SlideShare a Scribd company logo
Don’t fall into
a data trap.
Don’t fall into a data trap.
Data breaches are happening all the time, from healthcare
($355 per lost record) to the public sector ($80 per lost record).
Whatever your industry, a data breach is a time-consuming,
costly problem to solve.
page 2
Lost records.
Hacked reports.
Stolen information.
Don’t fall into a data trap.
The average data breach costs
$4 million.
page 3
page 4
Don’t fall into a data trap.
And the cost of a data breach has risen
29% since 2013.
page 5
Don’t fall into a data trap.
Malicious and criminal attacks account for
fewer than half of all data breaches. A breach is
more likely to result from internal processes,
human error and
system glitches.
page 6
Don’t fall into a data trap.
page 6
(BCM) can help you address a data breach faster.
Business
Continuity
Management
page 7
Don’t fall into a data trap.
It takes an enterprise 227 days on average to
identify the cause of a data breach.
BCM can help you
bring that down to
175 days.
page 8
Don’t fall into a data trap.
And once it’s detected, a data breach takes
an enterprise an average of 88 days to contain.
BCM involvement helps
get that to 57 days.
page 9
Don’t fall into a data trap.
Enterprises that involve
BCM saw a 29% decrease
in the likelihood of a data breach
in the first two years.
page 10
SOURCE: 2016 Ponemon Cost of a Data Breach report.
Learn more about how to keep your company intact in the
“2016 Ponemon Cost of a Data Breach” report:
https://ibm.biz/BdrTmD
Lost business and a weaker reputation
are the real costs of a data breach.

More Related Content

PDF
DataKillers
PPTX
Data Governance in the Enterprise: Highlights from Our Research Report
PPTX
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
PDF
Verizon's DBIR-A look into each industry
PDF
2015 cost of data breach study global analysis
PDF
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
PDF
The 2013 Cost of Data Breach Study is out from Symantec - RapidSSLOnline
PDF
Whitepaper: 2013 Cost of Data Breach Study
DataKillers
Data Governance in the Enterprise: Highlights from Our Research Report
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Verizon's DBIR-A look into each industry
2015 cost of data breach study global analysis
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
The 2013 Cost of Data Breach Study is out from Symantec - RapidSSLOnline
Whitepaper: 2013 Cost of Data Breach Study

What's hot (16)

PDF
Chief Audit Execs speak out: Cybersecurity & risk management
PDF
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
PPTX
EU GDPR- The Countdown to Compliance, Research Study Highlights
PDF
Real-time Analytics Data Act Reporting
PPTX
A4 digital privacy
PPTX
PDF
Data Breaches Lead to Identity Fraud, according to Javelin
PDF
wp-analyzing-breaches-by-industry
PDF
Reasons to be secure
PPTX
A4 presentation
PDF
IG004 Litigation Cost Trends 2014_FINAL
PDF
Your Worst GDPR Nightmare - Unstructured Data
PDF
The New Data Economy: Own your Data
PDF
Enterprise Encryption and Authentication Usage: Survey Report
PDF
Cyber liability and public entities infographic
Chief Audit Execs speak out: Cybersecurity & risk management
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
EU GDPR- The Countdown to Compliance, Research Study Highlights
Real-time Analytics Data Act Reporting
A4 digital privacy
Data Breaches Lead to Identity Fraud, according to Javelin
wp-analyzing-breaches-by-industry
Reasons to be secure
A4 presentation
IG004 Litigation Cost Trends 2014_FINAL
Your Worst GDPR Nightmare - Unstructured Data
The New Data Economy: Own your Data
Enterprise Encryption and Authentication Usage: Survey Report
Cyber liability and public entities infographic
Ad

Similar to Don't Fall Into a Trap: How Business Continuity Management Can Help Data Breaches (20)

DOCX
2016 Cost of Data Breach Study Global Analysis .docx
PDF
DATA BREACH & PREVENTION - Hemali Rangoliya
PPTX
What Cybercriminals Want: Company Data – by United Security Providers
PPT
IT Controls Presentation
PDF
The Rise of Data Breaches in Small Businesses
PDF
2015 cost of data breach study
PDF
Beware! DIRTY DATA CAN ADVERSELY IMPACT YOUR BOTTOM LINE
PDF
2014 State of Backup for SMBs
PDF
Cybersecurity statistics sheet
PDF
White Paper - Nuix Cybersecurity - US Localized
PDF
wp-follow-the-data
PDF
eBook: State of Data Backup for SMBs
PDF
Data Breach Guide 2013
PDF
Most Noticeable Facts About Cybersecurity – Cyberroot Risk Advisory
PDF
How Can Businesses Improve Business Data Security?
PDF
2015 Cost of Data Breach Study: Impact of Business Continuity Management
PDF
Data Minimization in the age of Big Data | Sysfore
PPTX
DLP.pptx
PDF
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
PDF
CBIZ Cyber Security - What Every Business Needs to Know
2016 Cost of Data Breach Study Global Analysis .docx
DATA BREACH & PREVENTION - Hemali Rangoliya
What Cybercriminals Want: Company Data – by United Security Providers
IT Controls Presentation
The Rise of Data Breaches in Small Businesses
2015 cost of data breach study
Beware! DIRTY DATA CAN ADVERSELY IMPACT YOUR BOTTOM LINE
2014 State of Backup for SMBs
Cybersecurity statistics sheet
White Paper - Nuix Cybersecurity - US Localized
wp-follow-the-data
eBook: State of Data Backup for SMBs
Data Breach Guide 2013
Most Noticeable Facts About Cybersecurity – Cyberroot Risk Advisory
How Can Businesses Improve Business Data Security?
2015 Cost of Data Breach Study: Impact of Business Continuity Management
Data Minimization in the age of Big Data | Sysfore
DLP.pptx
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
CBIZ Cyber Security - What Every Business Needs to Know
Ad

More from IBM Services (8)

PDF
A Closer Look at a Hybrid IT Environment
PPT
Data is Big - Ensure it's Resilient
PPT
Private cloud in the hybrid era
PPT
The business value of managed services: Findings from IDC research sponsored...
PDF
Why deploy private cloud in the hybrid cloud era?
PDF
2013 IBM Cyber Security Intelligence Index Infographic
PDF
IBM Mobile Infrastructure Study Infographic
PPT
IBM Global Technology Services: Partnering for Better Business Outcomes
A Closer Look at a Hybrid IT Environment
Data is Big - Ensure it's Resilient
Private cloud in the hybrid era
The business value of managed services: Findings from IDC research sponsored...
Why deploy private cloud in the hybrid cloud era?
2013 IBM Cyber Security Intelligence Index Infographic
IBM Mobile Infrastructure Study Infographic
IBM Global Technology Services: Partnering for Better Business Outcomes

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation theory and applications.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Empathic Computing: Creating Shared Understanding
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
Unlocking AI with Model Context Protocol (MCP)
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Machine learning based COVID-19 study performance prediction
Encapsulation_ Review paper, used for researhc scholars
Network Security Unit 5.pdf for BCA BBA.
Digital-Transformation-Roadmap-for-Companies.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Getting Started with Data Integration: FME Form 101
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Univ-Connecticut-ChatGPT-Presentaion.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation theory and applications.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Empathic Computing: Creating Shared Understanding
TLE Review Electricity (Electricity).pptx
1. Introduction to Computer Programming.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
MIND Revenue Release Quarter 2 2025 Press Release

Don't Fall Into a Trap: How Business Continuity Management Can Help Data Breaches

  • 1. Don’t fall into a data trap.
  • 2. Don’t fall into a data trap. Data breaches are happening all the time, from healthcare ($355 per lost record) to the public sector ($80 per lost record). Whatever your industry, a data breach is a time-consuming, costly problem to solve. page 2 Lost records. Hacked reports. Stolen information.
  • 3. Don’t fall into a data trap. The average data breach costs $4 million. page 3
  • 4. page 4 Don’t fall into a data trap. And the cost of a data breach has risen 29% since 2013.
  • 5. page 5 Don’t fall into a data trap. Malicious and criminal attacks account for fewer than half of all data breaches. A breach is more likely to result from internal processes, human error and system glitches.
  • 6. page 6 Don’t fall into a data trap. page 6 (BCM) can help you address a data breach faster. Business Continuity Management
  • 7. page 7 Don’t fall into a data trap. It takes an enterprise 227 days on average to identify the cause of a data breach. BCM can help you bring that down to 175 days.
  • 8. page 8 Don’t fall into a data trap. And once it’s detected, a data breach takes an enterprise an average of 88 days to contain. BCM involvement helps get that to 57 days.
  • 9. page 9 Don’t fall into a data trap. Enterprises that involve BCM saw a 29% decrease in the likelihood of a data breach in the first two years.
  • 10. page 10 SOURCE: 2016 Ponemon Cost of a Data Breach report. Learn more about how to keep your company intact in the “2016 Ponemon Cost of a Data Breach” report: https://ibm.biz/BdrTmD Lost business and a weaker reputation are the real costs of a data breach.