SERVICES
IBM X-Force IRIS
REMEDIATION
SERVICES
• Threat Intelligence Analysts
• Intelligence Enablement Training
• Operationalized Intelligence
Package
• Threat Assessment, Incident
Response and Analysis, Retainers
• IR / CIRT / CSIRT Program
Development
• Managed Detection and Response
• Breach Remediation
• Strategic Remediation
and Implementation
• Agile Incident Management
20 IBM Security
Breaking the attack chain with Incident Response
GATHER
Authorized system
attempts to access
resources
BREAK-IN
Remote employee
triggers drive-by
download
LATCH-ON
Internal system
infected as part
of a botnet
EXPAND
Targeted internal email
sent to high-profile
employees
EXFILTRATE
Persistent attackers
quietly siphoning
out data
ATTACK CHAIN
1 2 3 4 5
PEOPLE
• The right level of expertise to handle advanced attacks
• Respond quickly and efficiently; onsite and / or remotely
• Understand business process and security requirements
• Focused on protecting a clients intellectual property
PROCESS
• Controlled standards-based incident response plans
• Intelligence and malware analysis and reporting
TECHNOLOGY
• Endpoint event analysis in near real-time
• Watson for Cybersecurity bringing cognitive solutions
21 IBM Security
Prevention: When prevention works
• Agile incident management:
̶ Which levers will your organization
need to pull in the event of a
widespread breach?
• Account privilege segregation
• Privileged password “checkout”
• Time-limited privileged access
22 IBM Security
Detection: Worth the investment?
• Organization was undergoing active
attack on a daily basis
• Knew what tools the attacker was using,
but was concerned there were areas of
enterprise they weren’t seeing
• Worked with organization to install an
EDR solution
• Identified attacker activity on hosts in
real time
23 IBM Security
Containment
• WannaCry
̶ Robust patching
̶ Offline backups
̶ Sensitive data segmented
24 IBM Security
Remediation
• Shamoon v2
• Destructive malware in the
environment
• Recover data and get business
running again as fast as possible
• Prevent similar capability from
causing disruption in the
environment in the future
25 IBM Security
Key takeaways from this year’s study
1 Lost business is the biggest financial consequence of a data breach
6 Visibility across the incident life cycle is critical to identifying threats, prioritizing
response and identifying data at risk
Having the right skills, expertise and knowledge—from operations to the C-
Suite—can impact an organization’s ability to reduce the cost of a data breach3
A proactive approach to incident response can significantly reduce cost and
impact of a breach4
Investing in security technologies such as analytics, SIEM and encryption can
help prevent breaches as well as reduce cost5
2 Breaches that occur during cloud implementations and involve mobile add
complexity and cost
26 IBM Security
Organizations are making investments and seeing results, but there
remains much room for improvement
Global average percentage of companies that:
Have a data security
strategy
Participate in threat
intelligence sharing
Deploy security intelligence
systems including SIEM
Deploy advanced identity
and access management
tools
Extensively use encryption
or cryptographic tools
Outsource some or all of
security opertions or
infrastructure
41% 43% 52%
48% 59% 56%
27 IBM Security
Engage with the numbers
Go to ibm.com/security/data-breach
and register to receive the global
study or a country-specific study
Go to ibm.com/security/services
to learn how IBM Security Services can
help in your journey to reduce impact
of and exposure to a data breach
Go to ibm.com/security/data-breach
and see what the data breach
numbers look like for you
New this
year! Data
Breach Cost
Calculator
28 IBM Security
Q & A
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express
or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of,
creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these
materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may
change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and
other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks
or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise.
Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or
product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are
designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective.
IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT
OF ANY PARTY.
FOLLOW US ON:
THANK YOU
WGP03611USEN-00

Contenu connexe

Tendances

Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyIBM Security
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!IBM Security
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 

Tendances (20)

Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
True Cost of Data Breaches
True Cost of Data BreachesTrue Cost of Data Breaches
True Cost of Data Breaches
 

Similaire à Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost of a Data Breach study, sponsored by IBM Security

EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFERMA
 
Data Con LA 2022 - The Evolution of AI in Cybersecurity
Data Con LA 2022 - The Evolution of AI in CybersecurityData Con LA 2022 - The Evolution of AI in Cybersecurity
Data Con LA 2022 - The Evolution of AI in CybersecurityData Con LA
 
P19 nrss final presentation with audience results_6.26.19
P19 nrss final presentation with audience results_6.26.19P19 nrss final presentation with audience results_6.26.19
P19 nrss final presentation with audience results_6.26.19National Retail Federation
 
IBM Security - Successful digital transformation
IBM Security - Successful digital transformationIBM Security - Successful digital transformation
IBM Security - Successful digital transformationSebastien JARDIN
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Will Your Business Get Hacked - Peterborough (Apr 28)
Will Your Business Get Hacked - Peterborough (Apr 28)Will Your Business Get Hacked - Peterborough (Apr 28)
Will Your Business Get Hacked - Peterborough (Apr 28)Kamarin Computers Ltd
 
Data security risks and the cost of business continuity (slideshare) tmcs q...
Data security risks and the cost of business continuity (slideshare)   tmcs q...Data security risks and the cost of business continuity (slideshare)   tmcs q...
Data security risks and the cost of business continuity (slideshare) tmcs q...tmcscs
 
Will Your Business Get Hacked - Hull (Apr 28)
Will Your Business Get Hacked - Hull (Apr 28)Will Your Business Get Hacked - Hull (Apr 28)
Will Your Business Get Hacked - Hull (Apr 28)HBP Systems Ltd
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Protect your Business from Hackers!
Protect your Business from Hackers!Protect your Business from Hackers!
Protect your Business from Hackers!SkyWireInc
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentationVincent Kwon
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Reportaccenture
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 linDanie Schoeman
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...SolarWinds
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&ANick Normile
 

Similaire à Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost of a Data Breach study, sponsored by IBM Security (20)

EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for IT
 
Data Con LA 2022 - The Evolution of AI in Cybersecurity
Data Con LA 2022 - The Evolution of AI in CybersecurityData Con LA 2022 - The Evolution of AI in Cybersecurity
Data Con LA 2022 - The Evolution of AI in Cybersecurity
 
P19 nrss final presentation with audience results_6.26.19
P19 nrss final presentation with audience results_6.26.19P19 nrss final presentation with audience results_6.26.19
P19 nrss final presentation with audience results_6.26.19
 
IBM Security - Successful digital transformation
IBM Security - Successful digital transformationIBM Security - Successful digital transformation
IBM Security - Successful digital transformation
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Will Your Business Get Hacked - Peterborough (Apr 28)
Will Your Business Get Hacked - Peterborough (Apr 28)Will Your Business Get Hacked - Peterborough (Apr 28)
Will Your Business Get Hacked - Peterborough (Apr 28)
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 
Data security risks and the cost of business continuity (slideshare) tmcs q...
Data security risks and the cost of business continuity (slideshare)   tmcs q...Data security risks and the cost of business continuity (slideshare)   tmcs q...
Data security risks and the cost of business continuity (slideshare) tmcs q...
 
Will Your Business Get Hacked - Hull (Apr 28)
Will Your Business Get Hacked - Hull (Apr 28)Will Your Business Get Hacked - Hull (Apr 28)
Will Your Business Get Hacked - Hull (Apr 28)
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Protect your Business from Hackers!
Protect your Business from Hackers!Protect your Business from Hackers!
Protect your Business from Hackers!
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 lin
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A
 

Plus de IBM Security

Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...IBM Security
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersIBM Security
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadIBM Security
 

Plus de IBM Security (12)

Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
 

Dernier

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Dernier (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost of a Data Breach study, sponsored by IBM Security

  • 1. Understanding Today’s Security Breaches: Ponemon Institute’s 2017 Cost of Data Breach Study BENCHMARK RESEARCH SPONSORED BY IBM SECURITY INDEPENDENTLY CONDUCTED BY PONEMON INSTITUTE JUNE 2017
  • 2. 2 IBM Security Today’s speakers Larry Ponemon Chairman, Ponemon Institute Wendi Whitmore Global Lead, IBM X-Force IRIS
  • 3. 3 IBM Security The 2017 Ponemon Cost of Data Breach Study covered 1,900 individuals across 419 companies in 13 countries or regions and 17 industries Countries/regionsIndustries Health, 1% Media, 1% Communications, 2% Life science, 4% Transportation, 5% Hospitality, 4% Energy, 5% Consumer,5% Public, 7% Retail, 8% Financial, 15% Industrial, 15% Services, 14% Technology, 12% Education, 1% Research, <1% Entertainment, <1% South Africa, 5% Italy, 6% Canada, 6% Middle East, 6% Australia, 6% Japan 7% France 8% Germany 8% Brazil, 9% India, 9% United Kingdom, 10% United States, 15% ASEAN, 5%
  • 4. 4 IBM Security Understanding these terms will help you understand the report findings A mega-breach of more than 100,000 records is not considered typical. The cost data in this study cannot be used to calculate the financial impact of a mega-breach over 100,000 records. Data breach An event in which an individual’s name plus a medical record or financial record or debit card is potentially at risk Data record Information that identifies the natural person (individual) whose information has been lost or stolen in a data breach Incident For this study, a data breach involving between approximately 2,600 to slightly more than 100,000 compromised records Participants Organizations that experienced a data breach within the target incident range Benchmark research The unit of analysis is the organization; in a survey, the unit of analysis is the individual
  • 5. 5 IBM Security What goes up should come down $3.40 $3.60 $3.80 $4.00 2014 2015 2016 2017 $135 $140 $145 $150 $155 $160 2014 2015 2016 2017 Global average cost per record in US dollars Global average cost per incident in millions of US dollars • The global average cost of a data breach is down over previous years • 48% of the per-record 11.4% decrease over last year is due to the US dollar exchange rate • The average size of a data breach increased 1.8% to 24,089 records $141 $3.62M $158 $154 $145 $4.00M $3.79M $3.50M – 11.4% – 10%
  • 6. 6 IBM Security Costs and trends vary widely across countries in the study Canada $190/$4.31M US $225/$7.35M Brazil $79/$1.52M UK $123/$3.10M Germany $160/$3.68M France $146/$3.51M Italy $128/$2.80M South Africa $128/ $2.53M Australia $106 $1.92M Middle East $155/$4.94M India $64/$1.68M Japan $140/ $3.47M Currencies converted to US dollars; no comparison data for ASEAN ASEAN $112/$2.29M
  • 7. 7 IBM Security Reductions in the cost of data breach measures helped reduce overall costs in some countries -15.00% -10.00% -5.00% 0.00% 5.00% 10.00% 15.00% AU BZ CA DE FR ID IT JP ME SA UK US Abnormal churn Size of data breach Average total cost Per record cost
  • 8. 8 IBM Security $71 $101 $119 $123 $124 $131 $132 $137 $149 $150 $154 $165 $188 $200 $223 $245 $380 Public Sector Research Media Transportation Hospitality Entertainment Consumer Energy Industrial Communications Retail Technology Life science Education Services Financial Health The per-record cost of a data breach also varies widely by industry Currencies converted to US dollars Up 7% Up 10.9% Up 7.2% Down 18.7% Up 13.8% Down 3.6% Down 10.5% Down 8.5% Down 4.5% Down 7.4% Down 0.8% * Down 10.8% Down 4.7% Down 9.1% Down 9.8% Down11.3% *Comparative y-t-y data not available Percent change over 2016: Increase Decrease
  • 9. 9 IBM Security The largest component of the total cost of a data breach is lost business Detection and escalation $0.99 million Notification $0.19 million Lost business cost $1.51 million Ex-post response $0.93 million Components of the $3.62 million cost per data breach $3.62 million Forensics, root cause determination, organizing incident response team, identifying victims Disclosure of data breach to victims and regulators Help desk, inbound communications, special investigations, remediation, legal expenditures, product discounts, identity protection service, regulatory interventions Abnormal turnover of customers, increased customer acquisition cost, reputation losses, diminished goodwill Currencies converted to US dollars
  • 10. 10 IBM Security Gaining visibility and responding faster help to reduce costs Mean time to identify (MTTI) Mean time to contain (MTTC) (The time it takes to detect that an incident has occurred) (The time it takes to resolve a situation and ultimately restore service) Total cost, in millions Total cost, in millions Currencies converted to US dollars $2.80 $3.83 $3.23 $4.38 MTTI < 100 days MTTI > 100 days $2.83 $3.77 $3.18 $4.35 MTTC < 30 days MTTC > 30 days FY 2017 FY 2016
  • 11. 11 IBM Security Hackers and criminal insiders continue to cause most data breaches Malicious or criminal attack 47% Human error 28% System glitch 25% $126per record to resolve $156per record to resolve $128per record to resolve Currencies converted to US dollars
  • 12. 12 IBM Security The incidence of malicious attack varies considerably by country 59% 52% 50% 50% 48% 48% 48% 46% 44% 43% 41% 40% 40% 22% 24% 19% 23% 24% 24% 22% 34% 25% 29% 33% 25% 24% 19% 24% 31% 28% 28% 28% 30% 20% 31% 29% 26% 35% 36% Middle East United States France United Kingdom Japan Australia Canada Germany Brazil South Africa India ASEAN Italy Malicious or criminal attack System glitch Human error
  • 13. 13 IBM Security Are you focusing on the right things? What are the odds of…. Winning the Powerball? Getting struck by lightning? Being in a car accident on a 1,000-mile trip? Dating a millionaire? 1 in 292,201,338 1 in 960,000 1 in 366 1 in 220
  • 14. 14 IBM Security The odds are much greater that you will experience a data breach 15% 15% 17% 23% 24% 26% 26% 27% 32% 36% 39% 40% 41% Canada Germany Australia Italy Japan United Kingdom ASEAN United States Middle East France Brazil India South Africa Probability that an organization in the study will experience a data breach over two-year period 1 in 4 Experiencing a data breach? (Global average 28%)
  • 15. 15 IBM Security What you can do to help reduce the cost of a data breach $2.90 $5.10 $5.20 $5.40 $5.70 $6.20 $6.80 $8.00 $10.90 $12.50 $16.10 $19.30 CPO appointed Board-level involvement CISO appointed Insurance protection Data classification Use of DLP Use of security analytics Participation in threat sharing Business Continuity Management involvement Employee training Extensive use of encryption Incident response team Amount by which the cost-per-record was lowered Currencies converted to US dollars Savings are higher than 2016 * No comparative data * * *
  • 16. 16 IBM Security The study also found factors that increase the per-record cost ($2.00) ($2.70) ($5.50) ($7.60) ($8.80) ($11.20) ($14.13) ($16.90) Amount by which the cost-per-record was increased Currencies converted to US dollars Third party involvement Extensive cloud migration Compliance failures Extensive use of mobile platforms Lost or stolen devices Rush to notify Consultants engaged Provision of ID protection * * ($16.90) ($14.13) ($11.20) ($8.80) ($7.60) ($5.50) ($2.70) ($2.00) Additional costs are higher than 2016 No comparative data *
  • 17. 17 IBM Security How organizations are spending their IT security budgets in relation to a breach Prevention 31% Detection 29% Containment 20% Remediation 20% IT SECURITY SPEND
  • 18. 18 IBM Security Proven Incident Response thought leadership and expertise IBM X-Force Incident Response and Intelligence Services (IRIS) Led by the industry’s top luminaries Do you see what we see? WENDI WHITMORE Global Practice Leader KEVIN ALBANO Global Threat Intelligence Leader CHRISTOPHER SCOTT Global Remediation Leader CRAIG HEILMANN Global Delivery Leader Global response, remediation, intelligence, and team leadership Incident response, investigations, threat analysis Advanced threat research and information analysis Balancing network security with business processes Incident response, remediation, and security operations AHMED SALEH Global Incident Response Leader AREAS OF EXPERTISE
  • 19. 19 IBM Security IBM Incident Response and Intelligence Services capabilities Built on best practice technologies and supported by industry-leading consulting and services expertise IBM X-Force IRIS INTELLIGENCE SERVICES IBM X-Force IRIS RESPONSE & PROACTIVE SERVICES IBM X-Force IRIS REMEDIATION SERVICES • Threat Intelligence Analysts • Intelligence Enablement Training • Operationalized Intelligence Package • Threat Assessment, Incident Response and Analysis, Retainers • IR / CIRT / CSIRT Program Development • Managed Detection and Response • Breach Remediation • Strategic Remediation and Implementation • Agile Incident Management
  • 20. 20 IBM Security Breaking the attack chain with Incident Response GATHER Authorized system attempts to access resources BREAK-IN Remote employee triggers drive-by download LATCH-ON Internal system infected as part of a botnet EXPAND Targeted internal email sent to high-profile employees EXFILTRATE Persistent attackers quietly siphoning out data ATTACK CHAIN 1 2 3 4 5 PEOPLE • The right level of expertise to handle advanced attacks • Respond quickly and efficiently; onsite and / or remotely • Understand business process and security requirements • Focused on protecting a clients intellectual property PROCESS • Controlled standards-based incident response plans • Intelligence and malware analysis and reporting TECHNOLOGY • Endpoint event analysis in near real-time • Watson for Cybersecurity bringing cognitive solutions
  • 21. 21 IBM Security Prevention: When prevention works • Agile incident management: ̶ Which levers will your organization need to pull in the event of a widespread breach? • Account privilege segregation • Privileged password “checkout” • Time-limited privileged access
  • 22. 22 IBM Security Detection: Worth the investment? • Organization was undergoing active attack on a daily basis • Knew what tools the attacker was using, but was concerned there were areas of enterprise they weren’t seeing • Worked with organization to install an EDR solution • Identified attacker activity on hosts in real time
  • 23. 23 IBM Security Containment • WannaCry ̶ Robust patching ̶ Offline backups ̶ Sensitive data segmented
  • 24. 24 IBM Security Remediation • Shamoon v2 • Destructive malware in the environment • Recover data and get business running again as fast as possible • Prevent similar capability from causing disruption in the environment in the future
  • 25. 25 IBM Security Key takeaways from this year’s study 1 Lost business is the biggest financial consequence of a data breach 6 Visibility across the incident life cycle is critical to identifying threats, prioritizing response and identifying data at risk Having the right skills, expertise and knowledge—from operations to the C- Suite—can impact an organization’s ability to reduce the cost of a data breach3 A proactive approach to incident response can significantly reduce cost and impact of a breach4 Investing in security technologies such as analytics, SIEM and encryption can help prevent breaches as well as reduce cost5 2 Breaches that occur during cloud implementations and involve mobile add complexity and cost
  • 26. 26 IBM Security Organizations are making investments and seeing results, but there remains much room for improvement Global average percentage of companies that: Have a data security strategy Participate in threat intelligence sharing Deploy security intelligence systems including SIEM Deploy advanced identity and access management tools Extensively use encryption or cryptographic tools Outsource some or all of security opertions or infrastructure 41% 43% 52% 48% 59% 56%
  • 27. 27 IBM Security Engage with the numbers Go to ibm.com/security/data-breach and register to receive the global study or a country-specific study Go to ibm.com/security/services to learn how IBM Security Services can help in your journey to reduce impact of and exposure to a data breach Go to ibm.com/security/data-breach and see what the data breach numbers look like for you New this year! Data Breach Cost Calculator
  • 29. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. FOLLOW US ON: THANK YOU WGP03611USEN-00