!
!
!
!
!
!
! !
!!
!
!
!
!
!
Inside Data Breaches
Sources: “Cybersecurity: Why Context Matters and How Do We Find It” and “Cybersecurity: The End of Rules Is Nigh” (Hortonworks);
“What Your Security Scientists Can Learn From Your Data Scientists to Improve Cybersecurity” (TechCrunch)
The Neverending SOC Cycle
Security teams can get thousands of SIEM system alerts each day. After
deciding which are most pressing, they’ll spend hours investigating a
threat. Here’s one example of this often-fruitless search.
How to Catch a Thief
Security analytics combined with AI and machine learning is transformative.
Interset’s big-data processing swiftly pinpoints threats, while expanding
visibility to get a contextual picture of enterprise risk.
The solution lies in distilling billions of events into hundreds of anomalies,
then into a handful of actionable SOC leads.
Guess Choose an alert to pursue
Console Look at 8+ SOC dashboards for
context
Console Check SIEM, and spot 2 IP
addresses
Research Figure out which systems the IP
address match
Research Determine if IP addresses are
good or bad
Research Look at asset-inventory system
for application owners
Setback Email owners, due to out-of-date
asset-inventory system
Research Find out when system was last
scanned
Research Figure out if the system has been
patched
Console See if the system has been
backed-up
Email Request a one-off vulnerability
scan
Research Check if backend has been tested
Setback Discover disaster-recovery is only
annual
Console Find where log files are being sent
Setback Not all log files are available
Email Request missing logs
Email Receive missing logs within 2 hours
Setback 4+ hours later, realize that this is
a false alarm
Guess Start this process again, with
next alert
!!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
! !
!
!
!
!
!
!
!
!
!
!
!
! !
!
!
!
! !
!
!
!
!
!
!
!
!
!
!
!
!!
!
!
!
!
!
! !
!!
!
!
!
!
!
!
!
!
!
! !
!
!
!
!!
!
! !
!
!
Security Audit ($10K-120K)
Remediation + Extra Security (varies)
Regulatory Fines (% of annual revenue)
Crisis Management ($200-500/hr)
Incident Response + Investigation ($20K-10M)
Customer Notifications ($5-10/customer)
Discounts + Gift Cards (varies)
Legal Settlements ($11.2M-115M)
Legal Counsel ($390-$1,200/hr)
Employee Turnover (21% of annual salary)
New CISO ($223K-420K salary)
Recruiting New CISO (20-50% of salary)
One Data Breach Costs $3.62 Million
And that’s just the average. Below, a breakdown of how expensive a security
incident can get.
$
$
$
$
$
$$
$
$
$
$
$
All numbers represent average costs. Sources: 2017 Cost of Data
Breach Study (IBM Security and Ponemon Institute); Calculate the
Business Impact and Cost of a Breach (Forrester, 8/31/17);
http://www.fairinstitute.org/blog/what-is-open-fair-and-who-is-
the-open-group
Stock figures as of 9/20/17. Source: Stock Chart and Quote (via Equifax.com)
Equifax Has Lost $7 Billion
A pair of breaches caused its stock to plummet
65%—in a little more than one week
Sep 11, 2017
141.35
Sep 19, 2017
92.98
How Long Does It Take to Discover a Breach?
Dwell time can span from hours to years
Sources: 2017 Data Breach Investigations Report (Verizon); 2017 Cost of Data Breach Study (IBM Security and Ponemon Institute);
M-Trends 2017: A View From the Frontlines (Mandiant)
Hours 2.6%
Days 7.8%
Weeks 7.8%
Months 42.9%
Years 38.9%
% OF
TIME COMPANIES
99 Days
66 Days
Breach Dwell Time
Time to Contain It

More Related Content

PPTX
Cost slides
PPTX
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
PPTX
Productivity 3.0
PPT
Koosis on Risk & Innovation
PDF
Crush Common Cybersecurity Threats with Privilege Access Management
PPTX
Web security – everything we know is wrong cloud version
PPTX
MISO L007 managing system security
PPTX
We cant hack ourselves secure
Cost slides
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Productivity 3.0
Koosis on Risk & Innovation
Crush Common Cybersecurity Threats with Privilege Access Management
Web security – everything we know is wrong cloud version
MISO L007 managing system security
We cant hack ourselves secure

Similar to Infographic: Inside Data Breaches (20)

PPTX
Cacs na isaca session 414 ulf mattsson may 10 final
PDF
ISSA Siem Fraud
PPTX
Cybersecurity Metrics: Reporting to BoD
PPTX
CRI "Lessons From The Front Lines" March 26th Dublin
PPTX
Cyber Crimes Forensics
PPTX
Web security-–-everything-we-know-is-wrong-eoin-keary
PDF
Data Breach Risk Brief - 2015
PPTX
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
PPTX
7 Predictive Analytics, Spark , Streaming use cases
PDF
El contexto de la integración masiva de datos
PDF
Blockchains : Risk or Mitigation?
 
PDF
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
PDF
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
PPTX
Cybersecurity by the numbers
PDF
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
PPT
Consensus Audit Guidelines 2008
PPTX
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
PPTX
SplunkLive! Splunk for Security
PDF
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
Cacs na isaca session 414 ulf mattsson may 10 final
ISSA Siem Fraud
Cybersecurity Metrics: Reporting to BoD
CRI "Lessons From The Front Lines" March 26th Dublin
Cyber Crimes Forensics
Web security-–-everything-we-know-is-wrong-eoin-keary
Data Breach Risk Brief - 2015
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
7 Predictive Analytics, Spark , Streaming use cases
El contexto de la integración masiva de datos
Blockchains : Risk or Mitigation?
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
Cybersecurity by the numbers
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
Consensus Audit Guidelines 2008
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
SplunkLive! Splunk for Security
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
Ad

More from Interset (20)

PDF
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
PDF
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
PDF
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
PPTX
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
PPTX
[Webinar] Supercharging Security with Behavioral Analytics
PDF
DataWorks 2018: How Big Data and AI Saved the Day
PPTX
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
PPTX
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
PPTX
Webinar: Will the Real AI Please Stand Up?
PPTX
Data Connectors San Antonio Cybersecurity Conference 2018
PPTX
IANS Forum Dallas - Technology Spotlight Session
PPTX
Operationalizing Big Data Security Analytics - IANS Forum Dallas
PPTX
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
PPTX
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
PPTX
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
PDF
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
PDF
Machine Learning + AI for Accelerated Threat-Hunting
PDF
User and Entity Behavioral Analytics
PPTX
A New Approach to Threat Detection: Big Data Security Analytics
PDF
Lead On: When More Data Becomes Less Work
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
[Webinar] Supercharging Security with Behavioral Analytics
DataWorks 2018: How Big Data and AI Saved the Day
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
Webinar: Will the Real AI Please Stand Up?
Data Connectors San Antonio Cybersecurity Conference 2018
IANS Forum Dallas - Technology Spotlight Session
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
Machine Learning + AI for Accelerated Threat-Hunting
User and Entity Behavioral Analytics
A New Approach to Threat Detection: Big Data Security Analytics
Lead On: When More Data Becomes Less Work
Ad

Recently uploaded (20)

PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
DOCX
search engine optimization ppt fir known well about this
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Unlock new opportunities with location data.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Five Habits of High-Impact Board Members
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
STKI Israel Market Study 2025 version august
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
search engine optimization ppt fir known well about this
Getting started with AI Agents and Multi-Agent Systems
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
WOOl fibre morphology and structure.pdf for textiles
O2C Customer Invoices to Receipt V15A.pptx
Unlock new opportunities with location data.pdf
1 - Historical Antecedents, Social Consideration.pdf
Five Habits of High-Impact Board Members
Developing a website for English-speaking practice to English as a foreign la...
Chapter 5: Probability Theory and Statistics
Benefits of Physical activity for teenagers.pptx
Taming the Chaos: How to Turn Unstructured Data into Decisions
Web Crawler for Trend Tracking Gen Z Insights.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
CloudStack 4.21: First Look Webinar slides
Univ-Connecticut-ChatGPT-Presentaion.pdf
Group 1 Presentation -Planning and Decision Making .pptx
STKI Israel Market Study 2025 version august

Infographic: Inside Data Breaches

  • 1. ! ! ! ! ! ! ! ! !! ! ! ! ! ! Inside Data Breaches Sources: “Cybersecurity: Why Context Matters and How Do We Find It” and “Cybersecurity: The End of Rules Is Nigh” (Hortonworks); “What Your Security Scientists Can Learn From Your Data Scientists to Improve Cybersecurity” (TechCrunch) The Neverending SOC Cycle Security teams can get thousands of SIEM system alerts each day. After deciding which are most pressing, they’ll spend hours investigating a threat. Here’s one example of this often-fruitless search. How to Catch a Thief Security analytics combined with AI and machine learning is transformative. Interset’s big-data processing swiftly pinpoints threats, while expanding visibility to get a contextual picture of enterprise risk. The solution lies in distilling billions of events into hundreds of anomalies, then into a handful of actionable SOC leads. Guess Choose an alert to pursue Console Look at 8+ SOC dashboards for context Console Check SIEM, and spot 2 IP addresses Research Figure out which systems the IP address match Research Determine if IP addresses are good or bad Research Look at asset-inventory system for application owners Setback Email owners, due to out-of-date asset-inventory system Research Find out when system was last scanned Research Figure out if the system has been patched Console See if the system has been backed-up Email Request a one-off vulnerability scan Research Check if backend has been tested Setback Discover disaster-recovery is only annual Console Find where log files are being sent Setback Not all log files are available Email Request missing logs Email Receive missing logs within 2 hours Setback 4+ hours later, realize that this is a false alarm Guess Start this process again, with next alert !! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !! ! ! ! ! ! ! ! !! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !! ! ! ! ! ! Security Audit ($10K-120K) Remediation + Extra Security (varies) Regulatory Fines (% of annual revenue) Crisis Management ($200-500/hr) Incident Response + Investigation ($20K-10M) Customer Notifications ($5-10/customer) Discounts + Gift Cards (varies) Legal Settlements ($11.2M-115M) Legal Counsel ($390-$1,200/hr) Employee Turnover (21% of annual salary) New CISO ($223K-420K salary) Recruiting New CISO (20-50% of salary) One Data Breach Costs $3.62 Million And that’s just the average. Below, a breakdown of how expensive a security incident can get. $ $ $ $ $ $$ $ $ $ $ $ All numbers represent average costs. Sources: 2017 Cost of Data Breach Study (IBM Security and Ponemon Institute); Calculate the Business Impact and Cost of a Breach (Forrester, 8/31/17); http://www.fairinstitute.org/blog/what-is-open-fair-and-who-is- the-open-group Stock figures as of 9/20/17. Source: Stock Chart and Quote (via Equifax.com) Equifax Has Lost $7 Billion A pair of breaches caused its stock to plummet 65%—in a little more than one week Sep 11, 2017 141.35 Sep 19, 2017 92.98 How Long Does It Take to Discover a Breach? Dwell time can span from hours to years Sources: 2017 Data Breach Investigations Report (Verizon); 2017 Cost of Data Breach Study (IBM Security and Ponemon Institute); M-Trends 2017: A View From the Frontlines (Mandiant) Hours 2.6% Days 7.8% Weeks 7.8% Months 42.9% Years 38.9% % OF TIME COMPANIES 99 Days 66 Days Breach Dwell Time Time to Contain It