SlideShare una empresa de Scribd logo
1 de 13
10 Signs We’re In For More Data Breaches
Under Constant Barrage
Defending against data breaches has never
been more challenging, and the stakes
have never been higher.
The ThreatTrack Security Labs processes
more than 200,000 new malicious threats
daily, underscoring the increasing velocity
and staggering rate at which cybercriminals
are creating new threats and unleashing
new variants to evade detection.
200,000+
new malware threats
are created every day
Executive Anxiety
When ThreatTrack Security conducted a
study of U.S. enterprise CEOs, CFOs,
CIOs and CISOs, the results painted a
picture of overwhelmed corporate leaders
who lacked confidence in their cyber-
security readiness, and expressed
resignation when it came to their ability to
defend against APTs and other advanced
threats used in data breaches.
ThreatTrack Security; Enterprise Executives Lack
Confidence About Cybersecurity, 2013
Of top enterprise executives:
69% concerned they are vulnerable to
advanced malware threats
66% unsure if they have been targeted
by an APT
47% do not use advanced malware analysis
in their cyber defense
S.O.S. From the Frontlines
ThreatTrack Security’s research with
security professionals within U.S.
enterprises responsible for malware
analysis revealed that this critical line of
data breach defense is understaffed and
outgunned in their daily battle against
internal and external threats.
ThreatTrack Security; Malware Analysts Have the
Tools They Need, But Challenges Remain, 2013
Enterprise malware analysts ID biggest challenges
67% concerned about complexity of malware
67% struggle with volume of malware they face
40% do not have enough skilled staff
35% lack access to advanced malware analysis tools
Self-Inflicted Wounds
Despite increased awareness and
employee education, cybersecurity
professionals within U.S. enterprises
continue to struggle with senior leadership’s
risky online behavior, opening the door to
stolen credentials and access to an
organization’s most sensitive data – all of
which is preventable.
ThreatTrack Security; Malware Analysts Have the
Tools They Need, But Challenges Remain, 2013
Cybersecurity pros report having to remove
malware from senior executives’ PCs because:
56%
Clicking on a malicious
link in a phishing email
45%
Allowing a family member to
use a company-owned device
40%
Visiting an infected
pornographic website
Data Breaches Costlier
and More Sophisticated
When you consider the costs associated
with loss of competitiveness, eroded
customer trust, government fines and
litigation, one breach may be all it takes to
put many businesses out of business.
* Verizon; 2013 Data Breach Investigations Report
** Ponemon Institute; 2013 Cost of Data Breach
Study: Global Analysis
40% of data breaches
involve malware*
92% of data breaches perpetrated by outsiders*
$3.03 million is the average cost of
lost business due to a data breach**
Data Breaches
Go Undetected
Time is not on your side, and breaches go
too long without being detected.
How are breaches discover? Only 10% of
data breaches are discovered by accident.
Most are discovered through the use of
forensic investigative tools like a malware
analysis sandbox, 28%; DLP solution, 19%;
or through law enforcement
notification, 15%.**
*Verizon; 2013 Data Breach Investigations Report
** Ponemon Institute; The Post Breach Boom, 2013
66%
of data breaches
take months to
be discovered*
Data Breaches
Go Unreported
Today’s data breach headlines may only be
scratching the surface, with too many data
breaches going unreported. According to
ThreatTrack Security research, the largest
companies are even more likely to have
had an unreported breach, with 66% of
malware analysts with the largest
enterprises reporting undisclosed data
breaches.
ThreatTrack Security; Malware Analysts Have the
Tools They Need, But Challenges Remain, 2013
57%
of enterprise malware analysts
have investigated or addressed
a data breach that was
never disclosed
Cybersecurity Under Funded
Research consistently shows that
cybersecurity pros lack resources, and the
numbers back that up. IT budgets are
rising, but security remains only a small
fraction despite growing awareness of data
breaches and the long-term risk they pose
to organizations of all sizes.
PwC; Global State of Information Security Survey
2014
Information security remains at
less than 4% of overall IT spending
Security < 4%
Untrusting Consumers
Months before Target’s data breach was
disclosed, consumers already lacked
confidence in U.S. enterprises’ ability to
keep their data secure. ThreatTrack
Security research uncovered deep mistrust
of enterprise cybersecurity and anxiety over
the vulnerability of their personal data.
ThreatTrack Security; Enterprise Executives Lack
Confidence About Cybersecurity, 2013
Of consumers:
71% say companies that hold their data do
not do enough to protect it
75% believe companies will be attacked and
their data will be stolen
47% reported being notified their
information had been compromised
Government’s Role Unclear
Many organizations rely on regulatory
compliance standards for the foundation of
their cybersecurity and data breach
defense strategy. While some cybersecurity
pros support government guidance, the
public remains skeptical of its involvement.
Meanwhile, others are conflicted about the
most recent government security
framework and guidance initiatives.
* ThreatTrack Security; Despite Adequate Security
Guidance From The Government, Defense
Contractors Say They Remain Vulnerable To Cyber-
Attack, 2014
** ThreatTrack Security; Enterprise Executives Lack
Confidence About Cybersecurity, 2013
88% of cybersecurity pros
say the government provides
strong guidance for securing
sensitive information*
70% of consumers are
skeptical of government
mandating security standards
to private companies**
Prevent Data Breaches
with ThreatTrack Security
ThreatTrack Security specializes in helping
organizations identify and stop Advanced
Persistent Threats (APTs), targeted attacks
and other sophisticated malware designed
to evade the traditional cyber-defenses
deployed by enterprises and government
agencies around the world.
The company develops advanced
cybersecurity solutions that
Expose, Analyze and Eliminate the
world’s most sophisticated malware. Learn
more at www.ThreatTrackSecurity.com.
10 Signs We’re in for More Data Breaches

Más contenido relacionado

Último

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Destacado

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destacado (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

10 Signs We’re in for More Data Breaches

  • 1. 10 Signs We’re In For More Data Breaches
  • 2. Under Constant Barrage Defending against data breaches has never been more challenging, and the stakes have never been higher. The ThreatTrack Security Labs processes more than 200,000 new malicious threats daily, underscoring the increasing velocity and staggering rate at which cybercriminals are creating new threats and unleashing new variants to evade detection. 200,000+ new malware threats are created every day
  • 3. Executive Anxiety When ThreatTrack Security conducted a study of U.S. enterprise CEOs, CFOs, CIOs and CISOs, the results painted a picture of overwhelmed corporate leaders who lacked confidence in their cyber- security readiness, and expressed resignation when it came to their ability to defend against APTs and other advanced threats used in data breaches. ThreatTrack Security; Enterprise Executives Lack Confidence About Cybersecurity, 2013 Of top enterprise executives: 69% concerned they are vulnerable to advanced malware threats 66% unsure if they have been targeted by an APT 47% do not use advanced malware analysis in their cyber defense
  • 4. S.O.S. From the Frontlines ThreatTrack Security’s research with security professionals within U.S. enterprises responsible for malware analysis revealed that this critical line of data breach defense is understaffed and outgunned in their daily battle against internal and external threats. ThreatTrack Security; Malware Analysts Have the Tools They Need, But Challenges Remain, 2013 Enterprise malware analysts ID biggest challenges 67% concerned about complexity of malware 67% struggle with volume of malware they face 40% do not have enough skilled staff 35% lack access to advanced malware analysis tools
  • 5. Self-Inflicted Wounds Despite increased awareness and employee education, cybersecurity professionals within U.S. enterprises continue to struggle with senior leadership’s risky online behavior, opening the door to stolen credentials and access to an organization’s most sensitive data – all of which is preventable. ThreatTrack Security; Malware Analysts Have the Tools They Need, But Challenges Remain, 2013 Cybersecurity pros report having to remove malware from senior executives’ PCs because: 56% Clicking on a malicious link in a phishing email 45% Allowing a family member to use a company-owned device 40% Visiting an infected pornographic website
  • 6. Data Breaches Costlier and More Sophisticated When you consider the costs associated with loss of competitiveness, eroded customer trust, government fines and litigation, one breach may be all it takes to put many businesses out of business. * Verizon; 2013 Data Breach Investigations Report ** Ponemon Institute; 2013 Cost of Data Breach Study: Global Analysis 40% of data breaches involve malware* 92% of data breaches perpetrated by outsiders* $3.03 million is the average cost of lost business due to a data breach**
  • 7. Data Breaches Go Undetected Time is not on your side, and breaches go too long without being detected. How are breaches discover? Only 10% of data breaches are discovered by accident. Most are discovered through the use of forensic investigative tools like a malware analysis sandbox, 28%; DLP solution, 19%; or through law enforcement notification, 15%.** *Verizon; 2013 Data Breach Investigations Report ** Ponemon Institute; The Post Breach Boom, 2013 66% of data breaches take months to be discovered*
  • 8. Data Breaches Go Unreported Today’s data breach headlines may only be scratching the surface, with too many data breaches going unreported. According to ThreatTrack Security research, the largest companies are even more likely to have had an unreported breach, with 66% of malware analysts with the largest enterprises reporting undisclosed data breaches. ThreatTrack Security; Malware Analysts Have the Tools They Need, But Challenges Remain, 2013 57% of enterprise malware analysts have investigated or addressed a data breach that was never disclosed
  • 9. Cybersecurity Under Funded Research consistently shows that cybersecurity pros lack resources, and the numbers back that up. IT budgets are rising, but security remains only a small fraction despite growing awareness of data breaches and the long-term risk they pose to organizations of all sizes. PwC; Global State of Information Security Survey 2014 Information security remains at less than 4% of overall IT spending Security < 4%
  • 10. Untrusting Consumers Months before Target’s data breach was disclosed, consumers already lacked confidence in U.S. enterprises’ ability to keep their data secure. ThreatTrack Security research uncovered deep mistrust of enterprise cybersecurity and anxiety over the vulnerability of their personal data. ThreatTrack Security; Enterprise Executives Lack Confidence About Cybersecurity, 2013 Of consumers: 71% say companies that hold their data do not do enough to protect it 75% believe companies will be attacked and their data will be stolen 47% reported being notified their information had been compromised
  • 11. Government’s Role Unclear Many organizations rely on regulatory compliance standards for the foundation of their cybersecurity and data breach defense strategy. While some cybersecurity pros support government guidance, the public remains skeptical of its involvement. Meanwhile, others are conflicted about the most recent government security framework and guidance initiatives. * ThreatTrack Security; Despite Adequate Security Guidance From The Government, Defense Contractors Say They Remain Vulnerable To Cyber- Attack, 2014 ** ThreatTrack Security; Enterprise Executives Lack Confidence About Cybersecurity, 2013 88% of cybersecurity pros say the government provides strong guidance for securing sensitive information* 70% of consumers are skeptical of government mandating security standards to private companies**
  • 12. Prevent Data Breaches with ThreatTrack Security ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber-defenses deployed by enterprises and government agencies around the world. The company develops advanced cybersecurity solutions that Expose, Analyze and Eliminate the world’s most sophisticated malware. Learn more at www.ThreatTrackSecurity.com.