SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Verizon 2013 Data Breach Investigations
Report Highlights

Source: 2013 Data Breach Investigations Report

1
Some organizations will be a
target REGARDLESS of what they do.
Most become a target BECAUSE of
what they do.

Source: 2013 Data Breach Investigations Report

2
Industries Impacted Most
Analysis of more than 47,000 reported security incidents and 621 confirmed data
breaches from the past year
Breaches affected
financial organizations

Breaches occurred in
retail environments
and restaurants

Network intrusions
involved manufacturing,
transportation, and
utilities

Network intrusions
hit information and
professional
services firms

Breaches impacted
larger organizations

27 different countries are represented

Source: 2013 Data Breach Investigations Report

Presented by:

wwt.com

3
Who Are the Perpetrators?
92% OUTSIDERS
14% INSIDERS
1% BUSINESS PARTNERS
7% MULTIPLE PARTIES
19% STATE-AFFILIATED
ACTORS

Source: 2013 Data Breach Investigations Report

Read the Full Report from Verizon

Presented by:

wwt.com

4
How Do Breaches Occur?
Used some form of hacking
Network intrusions exploited
weak or stolen credentials
Incorporated malware
Involved physical attacks
Leveraged social tactics
Resulted from privilege
misuse and abuse
The proportion of breaches incorporating social tactics like phishing was
FOUR TIMES HIGHER in 2012.

Source: 2013 Data Breach Investigations Report

Read the Full Report from Verizon

Presented by:

wwt.com

5
Top 10 Threat Actions for All Companies

See the top 20 threat actions broken down by company size in the full report.
Source: 2013 Data Breach Investigations Report

Read the Full Report from Verizon

Presented by:

wwt.com

6
We’re Not Seeing Improvement
While it may be difficult to detect, positively identify, and respond to an intrusion
within seconds or minutes, our ability to do so should ostensibly increase the
longer they poke around our internal networks. But unfortunately, we’re not really
seeing that improvement.

Figure 42: Percent of breaches that remain undiscovered for months or more
Source: 2013 Data Breach Investigations Report

Read the Full Report from Verizon

Presented by:

wwt.com

7
Get the full report and learn more about:
1.

Mobile device threats

2.

Most common motives behind the threats

3.

Most common abusers – this may surprise you

4.

What can your organization do
Read the Full Report from Verizon

Source: 2013 Data Breach Investigations Report

Presented by:

wwt.com

8

Weitere ähnliche Inhalte

Mehr von World Wide Technology

Mehr von World Wide Technology (9)

World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
 
World Wide Technology (WWT) TEC37 Webinar: Customer Experience Transcript
World Wide Technology (WWT) TEC37 Webinar: Customer Experience TranscriptWorld Wide Technology (WWT) TEC37 Webinar: Customer Experience Transcript
World Wide Technology (WWT) TEC37 Webinar: Customer Experience Transcript
 
World Wide Technology Webinar Transcript - Software Defined Networking
World Wide Technology Webinar Transcript - Software Defined NetworkingWorld Wide Technology Webinar Transcript - Software Defined Networking
World Wide Technology Webinar Transcript - Software Defined Networking
 
World Wide Technology Webinar - Software Defined Networking
World Wide Technology Webinar - Software Defined NetworkingWorld Wide Technology Webinar - Software Defined Networking
World Wide Technology Webinar - Software Defined Networking
 
World Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONEWorld Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONE
 
WWT Intelligent WAN Presentation
WWT Intelligent WAN PresentationWWT Intelligent WAN Presentation
WWT Intelligent WAN Presentation
 
WWT Webinar - The Role of Adoption Services in Tech Deployments
WWT Webinar - The Role of Adoption Services in Tech DeploymentsWWT Webinar - The Role of Adoption Services in Tech Deployments
WWT Webinar - The Role of Adoption Services in Tech Deployments
 
WWT IWAN Technical Presentation
WWT IWAN Technical PresentationWWT IWAN Technical Presentation
WWT IWAN Technical Presentation
 
Dave Chandler Presents SDN at World Wide Technology's TECday - St. Louis
Dave Chandler Presents SDN at World Wide Technology's TECday - St. LouisDave Chandler Presents SDN at World Wide Technology's TECday - St. Louis
Dave Chandler Presents SDN at World Wide Technology's TECday - St. Louis
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

2013 Data Breach Highlights

  • 1. Verizon 2013 Data Breach Investigations Report Highlights Source: 2013 Data Breach Investigations Report 1
  • 2. Some organizations will be a target REGARDLESS of what they do. Most become a target BECAUSE of what they do. Source: 2013 Data Breach Investigations Report 2
  • 3. Industries Impacted Most Analysis of more than 47,000 reported security incidents and 621 confirmed data breaches from the past year Breaches affected financial organizations Breaches occurred in retail environments and restaurants Network intrusions involved manufacturing, transportation, and utilities Network intrusions hit information and professional services firms Breaches impacted larger organizations 27 different countries are represented Source: 2013 Data Breach Investigations Report Presented by: wwt.com 3
  • 4. Who Are the Perpetrators? 92% OUTSIDERS 14% INSIDERS 1% BUSINESS PARTNERS 7% MULTIPLE PARTIES 19% STATE-AFFILIATED ACTORS Source: 2013 Data Breach Investigations Report Read the Full Report from Verizon Presented by: wwt.com 4
  • 5. How Do Breaches Occur? Used some form of hacking Network intrusions exploited weak or stolen credentials Incorporated malware Involved physical attacks Leveraged social tactics Resulted from privilege misuse and abuse The proportion of breaches incorporating social tactics like phishing was FOUR TIMES HIGHER in 2012. Source: 2013 Data Breach Investigations Report Read the Full Report from Verizon Presented by: wwt.com 5
  • 6. Top 10 Threat Actions for All Companies See the top 20 threat actions broken down by company size in the full report. Source: 2013 Data Breach Investigations Report Read the Full Report from Verizon Presented by: wwt.com 6
  • 7. We’re Not Seeing Improvement While it may be difficult to detect, positively identify, and respond to an intrusion within seconds or minutes, our ability to do so should ostensibly increase the longer they poke around our internal networks. But unfortunately, we’re not really seeing that improvement. Figure 42: Percent of breaches that remain undiscovered for months or more Source: 2013 Data Breach Investigations Report Read the Full Report from Verizon Presented by: wwt.com 7
  • 8. Get the full report and learn more about: 1. Mobile device threats 2. Most common motives behind the threats 3. Most common abusers – this may surprise you 4. What can your organization do Read the Full Report from Verizon Source: 2013 Data Breach Investigations Report Presented by: wwt.com 8