SlideShare a Scribd company logo
1 of 30
Download to read offline
2012 Cost of Cyber Crime Study:
   Japan



  Sponsored by HP Enterprise Security
  Independently conducted by Ponemon Institute LLC
  Publication Date: October 2012




Ponemon Institute© Research Report
2012 Cost of Cyber Crime Study: Japan
                                 Benchmark Study of Japanese Organizations
                                          Ponemon Institute October 2012

Part 1. Executive Summary

We are pleased to present the 2012 Cost of Cyber Crime Study: Japan. Sponsored by HP
Enterprise Security, this is the first year the study was conducted in Japan to better understand the
economic impact a cyber attack can have on an organization. The benchmark study is based on a
representative sample of 29 organizations in various industry sectors.
The first Cost of Cyber Crime Study was conducted in the US in 2010 and is now in its third year.
This year the scope of the research was expanded to include organizations in Japan as well as in
the United Kingdom, Germany and Australia. Findings from these countries are presented in
separate reports.
Cyber attacks generally refer to criminal activity conducted via the Internet. These attacks can
include stealing an organization’s intellectual property, confiscating online bank accounts, creating
and distributing viruses on other computers, posting confidential business information on the Internet
and disrupting a country’s critical national infrastructure. Disruption to business processes and
revenue losses create the highest costs for organizations following a cyber attack.
Key takeaways from this report include:
!      Cyber crimes are costly. We found that the average annualized cost of cyber crime for the 29
       organizations in our study is 402 million Yen (¥) per year, with a range of ¥.53 million to ¥18.3
       million.
!      Cyber attacks have become common occurrences. The companies in our study experienced 31
       successful attacks per week or more than 1.1 successful attacks per organization per week.
!      The most costly cyber crimes are those caused by malicious insiders, web-based attacks and
       denial of services. Mitigation of such attacks requires enabling technologies such as SIEM,
       intrusion prevention systems, application security testing and enterprise governance, risk
       management and compliance (GRC) solutions.
The purpose of this benchmark research is to quantify the economic impact of cyber attacks and
observe cost trends over time. We believe a better understanding of the cost of cyber crime will
assist organizations in determining the appropriate amount of investment and resources needed to
prevent or mitigate the devastating consequences of an attack.
Our goal is to be able to quantify with as much accuracy as possible the costs incurred by
organizations when they have a cyber attack. In our experience, a traditional survey approach
would not capture the necessary details required to extrapolate cyber crime costs. Therefore, we
decided to pursue field-based research that involved interviewing senior-level personnel and
collecting details about actual cyber crime incidents. Approximately nine months of effort was
required to recruit companies, build an activity-based cost model, collect source information and
analyze results.
This research culminated with the completion of case studies involving 29 organizations. For
consistency purposes, our benchmark sample consists of only larger-sized organizations (i.e., more
                           1
than 1,000 enterprise seats ).
The focus of our project was the direct, indirect and opportunity costs that resulted from the loss or
theft of information, disruption to business operations, revenue loss and destruction of property,
plant and equipment. In addition to external consequences of the cyber crime, the analysis
attempted to capture the total cost spent on detection, investigation, containment, recovery and
after-the-fact or “ex-post” response.


1
    Enterprise seats refer to the number of direct connections to the network and enterprise systems.



Ponemon Institute© Research Report                                                                      Page 1
Global at a glance

As discussed above, the study has been conducted in the US for three years and this is the first year
we included the UK, Germany, Australia and Japan. Some of the most interesting similarities and
differences are presented below.

Figure 1 presents the estimated average cost of cyber crime for five country samples after
conversion into US dollars. As shown, there is significant variation among companies in the
benchmark samples. The US sample reports the highest total average cost at $8.9 million and the
UK sample reports the lowest total average cost at $3.3 million.

Figure 1. Total cost of cyber crime in five countries
Costs expressed in US dollars, n = 199 separate companies
   $10,000,000
                                                                                      $8,933,510
    $9,000,000
    $8,000,000
    $7,000,000
                                                                      $5,950,725
    $6,000,000                                        $5,154,447
    $5,000,000
    $4,000,000       $3,252,912      $3,386,201
    $3,000,000
    $2,000,000
    $1,000,000
            $-
                         UK              AU                 JP           DE               US

Possible reasons for these differences may be the types and frequencies of attacks experienced as
well as the importance that each company places on the theft of information assets versus other
consequences of the incident.

We found that US companies were much more likely to experience the most expensive types of
cyber attacks, which are malicious insiders, malicious code and web-based incidents. Similarly, UK
and Australian were most likely to experience denial of service attacks. In contrast, German
companies were least likely to experience malicious code and denial of services. Japanese
companies were least likely to experience malicious insiders and web-based attacks.

Another key finding that may explain cost differences among countries concerns the theft of
information assets. US and German companies report this as the most significant consequence of a
cyber attack. On the other hand, UK and Australia attach more importance to business disruption.
As noted in this report, the cost of business disruption is lower than the cost of information theft.

With respect to internal activity costs, we also found interesting differences. Specifically, the cost of
detecting a cyber attack appears to be the most expensive for German companies. The cost of
recovery from a cyber incident appears to be more expensive for companies in the UK and Australia.
It is interesting to note that Japanese companies cite higher costs to investigate and manage the
incident than the other countries.




Ponemon Institute© Research Report                                                                 Page 2
Summary of Japanese findings

Following are the most salient findings of this year’s study. These findings focus on the factors that
affect the cost of cyber crime for organizations.

Cyber crimes are very costly for organizations. We found that the median annualized cost for 29
benchmarked organizations is ¥402 million per year, with a range from ¥.53 million to ¥18.3 million
each year per company.

Cyber crime cost varies by organizational size. Results reveal a positive relationship between
organizational size (as measured by enterprise seats) and annualized cost. However, based on
enterprise seats, we determined that smaller-sized organizations incur a significantly higher per
capita cost than larger-sized organizations (¥56.4 versus ¥15.0 thousand).

All industries fall victim to cybercrime, but to different degrees. The average annualized cost of
cyber crime appears to vary by industry segment, where technology, communications and financial
services experience higher costs than organizations in retail, education and media.

Cyber crimes are intrusive and common occurrences. The companies participating in our study
experienced 31 successful attacks per week – or more than 1.1 successful attacks per organization.

The most costly cyber crimes are those caused by malicious insiders, denial of services and
Web-based attacks. These account for more than 55 percent of all cyber crime costs per
organization on an annual basis. Mitigation of such attacks requires enabling technologies such as
SIEM, intrusion prevention systems, application security testing solutions and enterprise GRC
solutions.

Cyber attacks can get costly if not resolved quickly. Results show a positive relationship
between the time to contain an attack and organizational cost. The average time to resolve a cyber
attack was 17 days, with an average cost to participating organizations of ¥402.8 million over this
17-day period. Results show that malicious insider attacks can take more than 28 days on average
to contain.

Theft of information assets and disruption to business operations represent the highest
external costs. On an annualized basis, information losses and business disruption each account
                                       2
for 36 percent of total external costs. In addition, costs associated with revenue losses and
equipment damages represent 24 percent of external costs.

Detection and recovery are the most costly internal activities. On an annualized basis, detection
and recovery combined account for 45 percent of the total internal activity cost with direct labor and
productivity losses representing the majority of these costs.

Deployment of security intelligence systems makes a difference. The cost of cyber crime is
moderated by the use of security intelligence systems (including SIEM). Findings suggest
companies using security intelligence technologies were more efficient in detecting and containing
cyber attacks. As a result, these companies enjoyed an average cost savings of ¥4.014 million
when compared to companies not deploying security intelligence technologies.

Deployment of enterprise security governance practices moderates the cost of cyber crime.
Findings show companies that have adequate resources, appoint a high-level security leader, and
employ certified or expert staff experience cyber crime costs that are lower than companies that
have not implemented these practices. This so-called “cost savings” for companies deploying good
security governance practices is estimated at more than ¥3.194 million, on average.

2
In the context of this study, an external cost is one that is created by external factors such as fines, litigation,
marketability of stolen intellectual properties and more.



Ponemon Institute© Research Report                                                                             Page 3
A strong security posture moderates the cost of cyber attacks. We utilize a well-known metric
called the Security Effectiveness Score (SES) to define an organization’s ability to achieve
                                3
reasonable security objectives. The higher the SES, the more effective the organization is in
achieving its security objectives. The average cost to mitigate a cyber attack for organizations with a
high SES is substantially lower than organizations with a low SES score.




3
 The Security Effectiveness Score has been developed by PGP Corporation and Ponemon Institute in its
annual encryption trends survey to define the security posture of responding organizations. The SES is derived
from the rating of 24 security features or practices. This method has been validated from more than 30
independent studies conducted since June 2005. The SES provides a range of +2 (most favorable) to -2 (least
favorable). Hence, a result greater than zero is viewed as net favorable.



Ponemon Institute© Research Report                                                                      Page 4
Part 2. Report Findings

Ponemon Institute’s 2012 Cost of Cyber Crime Study: Japan examines the total costs organizations
incur when responding to cyber crime incidents and include the following: detection, recovery,
investigation and incident management, ex-post response and cost containment. These costs do
not include a plethora of ongoing expenditures and investments made to sustain an organization’s
security posture or compliance with standards, policies and regulations.

Cyber crimes are costly for participating organizations

The economic impact of a cyber attack is wide ranging and is influenced by a variety of factors
discussed in this report. The total annualized cost of cyber crime for the 2012 benchmark sample of
29 organizations ranges from a low of ¥53,2 million to a high of ¥1,503 million. Participating
companies were asked to report their expenditures and in-house activities over four consecutive
weeks. Once costs over the four-week period were compiled and validated, the reported figures
                                                                    4
were then grossed-up to present an extrapolated annualized cost.

Figure 2 shows the median annualized cost of cyber crime in the study benchmark sample is ¥260.4
million. The grand mean value is ¥402.8 million.

Figure 2. The Cost of Cyber Crime



          Maximum value                                                                ¥1,503,174,381




                    Mean                      ¥402,820,000




                  Median                ¥260,397,553




          Minimum value         ¥53,156,272



                           ¥0           ¥500,000,000      ¥1,000,000,000     ¥1,500,000,000    ¥2,000,000,000




4
    Following is the gross-up statistic: Annualized revenue = [cost estimate]/[4/52 weeks].



Ponemon Institute© Research Report                                                                        Page 5
Figure 3 reports the distribution of annualized total cost for 29 companies. As can be seen, 17 of
organizations in our sample incurred total costs below the mean value of ¥402.8 million, thus
indicating a skewed distribution. The highest cost estimate of ¥1,503 million was determined not to
be an outlier based on additional analysis. Two other organizations experienced an annualized total
cost of cyber crime above ¥900 million. The lowest total cost was ¥53.2 million.

Figure 3. Total cost of cyber crime for 29 participating companies
   ¥1,600,000,000
                                                                  ¥1,503,174,381
   ¥1,400,000,000

   ¥1,200,000,000

   ¥1,000,000,000

    ¥800,000,000

    ¥600,000,000

    ¥400,000,000

    ¥200,000,000
                                                               ¥53,156,272
               ¥0
                    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29

                                 Annualized total cost         Average cost

As part of our analysis, we calculated a precision interval for the average cost of ¥402.8 million. The
purpose of this interval is to demonstrate that our cost estimates should be thought of as a range of
possible outcomes rather than a single point or number. The range of possible cost estimates
widens at increasingly higher levels of confidence as shown in Figure 4.

Figure 4. Precision interval for the mean value of annualized total cost
   ¥600,000,000
                                                             ¥488,389,654          ¥506,533,313
                     ¥454,877,440        ¥471,397,128
   ¥500,000,000

   ¥400,000,000

   ¥300,000,000      ¥350,762,560        ¥334,242,872        ¥317,250,346          ¥299,106,687
   ¥200,000,000

   ¥100,000,000

             ¥0
                     90% precision       95% precision     97.5% precision      99% precision
                       interval            interval            interval           interval

                                Minimum            Mean          Maximum




Ponemon Institute© Research Report                                                                Page 6
The cost of cyber crime varies by organizational size
As shown in Figure 5, organizational size, as measured by the number of enterprise seats or nodes,
is positively correlated to annualized cyber crime cost. This positive correlation is indicated by the
upward sloping regression line.

Figure 5. Annualized cost in ascending order by the number of enterprise seats
Regression performed on enterprise seats ranging from 1,003 to 80,290


  ¥1,600,000,000
                                                                            ¥1,503,174,381
  ¥1,400,000,000

  ¥1,200,000,000

  ¥1,000,000,000

     ¥800,000,000

     ¥600,000,000

     ¥400,000,000

     ¥200,000,000

                 ¥0
                                       Ascending order by the number of enterprise seats

                                        Annualized total cost           Regression

The following tables show that organizational size can influence the cost of cyber crime.

Organizations are placed into one of four quartiles based on their total number of enterprise seats
(which we use as a size surrogate). We do this to create a more precise understanding of the
relationship between organizational size and the cost of cyber crime. Table 1 shows the quartile
average cost of cyber crime for 2012.

 Table 1: Quartile analysis
 ¥1,000,000 omitted                    FY 2012 (n=29)
 Quartile 1                                            ¥893.1

 Quartile 2                                            ¥360.7

 Quartile 3                                            ¥186.6

 Quartile 4                                            ¥100.9

Table 2 reports the average cost per enterprise seat (a.k.a. per capita cost) compiled for four
quartiles ranging from the smallest (Quartile 1) to the largest (Quartile 4). The 2012 average per
capita cost for organizations with the fewest seats is more than 3.5 times higher than the average
per capita cost for organizations with the most seats.

 Table 2. Quartile analysis
 ¥1,000,000 omitted                  2012 cost per seat
 Quartile 1 (smallest)                                  ¥56.4
 Quartile 2                                             ¥30.9
 Quartile 3                                             ¥40.5
 Quartile 4 (largest)                                   ¥15.0




Ponemon Institute© Research Report                                                              Page 7
A comparison of smaller and larger-sized organizations split by the sample median of 10,993 seats
reveals that the cost mix for specific cyber attacks varies by organizational size.
Smaller organizations (below the median) experience a higher proportion of cyber crime costs
relating to botnets, malicious code, viruses, worms, trojans and web-based attacks. In contrast,
larger organizations (above the median) experience a higher proportion of costs relating to denial of
service, malicious insiders, stolen devices and phishing.
Figure 6. The cost mix of attacks by organizational size
Size measured according to the number of enterprise seats within the participating organizations



                Denial of services                         22%                              20%

               Web-based attacks                  15%                              22%

                Malicious insiders                        21%                      10%

         Viruses, Worms, Trojans           6%               13%

                    Malicious code         6%              12%

                    Stolen devices              12%              5%

   Phishing & social engineering             9%             5%

                            Botnets     4%           8%

                           Malware         5%        5%

                                      0%        5%        10%    15%      20%    25%     30%       35%   40%    45%

             Above median value for enterprise seats                  Below median value for enterprise seats




Ponemon Institute© Research Report                                                                               Page 8
The cost of cyber crime impacts all industries

The average annualized cost of cyber crime appears to vary by industry segment. As seen in Figure
7, technology, communications and financial services experience substantially higher costs.
                                                                                             5
Organizations in media, education and retail appear to have a lower overall cyber crime cost.

Figure 7. Average annualized cost by industry sector
¥1,000,000 omitted


             Technology                                                                            ¥5.92

        Communications                                                                     ¥5.28

       Financial services                                                                 ¥5.20

          Transportation                                                                  ¥5.14

                Industrial                                                           ¥4.82

        Utilities & energy                                                ¥3.87

     Consumer products                                      ¥2.63

                Services                                   ¥2.57

            Public sector                               ¥2.29

                   Retail                          ¥1.89

    Education & research                          ¥1.80

                   Media                        ¥1.59

                         ¥0.00      ¥1.00       ¥2.00      ¥3.00       ¥4.00      ¥5.00       ¥6.00        ¥7.00




5
 This analysis is for illustration purposes only. The sample sizes in all three years are too small to draw
definitive conclusions about industry segment differences.



Ponemon Institute© Research Report                                                                            Page 9
Cyber crimes are intrusive and common occurrences

The benchmark sample of 29 organizations experienced 31 discernible and successful cyber attacks
per week, which translates to more than 1.1 successful attacks per benchmarked organization each
week. Figure 8 summarizes in percentages the types of attack methods experienced by participating
companies. Almost all organizations experienced attacks relating to viruses, worms, trojans and
                                                 6
malware over the four-week benchmarking period.

Figure 8. Types of cyber attacks experienced by 29 benchmarked companies
The percentage frequency defines a type of attack categories experienced


          Viruses, worms, trojans                                                                93%

                          Malware                                                                93%

                   Stolen devices                                                55%

                   Malicious code                                          45%

                          Botnets                                  38%

              Web-based attacks                                   34%

                 Denial of service                          28%

    Phishing & social engineering                     21%

               Malicious insiders                  17%

                                     0%   10% 20% 30% 40% 50% 60% 70% 80% 90% 100%




6
 Malware attacks and malicious code attacks are inextricably linked. We classified malware attacks that
successfully infiltrated the organizations’ networks or enterprise systems as a malicious code attack.



Ponemon Institute© Research Report                                                                     Page 10
Costs vary considerably by the type of cyber attack

Figure 9 shows the percentage of annualized cyber crime cost allocated to nine attack types
compiled from all benchmarked organizations. Malicious insiders, web-based attacks and denial of
services are the most costly incidents facing Japanese companies. The least of concern are bots,
phishing and social engineering and stolen devices. In total, the top three attacks account for more
than 56 percent of the total annualized cost of cyber crime.

Figure 9. Percentage annualized cyber crime cost by attack type


             Malicious insiders                                                          21%

            Web-based attacks                                                     19%

             Denial of services                                            16%

       Viruses, Worms, Trojans                            9%

                      Malware                            9%

                Malicious code                          8%

                Stolen devices                      7%

  Phishing & social engineering                    6%

                       Botnets                5%


                                  0%       5%            10%         15%          20%            25%




Ponemon Institute© Research Report                                                             Page 11
While Figure 9 shows the average percentage of cost according to attack type, Figure 10 reveals the
most to least expensive cyber attacks when analyzed on a per incident basis. The most expensive
are malicious insiders and web-based attacks. In the context of our study, malicious insiders include
employees, temporary employees, contractors and, possibly, business partners.

Figure 10. Average annualized cyber crime cost weighted by attack frequency


             Malicious insiders                                                       ¥544,104

            Web-based attacks                             ¥167,459

             Denial of services                 ¥75,496

                Malicious code                ¥61,835

  Phishing & social engineering           ¥43,835

                Stolen devices            ¥39,116

                       Botnets         ¥1,213

       Viruses, Worms, Trojans         ¥811

                      Malware          ¥441


                                  ¥0                    ¥200,000     ¥400,000         ¥600,000




Ponemon Institute© Research Report                                                           Page 12
Time to resolve or contain cyber crimes increases the cost

The average number of days to resolve cyber attacks is 17 with a maximum of 38 days. The average
cost was ¥18,989,814 over the 17-day period. Figure 11 shows the annualized cost of cyber crime in
ascending order by the average number of days to resolve attacks. The regression line shows an
upward slope, which suggests cost and time variables are positively related.

Figure 11. Average days to resolve attack in ascending order
Estimated average time is measured for each given organization in days
    ¥1,600,000,000

    ¥1,400,000,000

    ¥1,200,000,000

    ¥1,000,000,000

      ¥800,000,000

      ¥600,000,000

      ¥400,000,000

      ¥200,000,000

                 ¥0
                           Ascending order by the number of days to contain security exploits

                                         Annualized total cost            Regression

Figure 12 reports the average days to resolve cyber attacks for nine different attack types studied in
this report. It is clear from this chart that it takes the most amount of time, on average, to resolve
attacks from malicious insiders, malicious code and web-based attackers (hackers).

Figure 12. Average days to resolve attack
Estimated average time is measured for each attack type in days


              Malicious insiders                                                                      28.3

                 Malicious code                                                               23.6

             Web-based attacks                                                         19.0

               Denial of service                                               16.6

   Phishing & social engineering                                   11.9

                 Stolen devices                             8.7

                        Botnets             2.1

                       Malware                  2.6

         Viruses, worms, trojans          1.1

                                   0.0            5.0       10.0      15.0            20.0    25.0     30.0




Ponemon Institute© Research Report                                                                   Page 13
Theft of information assets and business disruption represents the highest external cost

As shown in Figure 13, at the top end of the external cyber crime cost spectrum is information theft
and business disruption, which each accounts for 36 percent of total external costs. In addition, the
costs associated with revenue losses and equipment damages account for 24 percent of external
costs.

Figure 13. Percentage cost for external consequences
Other cost includes direct and indirect costs that could not be allocated to a main external cost category


   40%              36%                   36%
   35%
   30%
   25%
   20%                                                          18%

   15%
   10%                                                                                 6%
                                                                                                             4%
     5%
     0%
                Business           Information loss        Revenue loss           Equipment             Other costs
                disruption                                                        damages




Ponemon Institute© Research Report                                                                                    Page 14
Detection and recovery are the most costly internal activities

Cyber crime detection and recovery activities account for 45 percent of total internal activity cost, as
shown in Figure 14. This is followed by investigation at 20 percent.

Incident management and containment each represent 18 and 13 percent of internal activity cost,
respectively. Ex-post response (i.e. after the fact response or remediation) represents the lowest
internal activity cost (4 percent). These cost elements highlight a significant cost-reduction
opportunity for organizations that are able to automate recovery and detection activities through
enabling security technologies.

Figure 14. Percentage cost by internal activity center
Investigation includes escalation activities


   25%            23%
                                     22%
                                                   20%
   20%                                                              18%


   15%                                                                             13%


   10%


     5%                                                                                         4%


     0%
               Detection          Recovery     Investigation   Incident mgmt    Containment    Ex-post
                                                                                              response

The percentage of annualized costs can be further broken down into six specific expenditure
components, which include direct labor (30 percent), productivity loss (24 percent), cash outlay (23
percent), indirect labor (15 percent), overhead (6 percent), as shown in Figure 15.

Figure 15. Percentage activity cost by six specific cost components
   35%
                  30%
   30%
                                     24%          23%
   25%

   20%
                                                                   15%
   15%

   10%
                                                                                   6%
    5%                                                                                         2%

    0%
             Direct labor       Productivity   Cash outlay     Indirect labor   Overhead      Other
                                   loss




Ponemon Institute© Research Report                                                                    Page 15
The organization’s security posture influences the cost of cyber crime

We measure the security posture of participating organizations as part of the benchmarking process.
Figure 16 reports the annualized cost and regression of companies in ascending order of their
security effectiveness as measured by the SES (see footnote 3).

The figure shows a downward sloping regression, suggesting that companies with a stronger
security posture experience a lower overall cost. The SES range of possible scores is +2 (most
favorable) to -2 (least favorable). Compiled results for the present benchmark sample vary from a
high of +1.61 to a low of -1.17, with a mean value at -.37.

Figure 16. Annualized cost in ascending order by SES value
Regression performed on SES ranging from +1.61 to a low of -1.17


   ¥1,600,000,000
                                             ¥1,503,174,381
   ¥1,400,000,000

   ¥1,200,000,000

   ¥1,000,000,000

     ¥800,000,000

     ¥600,000,000

     ¥400,000,000

     ¥200,000,000

                   ¥0
                                                    Ascending order of SES value

                                       Annualized total cost          Regression


A comparison of organizations grouped into four quartiles based on SES reveals cost differences.
Table 3 shows the average cost for companies in quartile 1 is ¥152.61 million, while the average
cost for quartile 4 is substantially higher at ¥689.28 million. This analysis suggests that the
company’s security posture has a favorable affect on the total annualized cost of cyber crime.

 Table 3. Quartile analysis
 ¥1,000,000 omitted                        2012 total cost
 Quartile 1 (highest SES)                              ¥152.6
 Quartile 2                                           ¥ 363.9
 Quartile 3                                           ¥ 441.5
 Quartile 4 (lowest SES)                              ¥ 689.2




Ponemon Institute© Research Report                                                           Page 16
Organizations deploying security intelligence technologies realize a lower annualized cost of
cyber crime.

Figure 17 reports the annualized cost of cyber crime allocated to the five cost activity centers
explained previously. The figure compares companies deploying and not deploying security
intelligence systems.
As can be seen, companies using security intelligence systems experience a lower cost in three of
five activity centers. The largest cost differences in millions pertain to investigation and incident
management (¥173.9 million vs. ¥133.0 million), detection (¥106.0 million vs. ¥79.8 million) and
recovery (¥89.1 million vs. ¥87.4 million) activities, respectively.
Figure 17. Activity cost comparison and the use of security intelligence technologies
¥1,000,000 omitted
   ¥200.0
                                        ¥173.9
   ¥180.0
   ¥160.0
                                 ¥133.0
   ¥140.0
   ¥120.0              ¥106.0
   ¥100.0                                             ¥87.4 ¥89.1
               ¥79.8
    ¥80.0
                                                                        ¥57.0
    ¥60.0                                                                       ¥46.7
    ¥40.0                                                                                 ¥22.8
    ¥20.0                                                                                         ¥8.5
     ¥0.0
                Detection        Investigation &       Recovery        Containment      Ex-post response
                                  incident mgmt

            Deploying security intelligence systems      Not deploying security intelligence systems




Ponemon Institute© Research Report                                                                       Page 17
Figure 18 shows seven enabling security technology categories experienced by a subset of
benchmarked companies. Each bar represents the percentage of companies fully deploying the
stated technology. The top technology categories include: access governance tools (72 percent),
advanced perimeter controls and firewall technologies (66 percent) and extensive deployment of
encryption technologies (62 percent).

Figure 18. Seven enabling security technologies deployed

                           Access governance tools                                                          72%

           Advanced perimeter controls and firewall
                                                                                                      66%
                                     technologies

   Extensive deployment of encryption technologies                                                  62%

         Extensive use of data loss prevention tools                                          55%

                           Security intelligence tools                                       52%

               Enterprise deployment of GRC tools                              28%

               Automated policy management tools                         21%

                                                         0%   10% 20% 30% 40% 50% 60% 70% 80%

Figure 19. Cost savings when deploying seven enabling security technologies
¥1,000,000 omitted

Figure 19 shows the incremental cost saving experienced by companies deploying seven enabling
security technologies. For example, companies deploying access governance tools, on average,
experience a cost savings of ¥66.5 million and companies deploying advanced perimeter controls
and firewall technologies have on average a cost savings of ¥59.7 million. Please note that these
cost savings are not additive.

                     Access governance tools                                                           ¥66.5

     Advanced perimeter controls and firewall
                                                                                                   ¥59.7
                               technologies
         Extensive deployment of encryption
                                                                                         ¥50.3
                               technologies

                     Security intelligence tools                                     ¥44.2

   Extensive use of data loss prevention tools                             ¥30.7

         Automated policy management tools                       ¥17.4

         Enterprise deployment of GRC tools                   ¥12.2

                                               ¥0.0      ¥10.0 ¥20.0 ¥30.0 ¥40.0 ¥50.0 ¥60.0 ¥70.0




Ponemon Institute© Research Report                                                                         Page 18
Figure 20 shows seven enterprise governance activities experienced by a subset of benchmarked
companies. Each bar represents the percentage of companies fully executing each stated
governance activity. The top three governance activities include: obtaining sufficient budgeted
resources (79 percent), employment of certified/expert security personnel (62 percent) and
certification against industry-leading standards (55 percent).

Figure 20. Seven enterprise security governance activities deployed

                     Adequacy of budgeted resources                                                   79%

   Employment of certified/expert security personnel                                          62%

      Certification against industry-leading standards                                      55%

        Substantial training and awareness activities                                 45%

   Appointment of a high-level security leader (CISO)                              38%

                     Extensive use of security metrics                         34%

          Formation of a senior-level security council                      28%

                                                         0% 10% 20% 30% 40% 50% 60% 70% 80% 90%

Figure 21 shows the incremental cost savings experienced by companies deploying each one of
seven enterprise governance activities. On average, companies employing certified/expert security
personnel high-level security leader experience cost savings of ¥62.6 million. Also companies with
certification against industry-leading standards save on average ¥57.0 million. Similar to above,
these estimated cost savings are not additive.

Figure 21. Cost savings when deploying seven enterprise governance activities
¥1,000,000 omitted


   Employment of certified/expert security personnel                                                   ¥62.6


      Certification against industry-leading standards                                              ¥57.0


        Substantial training and awareness activities                              ¥29.8


   Appointment of a high-level security leader (CISO)                         ¥25.5


          Formation of a senior-level security council                     ¥19.6


                     Extensive use of security metrics                 ¥18.1


                     Adequacy of budgeted resources                ¥11.0


                                                        ¥0.0   ¥10.0 ¥20.0 ¥30.0 ¥40.0 ¥50.0 ¥60.0 ¥70.0




Ponemon Institute© Research Report                                                                     Page 19
Part 4. Global Findings

Table 4 provides a summary of the total annualized cost of cyber crime for five countries (totaling
199 separate companies). As revealed, there is a significant variation among country samples in
terms of total cost. The UK sample reports the lowest and the US sample reports the highest total
cost of cyber crime (about a 2.75 X difference).


 Table 4: Country analysis           Sample size          Local currency                 US$
 United States (US)                      56                      $8,933,510               $8,933,510
 United Kingdom (UK)                     38                      £2,083,165               $3,252,912
 Australia (AU)                          33                      $3,216,891               $3,386,201
 Germany (DE)                            43                     4,840,320 !               $5,950,725
 Japan (JP)                              29                  ¥402,820,000                 $5,154,447

Figure 22 examines in percentages five external costs or “consequences” of cyber crime for five
countries. It clearly shows variation among countries, especially in two categories – that is, business
disruption and information loss.

Information loss appears to be a more significant external cost for the US (at 44 percent) and
German (40 percent) companies than for the UK (23 percent) and Australia (25 percent). In contrast,
business disruption appears to be a more significant external cost for Australian (41 percent) and UK
(38 percent) companies than for German (25 percent) and US (30 percent) companies. Finally,
Japanese companies rate both business disruption and information loss equally at 36 percent.

Figure 22. Five external costs of cyber crime by country

                                                                                   38%
                                                       23%
   UK                                                                30%
                       6%
               3%
                                                                                         41%
                                                           25%
   AU                                                               29%
              3%
             2%
                                                                                 36%
                                                                                 36%
   JP                                         18%
                       6%
                  4%
                                                           25%
                                                                                       40%
   DE                                                            28%
                    5%
             2%
                                                                     30%
                                                                                               44%
   US                                           19%
                    5%
             2%

        0%      5%          10%      15%      20%      25%       30%       35%     40%       45%       50%

         Business disruption      Information loss   Revenue loss    Equipment damages       Other costs




Ponemon Institute© Research Report                                                                         Page 20
Figure 23 examines five internal or activity cost categories in percentage terms for five countries. It
also shows variation among countries, especially in the detection and recovery cost categories.
Recovery cost appears to be most significant for UK (35 percent) and Australian (33 percent)
companies. Detection cost, appears to be most significant for German companies (33 percent).
Finally, Japanese companies rate investigation (20 percent) and incident management (18 percent)
at a higher percentage than other countries.

Figure 23. Five internal costs of cyber crime by country

                                                                                                    35%
                                                               20%
                              9%
   UK
                                      12%
                            8%
                                                   16%

                                                                                              33%
                                                                      23%
                                        13%
   AU
                                                         18%
                     5%
                            8%

                                                                     22%
                                                                       23%
                                                               20%
   JP
                                        13%
                                                         18%
                    4%

                                                                     22%
                                                                                              33%
                                                          19%
   DE
                                      12%
                              9%
                     5%

                                                                21%
                                                                               26%
                                        13%
   US
                                              15%
                              9%
                                                   16%

        0%       5%          10%         15%             20%           25%           30%       35%        40%

         Recovery     Detection    Investigation     Containment           Incident mgmt   Ex-post response




Ponemon Institute© Research Report                                                                            Page 21
Figure 24 presents the consolidated number of cyber incidents examined within all five countries
(including 199 separate companies). Our results show virus and malware are the most frequent
attack vectors for participating organizations. While at a much lower incident frequency level, our
research shows malicious insiders, malicious code, denial of services and web-based incidents are
the most costly types of attacks experienced by companies in all countries.

Figure 24. Consolidated number of cyber incidents examined in five country samples
n = 199 separate companies

          Viruses, worms, trojans                                                                                                 15,669
                                 Malware                                                                                13,327
                                 Botnets                                            6,334
  Phishing & social engineering                   398
                     Stolen devices              252
              Web-based attacks                  158
                   Denial of service             100
                    Malicious code               88
               Malicious insiders                67

                                           -          2,000 4,000 6,000 8,000 10,000 12,000 14,000 16,000 18,000


Figure 25 reports the attack frequency adjusted by sample size for the four most expensive types of
cyber incidents. As can be seen, companies in the US sample were more likely to experience
malicious insiders, malicious code and web-based incidents than other countries. UK and Australian
companies appear to be more likely to experience denial of services. Japanese companies appear
to be least likely to experience malicious insiders and web-based attacks. German companies are
least likely to experience malicious code and denial services.

Figure 25. Adjusted frequency of four types of cyber attacks by country
Each bar shows the total frequency of the attack type divided by sample size
*The US sample shows that web-based attacks were observed more than once for some companies
   1.20                          1.13

   1.00

                                                             0.74                                                0.76
   0.80
                   0.64
                                                                                                          0.61                         0.58 0.61
   0.60     0.52          0.50                                                    0.48 0.52
                                                                           0.45
                                                      0.37                                                                      0.39
   0.40                                 0.33                                                  0.33 0.36
                                               0.28
                                                                                                                         0.21
                                                                    0.17
   0.20

     -
                    US*                          DE                          JP                      AU                           UK

             Malicious insiders                 Malicious code               Denial of service             Web-based attacks




Ponemon Institute© Research Report                                                                                                            Page 22
Part 5. Framework

Benchmark results of 29 organizations are intended to provide a meaningful baseline for companies
experiencing a wide array of cyber attacks including viruses, malware, trojans, worms, malicious
code, botnets, malicious insiders, denial of services and others.

The cost framework in Figure 26 presents the two separate cost streams used to measure the total
cyber crime cost for each participating organization. These two cost streams pertain to internal
security-related activities and the external consequences experienced by organizations after
experiencing an attack. Our benchmark methods attempt to elicit the actual experiences and
consequences of cyber attacks. Our cost of cyber crime study is unique in addressing the core
systems and business process-related activities that drive a range of expenditures associated with a
company’s response to cyber crime.

                                               Figure 26
                                     Cost Framework for Cyber Crime

    Internal cost activity                                                          External consequences
           centers                                                                        and costs

          Detection                                                                  Information loss or theft




Investigation & escalation

                                             Direct, indirect and                       Business disruption
                                              opportunity costs
                                               associated with
        Containment                             cyber crimes


                                                                                        Equipment damage
          Recovery




      Ex-post response                                                                     Revenue loss




This study addresses the core process-related activities that drive a range of expenditures
associated with a company’s cyber attack. The five internal cost activity centers in our framework
         7
include:

!     Detection: Activities that enable an organization to reasonably detect and possibly deter cyber
      attacks or advanced threats. This includes allocated (overhead) costs of certain enabling
      technologies that enhance mitigation or early detection.



7
  Internal costs are extrapolated using labor (time) as a surrogate for direct and indirect costs. This is also used
to allocate an overhead component for fixed costs such as multiyear investments in technologies.



Ponemon Institute© Research Report                                                                          Page 23
!   Investigation and escalation: Activities necessary to thoroughly uncover the source, scope, and
    magnitude of one or more incidents. The escalation activity also includes the steps taken to
    organize an initial management response.
!   Containment: Activities that focus on stopping or lessening the severity of cyber attacks or
    advanced threats. These include shutting down high-risk attack vectors such as insecure
    applications or endpoints.
!   Recovery: Activities associated with repairing and remediating the organization’s systems and
    core business processes. These include the restoration of damaged information assets and
    other IT (data center) assets.
!   Ex-post response: Activities to help the organization minimize potential future attacks. These
    include adding new enabling technologies and control systems.
In addition to the above process-related activities, organizations often experience external
consequences or costs associated with the aftermath of successful attacks – which are defined as
attacks that infiltrate the organization’s network or enterprise systems. Accordingly, our Institute’s
research shows that four general cost activities associated with these external consequences are as
follows:

!   Cost of information loss or theft: Loss or theft of sensitive and confidential information as a result
    of a cyber attack. Such information includes trade secrets, intellectual properties (including
    source code), customer information and employee records. This cost category also includes the
    cost of data breach notification in the event that personal information is wrongfully acquired.

!   Cost of business disruption: The economic impact of downtime or unplanned outages that
    prevent the organization from meeting its data processing requirements.

!   Cost of equipment damage: The cost to remediate equipment and other IT assets as a result of
    cyber attacks to information resources and critical infrastructure.

!   Lost revenue: The loss of customers (churn) and other stakeholders because of system delays
    or shutdowns as a result of a cyber attack. To extrapolate this cost, we use a shadow costing
    method that relies on the “lifetime value” of an average customer as defined for each
    participating organization.

While not specifically mentioned in Figure 26, the nature of attacks that underlie cost in our
framework include the following attack types: viruses, worms, trojans; malware; botnets; web-based
attacks; phishing and social engineering; malicious insiders (including stolen devices); malicious
                                                       8
code (including SQL injection); and denial of services.




8
 We acknowledge that these seven attack categories are not mutually independent and they do not represent
an exhaustive list. Classification of a given attack was made by the researcher and derived from the facts
collected during the benchmarking process.



Ponemon Institute© Research Report                                                                 Page 24
Part 6. Benchmark Methods

The cost of cyber crime benchmark instrument is designed to collect descriptive information from IT,
information security and other key individuals about the actual costs incurred either directly or
indirectly as a result of cyber attacks actually detected. Our cost method does not require subjects to
provide actual accounting results, but instead relies on estimation and extrapolation from interview
data over a four-week period.

Cost estimation is based on confidential diagnostic interviews with key respondents within each
benchmarked organization. Table 5 reports the frequency of individuals by their approximate
functional discipline that participated in this year’s study. As can be seen, this year’s study involved
252 individuals or an average of 8.69 interviews for each benchmarked company.

 Table 5: Functional areas of interview respondents                                    Frequency
 Compliance                                                                                          42
 IT operations                                                                                       40
 IT security                                                                                         36
 Data center management                                                                              34
 Network operations                                                                                  21
 Accounting & finance                                                                                17
 Internal or IT audit                                                                                11
 Legal                                                                                               11
 Physical security/facilities mgmt                                                                    8
 Quality assurance                                                                                    8
 Industrial control systems                                                                           8
 Application development                                                                              5
 Procurement/vendor mgmt                                                                              4
 Human resources                                                                                      3
 Other                                                                                                4
 Total                                                                                              252
 Interviews per company                                                                            8.69

Data collection methods did not include actual accounting information, but instead relied upon
numerical estimation based on the knowledge and experience of each participant. Within each
category, cost estimation was a two-stage process. First, the benchmark instrument required
individuals to rate direct cost estimates for each cost category by marking a range variable defined in
the following number line format.


How to use the number line: The number line provided under each data breach cost category is one way to
obtain your best estimate for the sum of cash outlays, labor and overhead incurred. Please mark only one
point somewhere between the lower and upper limits set above. You can reset the lower and upper limits
of the number line at any time during the interview process.

                  Post your estimate of direct costs here for [presented cost category]


  LL     ______________________________________|___________________________________                 UL




Ponemon Institute© Research Report                                                                  Page 25
The numerical value obtained from the number line rather than a point estimate for each presented
cost category preserved confidentiality and ensured a higher response rate. The benchmark
instrument also required practitioners to provide a second estimate for indirect and opportunity costs,
separately.

Cost estimates were then compiled for each organization based on the relative magnitude of these
costs in comparison to a direct cost within a given category. Finally, we administered general
interview questions to obtain additional facts, including estimated revenue losses as a result of the
cyber crime.

The size and scope of survey items was limited to known cost categories that cut across different
industry sectors. In our experience, a survey focusing on process yields a higher response rate and
better quality of results. We also used a paper instrument, rather than an electronic survey, to
provide greater assurances of confidentiality.

Figure 26 (shown in Part 5) illustrates the activity-based costing schema we used in our benchmark
study. As can be seen, we examined internal cost centers sequentially – starting with incident
discovery to escalation to containment to recovery to ex-post response and culminating in
diminished business opportunities or revenues. The cost driver of ex-post response and lost
business opportunities is business disruption resulting from the attack.

In total, the benchmark instrument contained descriptive costs for each one of the five cost activity
centers. Within each cost activity center, the survey required respondents to estimate the cost range
to signify direct cost, indirect cost and opportunity cost, defined as follows:
!   Direct cost – the direct expense outlay to accomplish a given activity.
!   Indirect cost – the amount of time, effort and other organizational resources spent, but not as a
    direct cash outlay.
!   Opportunity cost – the cost resulting from lost business opportunities as a consequence of
    reputation diminishment after the incident.
To maintain complete confidentiality, the survey instrument did not capture company-specific
information of any kind. Subject materials contained no tracking codes or other methods that could
link responses to participating companies.

To keep the benchmark instrument to a manageable size, we carefully limited items to only those
cost activities we considered crucial to the measurement of cyber crime cost. Based on discussions
with learned experts, the final set of items focused on a finite set of direct or indirect cost activities.
After collecting benchmark information, each instrument was examined carefully for consistency and
completeness. In this study, a few companies were rejected because of incomplete, inconsistent or
blank responses.

Utilizing activity-based costing (ABC), cost estimates were captured using a standardized instrument
for direct and indirect cost categories. Specifically, labor (productivity) and overhead costs were
allocated to five internal activity centers (see Figure 13). External costs, including the loss of
information assets, business disruption, equipment damage and revenue loss, were captured using
shadow-costing methods. Total costs were allocated to eight discernible attack vectors.

Field research was conducted over a five-month period concluding in August 2012. To maintain
consistency across all benchmarked companies, we collected information over six consecutive
weeks. The four consecutive weeks for any given organization was not necessarily the same time
period as every other organization is this study. The extrapolated direct, indirect and opportunity
costs of cyber crime were annualized by dividing the total cost collected over four weeks (ratio =
4/52 weeks).




Ponemon Institute© Research Report                                                                 Page 26
Part 7. Benchmark Sample

The present study was launched in January 2012. The recruitment started with a personalized letter
                                                                                                  9
and a follow-up phone call to 499 Japanese organizations for possible participation in our study.
While 35 organizations initially agreed to participate, 29 organizations permitted our researchers to
complete the benchmark analysis.

Pie Chart 1 summarizes the current (FY 2012) sample of participating companies based on 12
primary industry classifications. As can be seen, both technology and industrial (both at 17 percent)
followed by financial services (14 percent) represent the largest segments.

Pie Chart 1. Industry sectors of participating organizations

                                                                                       Technology
                                   3%   3%
                              3%                     17%                               Industrial
                         4%
                                                                                       Financial services
                       4%
                                                                                       Services
                    4%
                                                                                       Consumer products
                                                                                       Public sector
                  7%
                                                                 17%                   Retail
                                                                                       Utilities & energy
                   10%                                                                 Transportation
                                                                                       Education & research

                                                     14%                               Automotive
                               14%
                                                                                       Media
Pie Chart 2 reports the percentage frequency of companies based on the number of enterprise seats
connected to networks or systems. Our analysis of cyber crime cost only pertains to organizations
with 1,003 to 80,290 seats.

Pie Chart 2. Distribution of participating organizations by enterprise seats (size)


                               14%                      17%


                                                                                            < 2,000
                                                                                            2,000 to 5,000
                   17%
                                                                   14%                      5,001 to 10,000
                                                                                            10,001 to 15,000
                                                                                            15,001 to 25,000
                                                                                            > 25,000


                                                           17%
                              21%



9
 Approximately, half of the organizations contacted for possible participation in this year’s study are members of
Ponemon Institute’s benchmarking community. This community of companies is composed of organizations that
have participated in one or more benchmarking studies over the past nine years.



Ponemon Institute© Research Report                                                                          Page 27
Part 8. Limitations & Conclusions

This study utilizes a confidential and proprietary benchmark method that has been successfully
deployed in earlier Ponemon Institute research. However, there are inherent limitations to
benchmark research that need to be carefully considered before drawing conclusions from findings.

!   Non-statistical results: The purpose of this study is descriptive rather than normative inference.
    The current study draws upon a representative, non-statistical sample of organizations, all
    Japanese-based entities experiencing one or more cyber attacks during a four-week fielding
    period. Statistical inferences, margins of error and confidence intervals cannot be applied to
    these data given the nature of our sampling plan.

!   Non-response: The current findings are based on a small representative sample of completed
    case studies. An initial mailing of benchmark surveys was sent to a targeted group of 499
    separate organizations, all believed to have experienced one or more cyber attacks. Twenty-
    nine companies provided usable benchmark surveys. Non-response bias was not tested so it is
    always possible companies that did not participate are substantially different in terms of the
    methods used to manage the cyber crime containment and recovery process, as well as the
    underlying costs involved.

!   Sampling-frame bias: Because our sampling frame is judgmental, the quality of results is
    influenced by the degree to which the frame is representative of the population of companies
    being studied. It is our belief that the current sampling frame is biased toward companies with
    more mature information security programs.

!   Company-specific information: The benchmark information is sensitive and confidential. Thus,
    the current instrument does not capture company-identifying information. It also allows
    individuals to use categorical response variables to disclose demographic information about the
    company and industry category. Industry classification relies on self-reported results.

!   Unmeasured factors: To keep the survey concise and focused, we decided to omit other
    important variables from our analyses such as leading trends and organizational characteristics.
    The extent to which omitted variables might explain benchmark results cannot be estimated at
    this time.

!   Estimated cost results. The quality of survey research is based on the integrity of confidential
    responses received from companies. While certain checks and balances can be incorporated
    into the survey process, there is always the possibility that respondents did not provide truthful
    responses. In addition, the use of a cost estimation technique (termed shadow costing methods)
    rather than actual cost data could create significant bias in presented results.

Report Conclusions

The findings of our first Japanese study on the cost of cyber crime provide evidence that companies
expend considerable time and resources responding to a plethora of different types of attacks. As in
prior years, the most significant costs result from the theft or misuse of information assets. Our
findings also suggest that the cost of cyber crime is on the rise.

On a positive note, we found that the cost of any given attack can be substantially reduced by
deploying certain security technologies and by advancing good governance practices throughout the
company. Finally, despite its stated limitations, this research is encouraging to those who believe in
the proposition that good security practices have a positive return on investment.




Ponemon Institute© Research Report                                                              Page 28
If you have questions or comments about this research report or you would like to obtain additional
copies of the document (including permission to quote or reuse this report), please contact by letter,
phone call or email:

                                       Ponemon Institute LLC
                                     Attn: Research Department
                                          2308 US 31 North
                                 Traverse City, Michigan 49629 USA
                                           1.800.887.3118
                                      research@ponemon.org




                                     Ponemon Institute
                        Advancing Responsible Information Management

Ponemon Institute is dedicated to independent research and education that advances responsible
information and privacy management practices within business and government. Our mission is to
conduct high quality, empirical studies on critical issues affecting the management and security of
sensitive information about people and organizations.

As a member of the Council of American Survey Research Organizations (CASRO), we uphold
strict data confidentiality, privacy and ethical research standards. We do not collect any personally
identifiable information from individuals (or company identifiable information in our business
research). Furthermore, we have strict quality standards to ensure that subjects are not asked
extraneous, irrelevant or improper questions.




Ponemon Institute© Research Report                                                             Page 29

More Related Content

What's hot

The economic impact of cybercrime and cyber espionage
The economic impact of cybercrime and cyber espionageThe economic impact of cybercrime and cyber espionage
The economic impact of cybercrime and cyber espionageBee_Ware
 
Corruption context in Myanmar and approaches elsewhere in ASEAN
Corruption context in Myanmar and approaches elsewhere in ASEANCorruption context in Myanmar and approaches elsewhere in ASEAN
Corruption context in Myanmar and approaches elsewhere in ASEANEthical Sector
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceStatewide Insurance Brokers
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...
How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...
How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...Dana Gardner
 
Всемирный обзор экономических преступлений за 2016 год
Всемирный обзор экономических преступлений за 2016 годВсемирный обзор экономических преступлений за 2016 год
Всемирный обзор экономических преступлений за 2016 годPwC Russia
 
Corporate corrupt & fraud
Corporate corrupt & fraudCorporate corrupt & fraud
Corporate corrupt & fraudHossein Davani
 
Adding internal audit value: Strategically leveraging compliance activities
Adding internal audit value: Strategically leveraging compliance activitiesAdding internal audit value: Strategically leveraging compliance activities
Adding internal audit value: Strategically leveraging compliance activitiesGrant Thornton LLP
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...EY
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudPaige Rasid
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
A Case Study on the Effects of Cyber Attacks on Firms' Stock Price
A Case Study on the Effects of Cyber Attacks on Firms' Stock PriceA Case Study on the Effects of Cyber Attacks on Firms' Stock Price
A Case Study on the Effects of Cyber Attacks on Firms' Stock PriceShravan Chandrasekaran
 
World Energy Focus - Ottobre 2016
World Energy Focus - Ottobre 2016World Energy Focus - Ottobre 2016
World Energy Focus - Ottobre 2016WEC Italia
 
Best practice for anti corruption
Best practice for anti corruptionBest practice for anti corruption
Best practice for anti corruptionEthical Sector
 

What's hot (18)

2019 Hiscox Cyber Readiness Report
2019 Hiscox Cyber Readiness Report2019 Hiscox Cyber Readiness Report
2019 Hiscox Cyber Readiness Report
 
The economic impact of cybercrime and cyber espionage
The economic impact of cybercrime and cyber espionageThe economic impact of cybercrime and cyber espionage
The economic impact of cybercrime and cyber espionage
 
Todd Mctavish
Todd MctavishTodd Mctavish
Todd Mctavish
 
Corruption context in Myanmar and approaches elsewhere in ASEAN
Corruption context in Myanmar and approaches elsewhere in ASEANCorruption context in Myanmar and approaches elsewhere in ASEAN
Corruption context in Myanmar and approaches elsewhere in ASEAN
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...
How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...
How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...
 
Всемирный обзор экономических преступлений за 2016 год
Всемирный обзор экономических преступлений за 2016 годВсемирный обзор экономических преступлений за 2016 год
Всемирный обзор экономических преступлений за 2016 год
 
Corporate corrupt & fraud
Corporate corrupt & fraudCorporate corrupt & fraud
Corporate corrupt & fraud
 
Adding internal audit value: Strategically leveraging compliance activities
Adding internal audit value: Strategically leveraging compliance activitiesAdding internal audit value: Strategically leveraging compliance activities
Adding internal audit value: Strategically leveraging compliance activities
 
CYBERCRIME IN BUSINESS
CYBERCRIME IN BUSINESSCYBERCRIME IN BUSINESS
CYBERCRIME IN BUSINESS
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
A Case Study on the Effects of Cyber Attacks on Firms' Stock Price
A Case Study on the Effects of Cyber Attacks on Firms' Stock PriceA Case Study on the Effects of Cyber Attacks on Firms' Stock Price
A Case Study on the Effects of Cyber Attacks on Firms' Stock Price
 
World Energy Focus - Ottobre 2016
World Energy Focus - Ottobre 2016World Energy Focus - Ottobre 2016
World Energy Focus - Ottobre 2016
 
Best practice for anti corruption
Best practice for anti corruptionBest practice for anti corruption
Best practice for anti corruption
 

Similar to 2012 Cost of Cyber Crime Study: Japan

2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysisBee_Ware
 
2016 cost of data breach study brasil
2016 cost of data breach study   brasil2016 cost of data breach study   brasil
2016 cost of data breach study brasilJoão Rufino de Sales
 
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382CMR WORLD TECH
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - FranceBee_Ware
 
2016 Cost of Data Breach Study Global Analysis .docx
2016 Cost of Data Breach Study  Global Analysis .docx2016 Cost of Data Breach Study  Global Analysis .docx
2016 Cost of Data Breach Study Global Analysis .docxfelicidaddinwoodie
 
2015 Cost of Data Breach Study: Impact of Business Continuity Management
2015 Cost of Data Breach Study: Impact of Business Continuity Management2015 Cost of Data Breach Study: Impact of Business Continuity Management
2015 Cost of Data Breach Study: Impact of Business Continuity ManagementCMR WORLD TECH
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...
Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...
Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...David J Rosenthal
 
The Cost of Data Breach - France
The Cost of Data Breach - FranceThe Cost of Data Breach - France
The Cost of Data Breach - FranceAndreanne Clarke
 
2017 cost of cyber crime study accenture
2017 cost of cyber crime study   accenture2017 cost of cyber crime study   accenture
2017 cost of cyber crime study accenturejob Titri company
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Reportaccenture
 
Gbl report risk-value_2018_us_uea_v1
Gbl report risk-value_2018_us_uea_v1Gbl report risk-value_2018_us_uea_v1
Gbl report risk-value_2018_us_uea_v1Paperjam_redaction
 
LogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector WhitepaperLogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector WhitepaperTom Salmon
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Mark Baker
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Mark Baker
 
45The Security Survey An OverviewA security survey is a.docx
45The Security Survey An OverviewA security survey is a.docx45The Security Survey An OverviewA security survey is a.docx
45The Security Survey An OverviewA security survey is a.docxalinainglis
 
True Cost of Compliance
True Cost of ComplianceTrue Cost of Compliance
True Cost of ComplianceTripwire
 

Similar to 2012 Cost of Cyber Crime Study: Japan (20)

2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis
 
2015 cost of data breach study
2015 cost of data breach study2015 cost of data breach study
2015 cost of data breach study
 
2016 cost of data breach study brasil
2016 cost of data breach study   brasil2016 cost of data breach study   brasil
2016 cost of data breach study brasil
 
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - France
 
2016 Cost of Data Breach Study Global Analysis .docx
2016 Cost of Data Breach Study  Global Analysis .docx2016 Cost of Data Breach Study  Global Analysis .docx
2016 Cost of Data Breach Study Global Analysis .docx
 
2015 Cost of Data Breach Study: Impact of Business Continuity Management
2015 Cost of Data Breach Study: Impact of Business Continuity Management2015 Cost of Data Breach Study: Impact of Business Continuity Management
2015 Cost of Data Breach Study: Impact of Business Continuity Management
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...
Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...
Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...
 
2017 global-cyber-risk-transfer-report-final
2017 global-cyber-risk-transfer-report-final2017 global-cyber-risk-transfer-report-final
2017 global-cyber-risk-transfer-report-final
 
The Cost of Data Breach - France
The Cost of Data Breach - FranceThe Cost of Data Breach - France
The Cost of Data Breach - France
 
2017 cost of cyber crime study accenture
2017 cost of cyber crime study   accenture2017 cost of cyber crime study   accenture
2017 cost of cyber crime study accenture
 
Cost of Cybercrime 2017
Cost of Cybercrime 2017Cost of Cybercrime 2017
Cost of Cybercrime 2017
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
 
Gbl report risk-value_2018_us_uea_v1
Gbl report risk-value_2018_us_uea_v1Gbl report risk-value_2018_us_uea_v1
Gbl report risk-value_2018_us_uea_v1
 
LogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector WhitepaperLogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector Whitepaper
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)
 
45The Security Survey An OverviewA security survey is a.docx
45The Security Survey An OverviewA security survey is a.docx45The Security Survey An OverviewA security survey is a.docx
45The Security Survey An OverviewA security survey is a.docx
 
True Cost of Compliance
True Cost of ComplianceTrue Cost of Compliance
True Cost of Compliance
 

More from Jitendra Adhikari

Brighten your day with these inspiring words
Brighten your day with these inspiring wordsBrighten your day with these inspiring words
Brighten your day with these inspiring wordsJitendra Adhikari
 
19 Mind-Blowing Titanic Facts
19 Mind-Blowing Titanic Facts19 Mind-Blowing Titanic Facts
19 Mind-Blowing Titanic FactsJitendra Adhikari
 
10 Famous Companies With Bizarre Origins
10 Famous Companies With Bizarre Origins10 Famous Companies With Bizarre Origins
10 Famous Companies With Bizarre OriginsJitendra Adhikari
 
32 of the most beautiful english words
32 of the most beautiful english words32 of the most beautiful english words
32 of the most beautiful english wordsJitendra Adhikari
 
Four things one cannot recover
Four things one cannot recoverFour things one cannot recover
Four things one cannot recoverJitendra Adhikari
 
How to use your Microwave in ways you didn't think of
How to use your Microwave in ways you didn't think ofHow to use your Microwave in ways you didn't think of
How to use your Microwave in ways you didn't think ofJitendra Adhikari
 
12 ways to save your extra food!
12 ways to save your extra food!12 ways to save your extra food!
12 ways to save your extra food!Jitendra Adhikari
 
Best things to eat after a workout
Best things to eat after a workoutBest things to eat after a workout
Best things to eat after a workoutJitendra Adhikari
 
100% Natural ways of keeping those Ants away
100% Natural ways of keeping those Ants away100% Natural ways of keeping those Ants away
100% Natural ways of keeping those Ants awayJitendra Adhikari
 
20 places on earth that don't look real
20 places on earth that don't look real20 places on earth that don't look real
20 places on earth that don't look realJitendra Adhikari
 
Cool facts about the Human Body
Cool facts about the Human BodyCool facts about the Human Body
Cool facts about the Human BodyJitendra Adhikari
 
Honey and cinnamon a mixture for cures
Honey and cinnamon   a mixture for curesHoney and cinnamon   a mixture for cures
Honey and cinnamon a mixture for curesJitendra Adhikari
 
Indias contribution to the world
Indias contribution to the worldIndias contribution to the world
Indias contribution to the worldJitendra Adhikari
 

More from Jitendra Adhikari (20)

Arduino vs Raspberry Pi
Arduino vs Raspberry PiArduino vs Raspberry Pi
Arduino vs Raspberry Pi
 
Brighten your day with these inspiring words
Brighten your day with these inspiring wordsBrighten your day with these inspiring words
Brighten your day with these inspiring words
 
Catching a Wave
Catching a WaveCatching a Wave
Catching a Wave
 
19 Mind-Blowing Titanic Facts
19 Mind-Blowing Titanic Facts19 Mind-Blowing Titanic Facts
19 Mind-Blowing Titanic Facts
 
10 Famous Companies With Bizarre Origins
10 Famous Companies With Bizarre Origins10 Famous Companies With Bizarre Origins
10 Famous Companies With Bizarre Origins
 
32 of the most beautiful english words
32 of the most beautiful english words32 of the most beautiful english words
32 of the most beautiful english words
 
Four things one cannot recover
Four things one cannot recoverFour things one cannot recover
Four things one cannot recover
 
How to use your Microwave in ways you didn't think of
How to use your Microwave in ways you didn't think ofHow to use your Microwave in ways you didn't think of
How to use your Microwave in ways you didn't think of
 
12 ways to save your extra food!
12 ways to save your extra food!12 ways to save your extra food!
12 ways to save your extra food!
 
The beauty of Math!
The beauty of Math!The beauty of Math!
The beauty of Math!
 
Best things to eat after a workout
Best things to eat after a workoutBest things to eat after a workout
Best things to eat after a workout
 
100% Natural ways of keeping those Ants away
100% Natural ways of keeping those Ants away100% Natural ways of keeping those Ants away
100% Natural ways of keeping those Ants away
 
The Liver - How it works
The Liver - How it worksThe Liver - How it works
The Liver - How it works
 
Treehouse hotels
Treehouse hotelsTreehouse hotels
Treehouse hotels
 
20 places on earth that don't look real
20 places on earth that don't look real20 places on earth that don't look real
20 places on earth that don't look real
 
Cool facts about the Human Body
Cool facts about the Human BodyCool facts about the Human Body
Cool facts about the Human Body
 
Amazing Haircut Camels
Amazing Haircut CamelsAmazing Haircut Camels
Amazing Haircut Camels
 
Honey and cinnamon a mixture for cures
Honey and cinnamon   a mixture for curesHoney and cinnamon   a mixture for cures
Honey and cinnamon a mixture for cures
 
Did You Know
Did You KnowDid You Know
Did You Know
 
Indias contribution to the world
Indias contribution to the worldIndias contribution to the world
Indias contribution to the world
 

Recently uploaded

Topmost Black magic specialist in Saudi Arabia Or Bangali Amil baba in UK Or...
Topmost Black magic specialist in Saudi Arabia  Or Bangali Amil baba in UK Or...Topmost Black magic specialist in Saudi Arabia  Or Bangali Amil baba in UK Or...
Topmost Black magic specialist in Saudi Arabia Or Bangali Amil baba in UK Or...baharayali
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiAmil Baba Naveed Bangali
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiAmil Baba Mangal Maseeh
 
Do You Think it is a Small Matter- David’s Men.pptx
Do You Think it is a Small Matter- David’s Men.pptxDo You Think it is a Small Matter- David’s Men.pptx
Do You Think it is a Small Matter- David’s Men.pptxRick Peterson
 
Seerah un nabi Muhammad Quiz Part-1.pdf
Seerah un nabi  Muhammad Quiz Part-1.pdfSeerah un nabi  Muhammad Quiz Part-1.pdf
Seerah un nabi Muhammad Quiz Part-1.pdfAnsariB1
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiAmil Baba Naveed Bangali
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiAmil Baba Mangal Maseeh
 
Dubai Call Girls Skinny Mandy O525547819 Call Girls Dubai
Dubai Call Girls Skinny Mandy O525547819 Call Girls DubaiDubai Call Girls Skinny Mandy O525547819 Call Girls Dubai
Dubai Call Girls Skinny Mandy O525547819 Call Girls Dubaikojalkojal131
 
Amil baba in uk amil baba in Australia amil baba in canada
Amil baba in uk amil baba in Australia amil baba in canadaAmil baba in uk amil baba in Australia amil baba in canada
Amil baba in uk amil baba in Australia amil baba in canadaamil baba kala jadu
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiAmil Baba Naveed Bangali
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiAmil Baba Mangal Maseeh
 
Unity is Strength 2024 Peace Haggadah_For Digital Viewing.pdf
Unity is Strength 2024 Peace Haggadah_For Digital Viewing.pdfUnity is Strength 2024 Peace Haggadah_For Digital Viewing.pdf
Unity is Strength 2024 Peace Haggadah_For Digital Viewing.pdfRebeccaSealfon
 
Unity is Strength 2024 Peace Haggadah + Song List.pdf
Unity is Strength 2024 Peace Haggadah + Song List.pdfUnity is Strength 2024 Peace Haggadah + Song List.pdf
Unity is Strength 2024 Peace Haggadah + Song List.pdfRebeccaSealfon
 
Understanding Jainism Beliefs and Information.pptx
Understanding Jainism Beliefs and Information.pptxUnderstanding Jainism Beliefs and Information.pptx
Understanding Jainism Beliefs and Information.pptxjainismworldseo
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiAmil Baba Mangal Maseeh
 
Call Girls in Greater Kailash Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Greater Kailash Delhi 💯Call Us 🔝8264348440🔝Call Girls in Greater Kailash Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Greater Kailash Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Deerfoot Church of Christ Bulletin 4 21 24
Deerfoot Church of Christ Bulletin 4 21 24Deerfoot Church of Christ Bulletin 4 21 24
Deerfoot Church of Christ Bulletin 4 21 24deerfootcoc
 
Tremble song lyrics Powerpoint church music
Tremble song lyrics Powerpoint church musicTremble song lyrics Powerpoint church music
Tremble song lyrics Powerpoint church musicmaynjc
 
No 1 astrologer amil baba in Canada Usa astrologer in Canada
No 1 astrologer amil baba in Canada Usa astrologer in CanadaNo 1 astrologer amil baba in Canada Usa astrologer in Canada
No 1 astrologer amil baba in Canada Usa astrologer in CanadaAmil Baba Mangal Maseeh
 

Recently uploaded (20)

Topmost Black magic specialist in Saudi Arabia Or Bangali Amil baba in UK Or...
Topmost Black magic specialist in Saudi Arabia  Or Bangali Amil baba in UK Or...Topmost Black magic specialist in Saudi Arabia  Or Bangali Amil baba in UK Or...
Topmost Black magic specialist in Saudi Arabia Or Bangali Amil baba in UK Or...
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
 
Do You Think it is a Small Matter- David’s Men.pptx
Do You Think it is a Small Matter- David’s Men.pptxDo You Think it is a Small Matter- David’s Men.pptx
Do You Think it is a Small Matter- David’s Men.pptx
 
Seerah un nabi Muhammad Quiz Part-1.pdf
Seerah un nabi  Muhammad Quiz Part-1.pdfSeerah un nabi  Muhammad Quiz Part-1.pdf
Seerah un nabi Muhammad Quiz Part-1.pdf
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
 
Dubai Call Girls Skinny Mandy O525547819 Call Girls Dubai
Dubai Call Girls Skinny Mandy O525547819 Call Girls DubaiDubai Call Girls Skinny Mandy O525547819 Call Girls Dubai
Dubai Call Girls Skinny Mandy O525547819 Call Girls Dubai
 
Amil baba in uk amil baba in Australia amil baba in canada
Amil baba in uk amil baba in Australia amil baba in canadaAmil baba in uk amil baba in Australia amil baba in canada
Amil baba in uk amil baba in Australia amil baba in canada
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
 
Unity is Strength 2024 Peace Haggadah_For Digital Viewing.pdf
Unity is Strength 2024 Peace Haggadah_For Digital Viewing.pdfUnity is Strength 2024 Peace Haggadah_For Digital Viewing.pdf
Unity is Strength 2024 Peace Haggadah_For Digital Viewing.pdf
 
Unity is Strength 2024 Peace Haggadah + Song List.pdf
Unity is Strength 2024 Peace Haggadah + Song List.pdfUnity is Strength 2024 Peace Haggadah + Song List.pdf
Unity is Strength 2024 Peace Haggadah + Song List.pdf
 
Understanding Jainism Beliefs and Information.pptx
Understanding Jainism Beliefs and Information.pptxUnderstanding Jainism Beliefs and Information.pptx
Understanding Jainism Beliefs and Information.pptx
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
 
Call Girls in Greater Kailash Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Greater Kailash Delhi 💯Call Us 🔝8264348440🔝Call Girls in Greater Kailash Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Greater Kailash Delhi 💯Call Us 🔝8264348440🔝
 
St. Louise de Marillac: Animator of the Confraternities of Charity
St. Louise de Marillac: Animator of the Confraternities of CharitySt. Louise de Marillac: Animator of the Confraternities of Charity
St. Louise de Marillac: Animator of the Confraternities of Charity
 
Deerfoot Church of Christ Bulletin 4 21 24
Deerfoot Church of Christ Bulletin 4 21 24Deerfoot Church of Christ Bulletin 4 21 24
Deerfoot Church of Christ Bulletin 4 21 24
 
Tremble song lyrics Powerpoint church music
Tremble song lyrics Powerpoint church musicTremble song lyrics Powerpoint church music
Tremble song lyrics Powerpoint church music
 
No 1 astrologer amil baba in Canada Usa astrologer in Canada
No 1 astrologer amil baba in Canada Usa astrologer in CanadaNo 1 astrologer amil baba in Canada Usa astrologer in Canada
No 1 astrologer amil baba in Canada Usa astrologer in Canada
 

2012 Cost of Cyber Crime Study: Japan

  • 1. 2012 Cost of Cyber Crime Study: Japan Sponsored by HP Enterprise Security Independently conducted by Ponemon Institute LLC Publication Date: October 2012 Ponemon Institute© Research Report
  • 2. 2012 Cost of Cyber Crime Study: Japan Benchmark Study of Japanese Organizations Ponemon Institute October 2012 Part 1. Executive Summary We are pleased to present the 2012 Cost of Cyber Crime Study: Japan. Sponsored by HP Enterprise Security, this is the first year the study was conducted in Japan to better understand the economic impact a cyber attack can have on an organization. The benchmark study is based on a representative sample of 29 organizations in various industry sectors. The first Cost of Cyber Crime Study was conducted in the US in 2010 and is now in its third year. This year the scope of the research was expanded to include organizations in Japan as well as in the United Kingdom, Germany and Australia. Findings from these countries are presented in separate reports. Cyber attacks generally refer to criminal activity conducted via the Internet. These attacks can include stealing an organization’s intellectual property, confiscating online bank accounts, creating and distributing viruses on other computers, posting confidential business information on the Internet and disrupting a country’s critical national infrastructure. Disruption to business processes and revenue losses create the highest costs for organizations following a cyber attack. Key takeaways from this report include: ! Cyber crimes are costly. We found that the average annualized cost of cyber crime for the 29 organizations in our study is 402 million Yen (¥) per year, with a range of ¥.53 million to ¥18.3 million. ! Cyber attacks have become common occurrences. The companies in our study experienced 31 successful attacks per week or more than 1.1 successful attacks per organization per week. ! The most costly cyber crimes are those caused by malicious insiders, web-based attacks and denial of services. Mitigation of such attacks requires enabling technologies such as SIEM, intrusion prevention systems, application security testing and enterprise governance, risk management and compliance (GRC) solutions. The purpose of this benchmark research is to quantify the economic impact of cyber attacks and observe cost trends over time. We believe a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack. Our goal is to be able to quantify with as much accuracy as possible the costs incurred by organizations when they have a cyber attack. In our experience, a traditional survey approach would not capture the necessary details required to extrapolate cyber crime costs. Therefore, we decided to pursue field-based research that involved interviewing senior-level personnel and collecting details about actual cyber crime incidents. Approximately nine months of effort was required to recruit companies, build an activity-based cost model, collect source information and analyze results. This research culminated with the completion of case studies involving 29 organizations. For consistency purposes, our benchmark sample consists of only larger-sized organizations (i.e., more 1 than 1,000 enterprise seats ). The focus of our project was the direct, indirect and opportunity costs that resulted from the loss or theft of information, disruption to business operations, revenue loss and destruction of property, plant and equipment. In addition to external consequences of the cyber crime, the analysis attempted to capture the total cost spent on detection, investigation, containment, recovery and after-the-fact or “ex-post” response. 1 Enterprise seats refer to the number of direct connections to the network and enterprise systems. Ponemon Institute© Research Report Page 1
  • 3. Global at a glance As discussed above, the study has been conducted in the US for three years and this is the first year we included the UK, Germany, Australia and Japan. Some of the most interesting similarities and differences are presented below. Figure 1 presents the estimated average cost of cyber crime for five country samples after conversion into US dollars. As shown, there is significant variation among companies in the benchmark samples. The US sample reports the highest total average cost at $8.9 million and the UK sample reports the lowest total average cost at $3.3 million. Figure 1. Total cost of cyber crime in five countries Costs expressed in US dollars, n = 199 separate companies $10,000,000 $8,933,510 $9,000,000 $8,000,000 $7,000,000 $5,950,725 $6,000,000 $5,154,447 $5,000,000 $4,000,000 $3,252,912 $3,386,201 $3,000,000 $2,000,000 $1,000,000 $- UK AU JP DE US Possible reasons for these differences may be the types and frequencies of attacks experienced as well as the importance that each company places on the theft of information assets versus other consequences of the incident. We found that US companies were much more likely to experience the most expensive types of cyber attacks, which are malicious insiders, malicious code and web-based incidents. Similarly, UK and Australian were most likely to experience denial of service attacks. In contrast, German companies were least likely to experience malicious code and denial of services. Japanese companies were least likely to experience malicious insiders and web-based attacks. Another key finding that may explain cost differences among countries concerns the theft of information assets. US and German companies report this as the most significant consequence of a cyber attack. On the other hand, UK and Australia attach more importance to business disruption. As noted in this report, the cost of business disruption is lower than the cost of information theft. With respect to internal activity costs, we also found interesting differences. Specifically, the cost of detecting a cyber attack appears to be the most expensive for German companies. The cost of recovery from a cyber incident appears to be more expensive for companies in the UK and Australia. It is interesting to note that Japanese companies cite higher costs to investigate and manage the incident than the other countries. Ponemon Institute© Research Report Page 2
  • 4. Summary of Japanese findings Following are the most salient findings of this year’s study. These findings focus on the factors that affect the cost of cyber crime for organizations. Cyber crimes are very costly for organizations. We found that the median annualized cost for 29 benchmarked organizations is ¥402 million per year, with a range from ¥.53 million to ¥18.3 million each year per company. Cyber crime cost varies by organizational size. Results reveal a positive relationship between organizational size (as measured by enterprise seats) and annualized cost. However, based on enterprise seats, we determined that smaller-sized organizations incur a significantly higher per capita cost than larger-sized organizations (¥56.4 versus ¥15.0 thousand). All industries fall victim to cybercrime, but to different degrees. The average annualized cost of cyber crime appears to vary by industry segment, where technology, communications and financial services experience higher costs than organizations in retail, education and media. Cyber crimes are intrusive and common occurrences. The companies participating in our study experienced 31 successful attacks per week – or more than 1.1 successful attacks per organization. The most costly cyber crimes are those caused by malicious insiders, denial of services and Web-based attacks. These account for more than 55 percent of all cyber crime costs per organization on an annual basis. Mitigation of such attacks requires enabling technologies such as SIEM, intrusion prevention systems, application security testing solutions and enterprise GRC solutions. Cyber attacks can get costly if not resolved quickly. Results show a positive relationship between the time to contain an attack and organizational cost. The average time to resolve a cyber attack was 17 days, with an average cost to participating organizations of ¥402.8 million over this 17-day period. Results show that malicious insider attacks can take more than 28 days on average to contain. Theft of information assets and disruption to business operations represent the highest external costs. On an annualized basis, information losses and business disruption each account 2 for 36 percent of total external costs. In addition, costs associated with revenue losses and equipment damages represent 24 percent of external costs. Detection and recovery are the most costly internal activities. On an annualized basis, detection and recovery combined account for 45 percent of the total internal activity cost with direct labor and productivity losses representing the majority of these costs. Deployment of security intelligence systems makes a difference. The cost of cyber crime is moderated by the use of security intelligence systems (including SIEM). Findings suggest companies using security intelligence technologies were more efficient in detecting and containing cyber attacks. As a result, these companies enjoyed an average cost savings of ¥4.014 million when compared to companies not deploying security intelligence technologies. Deployment of enterprise security governance practices moderates the cost of cyber crime. Findings show companies that have adequate resources, appoint a high-level security leader, and employ certified or expert staff experience cyber crime costs that are lower than companies that have not implemented these practices. This so-called “cost savings” for companies deploying good security governance practices is estimated at more than ¥3.194 million, on average. 2 In the context of this study, an external cost is one that is created by external factors such as fines, litigation, marketability of stolen intellectual properties and more. Ponemon Institute© Research Report Page 3
  • 5. A strong security posture moderates the cost of cyber attacks. We utilize a well-known metric called the Security Effectiveness Score (SES) to define an organization’s ability to achieve 3 reasonable security objectives. The higher the SES, the more effective the organization is in achieving its security objectives. The average cost to mitigate a cyber attack for organizations with a high SES is substantially lower than organizations with a low SES score. 3 The Security Effectiveness Score has been developed by PGP Corporation and Ponemon Institute in its annual encryption trends survey to define the security posture of responding organizations. The SES is derived from the rating of 24 security features or practices. This method has been validated from more than 30 independent studies conducted since June 2005. The SES provides a range of +2 (most favorable) to -2 (least favorable). Hence, a result greater than zero is viewed as net favorable. Ponemon Institute© Research Report Page 4
  • 6. Part 2. Report Findings Ponemon Institute’s 2012 Cost of Cyber Crime Study: Japan examines the total costs organizations incur when responding to cyber crime incidents and include the following: detection, recovery, investigation and incident management, ex-post response and cost containment. These costs do not include a plethora of ongoing expenditures and investments made to sustain an organization’s security posture or compliance with standards, policies and regulations. Cyber crimes are costly for participating organizations The economic impact of a cyber attack is wide ranging and is influenced by a variety of factors discussed in this report. The total annualized cost of cyber crime for the 2012 benchmark sample of 29 organizations ranges from a low of ¥53,2 million to a high of ¥1,503 million. Participating companies were asked to report their expenditures and in-house activities over four consecutive weeks. Once costs over the four-week period were compiled and validated, the reported figures 4 were then grossed-up to present an extrapolated annualized cost. Figure 2 shows the median annualized cost of cyber crime in the study benchmark sample is ¥260.4 million. The grand mean value is ¥402.8 million. Figure 2. The Cost of Cyber Crime Maximum value ¥1,503,174,381 Mean ¥402,820,000 Median ¥260,397,553 Minimum value ¥53,156,272 ¥0 ¥500,000,000 ¥1,000,000,000 ¥1,500,000,000 ¥2,000,000,000 4 Following is the gross-up statistic: Annualized revenue = [cost estimate]/[4/52 weeks]. Ponemon Institute© Research Report Page 5
  • 7. Figure 3 reports the distribution of annualized total cost for 29 companies. As can be seen, 17 of organizations in our sample incurred total costs below the mean value of ¥402.8 million, thus indicating a skewed distribution. The highest cost estimate of ¥1,503 million was determined not to be an outlier based on additional analysis. Two other organizations experienced an annualized total cost of cyber crime above ¥900 million. The lowest total cost was ¥53.2 million. Figure 3. Total cost of cyber crime for 29 participating companies ¥1,600,000,000 ¥1,503,174,381 ¥1,400,000,000 ¥1,200,000,000 ¥1,000,000,000 ¥800,000,000 ¥600,000,000 ¥400,000,000 ¥200,000,000 ¥53,156,272 ¥0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Annualized total cost Average cost As part of our analysis, we calculated a precision interval for the average cost of ¥402.8 million. The purpose of this interval is to demonstrate that our cost estimates should be thought of as a range of possible outcomes rather than a single point or number. The range of possible cost estimates widens at increasingly higher levels of confidence as shown in Figure 4. Figure 4. Precision interval for the mean value of annualized total cost ¥600,000,000 ¥488,389,654 ¥506,533,313 ¥454,877,440 ¥471,397,128 ¥500,000,000 ¥400,000,000 ¥300,000,000 ¥350,762,560 ¥334,242,872 ¥317,250,346 ¥299,106,687 ¥200,000,000 ¥100,000,000 ¥0 90% precision 95% precision 97.5% precision 99% precision interval interval interval interval Minimum Mean Maximum Ponemon Institute© Research Report Page 6
  • 8. The cost of cyber crime varies by organizational size As shown in Figure 5, organizational size, as measured by the number of enterprise seats or nodes, is positively correlated to annualized cyber crime cost. This positive correlation is indicated by the upward sloping regression line. Figure 5. Annualized cost in ascending order by the number of enterprise seats Regression performed on enterprise seats ranging from 1,003 to 80,290 ¥1,600,000,000 ¥1,503,174,381 ¥1,400,000,000 ¥1,200,000,000 ¥1,000,000,000 ¥800,000,000 ¥600,000,000 ¥400,000,000 ¥200,000,000 ¥0 Ascending order by the number of enterprise seats Annualized total cost Regression The following tables show that organizational size can influence the cost of cyber crime. Organizations are placed into one of four quartiles based on their total number of enterprise seats (which we use as a size surrogate). We do this to create a more precise understanding of the relationship between organizational size and the cost of cyber crime. Table 1 shows the quartile average cost of cyber crime for 2012. Table 1: Quartile analysis ¥1,000,000 omitted FY 2012 (n=29) Quartile 1 ¥893.1 Quartile 2 ¥360.7 Quartile 3 ¥186.6 Quartile 4 ¥100.9 Table 2 reports the average cost per enterprise seat (a.k.a. per capita cost) compiled for four quartiles ranging from the smallest (Quartile 1) to the largest (Quartile 4). The 2012 average per capita cost for organizations with the fewest seats is more than 3.5 times higher than the average per capita cost for organizations with the most seats. Table 2. Quartile analysis ¥1,000,000 omitted 2012 cost per seat Quartile 1 (smallest) ¥56.4 Quartile 2 ¥30.9 Quartile 3 ¥40.5 Quartile 4 (largest) ¥15.0 Ponemon Institute© Research Report Page 7
  • 9. A comparison of smaller and larger-sized organizations split by the sample median of 10,993 seats reveals that the cost mix for specific cyber attacks varies by organizational size. Smaller organizations (below the median) experience a higher proportion of cyber crime costs relating to botnets, malicious code, viruses, worms, trojans and web-based attacks. In contrast, larger organizations (above the median) experience a higher proportion of costs relating to denial of service, malicious insiders, stolen devices and phishing. Figure 6. The cost mix of attacks by organizational size Size measured according to the number of enterprise seats within the participating organizations Denial of services 22% 20% Web-based attacks 15% 22% Malicious insiders 21% 10% Viruses, Worms, Trojans 6% 13% Malicious code 6% 12% Stolen devices 12% 5% Phishing & social engineering 9% 5% Botnets 4% 8% Malware 5% 5% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Above median value for enterprise seats Below median value for enterprise seats Ponemon Institute© Research Report Page 8
  • 10. The cost of cyber crime impacts all industries The average annualized cost of cyber crime appears to vary by industry segment. As seen in Figure 7, technology, communications and financial services experience substantially higher costs. 5 Organizations in media, education and retail appear to have a lower overall cyber crime cost. Figure 7. Average annualized cost by industry sector ¥1,000,000 omitted Technology ¥5.92 Communications ¥5.28 Financial services ¥5.20 Transportation ¥5.14 Industrial ¥4.82 Utilities & energy ¥3.87 Consumer products ¥2.63 Services ¥2.57 Public sector ¥2.29 Retail ¥1.89 Education & research ¥1.80 Media ¥1.59 ¥0.00 ¥1.00 ¥2.00 ¥3.00 ¥4.00 ¥5.00 ¥6.00 ¥7.00 5 This analysis is for illustration purposes only. The sample sizes in all three years are too small to draw definitive conclusions about industry segment differences. Ponemon Institute© Research Report Page 9
  • 11. Cyber crimes are intrusive and common occurrences The benchmark sample of 29 organizations experienced 31 discernible and successful cyber attacks per week, which translates to more than 1.1 successful attacks per benchmarked organization each week. Figure 8 summarizes in percentages the types of attack methods experienced by participating companies. Almost all organizations experienced attacks relating to viruses, worms, trojans and 6 malware over the four-week benchmarking period. Figure 8. Types of cyber attacks experienced by 29 benchmarked companies The percentage frequency defines a type of attack categories experienced Viruses, worms, trojans 93% Malware 93% Stolen devices 55% Malicious code 45% Botnets 38% Web-based attacks 34% Denial of service 28% Phishing & social engineering 21% Malicious insiders 17% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 6 Malware attacks and malicious code attacks are inextricably linked. We classified malware attacks that successfully infiltrated the organizations’ networks or enterprise systems as a malicious code attack. Ponemon Institute© Research Report Page 10
  • 12. Costs vary considerably by the type of cyber attack Figure 9 shows the percentage of annualized cyber crime cost allocated to nine attack types compiled from all benchmarked organizations. Malicious insiders, web-based attacks and denial of services are the most costly incidents facing Japanese companies. The least of concern are bots, phishing and social engineering and stolen devices. In total, the top three attacks account for more than 56 percent of the total annualized cost of cyber crime. Figure 9. Percentage annualized cyber crime cost by attack type Malicious insiders 21% Web-based attacks 19% Denial of services 16% Viruses, Worms, Trojans 9% Malware 9% Malicious code 8% Stolen devices 7% Phishing & social engineering 6% Botnets 5% 0% 5% 10% 15% 20% 25% Ponemon Institute© Research Report Page 11
  • 13. While Figure 9 shows the average percentage of cost according to attack type, Figure 10 reveals the most to least expensive cyber attacks when analyzed on a per incident basis. The most expensive are malicious insiders and web-based attacks. In the context of our study, malicious insiders include employees, temporary employees, contractors and, possibly, business partners. Figure 10. Average annualized cyber crime cost weighted by attack frequency Malicious insiders ¥544,104 Web-based attacks ¥167,459 Denial of services ¥75,496 Malicious code ¥61,835 Phishing & social engineering ¥43,835 Stolen devices ¥39,116 Botnets ¥1,213 Viruses, Worms, Trojans ¥811 Malware ¥441 ¥0 ¥200,000 ¥400,000 ¥600,000 Ponemon Institute© Research Report Page 12
  • 14. Time to resolve or contain cyber crimes increases the cost The average number of days to resolve cyber attacks is 17 with a maximum of 38 days. The average cost was ¥18,989,814 over the 17-day period. Figure 11 shows the annualized cost of cyber crime in ascending order by the average number of days to resolve attacks. The regression line shows an upward slope, which suggests cost and time variables are positively related. Figure 11. Average days to resolve attack in ascending order Estimated average time is measured for each given organization in days ¥1,600,000,000 ¥1,400,000,000 ¥1,200,000,000 ¥1,000,000,000 ¥800,000,000 ¥600,000,000 ¥400,000,000 ¥200,000,000 ¥0 Ascending order by the number of days to contain security exploits Annualized total cost Regression Figure 12 reports the average days to resolve cyber attacks for nine different attack types studied in this report. It is clear from this chart that it takes the most amount of time, on average, to resolve attacks from malicious insiders, malicious code and web-based attackers (hackers). Figure 12. Average days to resolve attack Estimated average time is measured for each attack type in days Malicious insiders 28.3 Malicious code 23.6 Web-based attacks 19.0 Denial of service 16.6 Phishing & social engineering 11.9 Stolen devices 8.7 Botnets 2.1 Malware 2.6 Viruses, worms, trojans 1.1 0.0 5.0 10.0 15.0 20.0 25.0 30.0 Ponemon Institute© Research Report Page 13
  • 15. Theft of information assets and business disruption represents the highest external cost As shown in Figure 13, at the top end of the external cyber crime cost spectrum is information theft and business disruption, which each accounts for 36 percent of total external costs. In addition, the costs associated with revenue losses and equipment damages account for 24 percent of external costs. Figure 13. Percentage cost for external consequences Other cost includes direct and indirect costs that could not be allocated to a main external cost category 40% 36% 36% 35% 30% 25% 20% 18% 15% 10% 6% 4% 5% 0% Business Information loss Revenue loss Equipment Other costs disruption damages Ponemon Institute© Research Report Page 14
  • 16. Detection and recovery are the most costly internal activities Cyber crime detection and recovery activities account for 45 percent of total internal activity cost, as shown in Figure 14. This is followed by investigation at 20 percent. Incident management and containment each represent 18 and 13 percent of internal activity cost, respectively. Ex-post response (i.e. after the fact response or remediation) represents the lowest internal activity cost (4 percent). These cost elements highlight a significant cost-reduction opportunity for organizations that are able to automate recovery and detection activities through enabling security technologies. Figure 14. Percentage cost by internal activity center Investigation includes escalation activities 25% 23% 22% 20% 20% 18% 15% 13% 10% 5% 4% 0% Detection Recovery Investigation Incident mgmt Containment Ex-post response The percentage of annualized costs can be further broken down into six specific expenditure components, which include direct labor (30 percent), productivity loss (24 percent), cash outlay (23 percent), indirect labor (15 percent), overhead (6 percent), as shown in Figure 15. Figure 15. Percentage activity cost by six specific cost components 35% 30% 30% 24% 23% 25% 20% 15% 15% 10% 6% 5% 2% 0% Direct labor Productivity Cash outlay Indirect labor Overhead Other loss Ponemon Institute© Research Report Page 15
  • 17. The organization’s security posture influences the cost of cyber crime We measure the security posture of participating organizations as part of the benchmarking process. Figure 16 reports the annualized cost and regression of companies in ascending order of their security effectiveness as measured by the SES (see footnote 3). The figure shows a downward sloping regression, suggesting that companies with a stronger security posture experience a lower overall cost. The SES range of possible scores is +2 (most favorable) to -2 (least favorable). Compiled results for the present benchmark sample vary from a high of +1.61 to a low of -1.17, with a mean value at -.37. Figure 16. Annualized cost in ascending order by SES value Regression performed on SES ranging from +1.61 to a low of -1.17 ¥1,600,000,000 ¥1,503,174,381 ¥1,400,000,000 ¥1,200,000,000 ¥1,000,000,000 ¥800,000,000 ¥600,000,000 ¥400,000,000 ¥200,000,000 ¥0 Ascending order of SES value Annualized total cost Regression A comparison of organizations grouped into four quartiles based on SES reveals cost differences. Table 3 shows the average cost for companies in quartile 1 is ¥152.61 million, while the average cost for quartile 4 is substantially higher at ¥689.28 million. This analysis suggests that the company’s security posture has a favorable affect on the total annualized cost of cyber crime. Table 3. Quartile analysis ¥1,000,000 omitted 2012 total cost Quartile 1 (highest SES) ¥152.6 Quartile 2 ¥ 363.9 Quartile 3 ¥ 441.5 Quartile 4 (lowest SES) ¥ 689.2 Ponemon Institute© Research Report Page 16
  • 18. Organizations deploying security intelligence technologies realize a lower annualized cost of cyber crime. Figure 17 reports the annualized cost of cyber crime allocated to the five cost activity centers explained previously. The figure compares companies deploying and not deploying security intelligence systems. As can be seen, companies using security intelligence systems experience a lower cost in three of five activity centers. The largest cost differences in millions pertain to investigation and incident management (¥173.9 million vs. ¥133.0 million), detection (¥106.0 million vs. ¥79.8 million) and recovery (¥89.1 million vs. ¥87.4 million) activities, respectively. Figure 17. Activity cost comparison and the use of security intelligence technologies ¥1,000,000 omitted ¥200.0 ¥173.9 ¥180.0 ¥160.0 ¥133.0 ¥140.0 ¥120.0 ¥106.0 ¥100.0 ¥87.4 ¥89.1 ¥79.8 ¥80.0 ¥57.0 ¥60.0 ¥46.7 ¥40.0 ¥22.8 ¥20.0 ¥8.5 ¥0.0 Detection Investigation & Recovery Containment Ex-post response incident mgmt Deploying security intelligence systems Not deploying security intelligence systems Ponemon Institute© Research Report Page 17
  • 19. Figure 18 shows seven enabling security technology categories experienced by a subset of benchmarked companies. Each bar represents the percentage of companies fully deploying the stated technology. The top technology categories include: access governance tools (72 percent), advanced perimeter controls and firewall technologies (66 percent) and extensive deployment of encryption technologies (62 percent). Figure 18. Seven enabling security technologies deployed Access governance tools 72% Advanced perimeter controls and firewall 66% technologies Extensive deployment of encryption technologies 62% Extensive use of data loss prevention tools 55% Security intelligence tools 52% Enterprise deployment of GRC tools 28% Automated policy management tools 21% 0% 10% 20% 30% 40% 50% 60% 70% 80% Figure 19. Cost savings when deploying seven enabling security technologies ¥1,000,000 omitted Figure 19 shows the incremental cost saving experienced by companies deploying seven enabling security technologies. For example, companies deploying access governance tools, on average, experience a cost savings of ¥66.5 million and companies deploying advanced perimeter controls and firewall technologies have on average a cost savings of ¥59.7 million. Please note that these cost savings are not additive. Access governance tools ¥66.5 Advanced perimeter controls and firewall ¥59.7 technologies Extensive deployment of encryption ¥50.3 technologies Security intelligence tools ¥44.2 Extensive use of data loss prevention tools ¥30.7 Automated policy management tools ¥17.4 Enterprise deployment of GRC tools ¥12.2 ¥0.0 ¥10.0 ¥20.0 ¥30.0 ¥40.0 ¥50.0 ¥60.0 ¥70.0 Ponemon Institute© Research Report Page 18
  • 20. Figure 20 shows seven enterprise governance activities experienced by a subset of benchmarked companies. Each bar represents the percentage of companies fully executing each stated governance activity. The top three governance activities include: obtaining sufficient budgeted resources (79 percent), employment of certified/expert security personnel (62 percent) and certification against industry-leading standards (55 percent). Figure 20. Seven enterprise security governance activities deployed Adequacy of budgeted resources 79% Employment of certified/expert security personnel 62% Certification against industry-leading standards 55% Substantial training and awareness activities 45% Appointment of a high-level security leader (CISO) 38% Extensive use of security metrics 34% Formation of a senior-level security council 28% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Figure 21 shows the incremental cost savings experienced by companies deploying each one of seven enterprise governance activities. On average, companies employing certified/expert security personnel high-level security leader experience cost savings of ¥62.6 million. Also companies with certification against industry-leading standards save on average ¥57.0 million. Similar to above, these estimated cost savings are not additive. Figure 21. Cost savings when deploying seven enterprise governance activities ¥1,000,000 omitted Employment of certified/expert security personnel ¥62.6 Certification against industry-leading standards ¥57.0 Substantial training and awareness activities ¥29.8 Appointment of a high-level security leader (CISO) ¥25.5 Formation of a senior-level security council ¥19.6 Extensive use of security metrics ¥18.1 Adequacy of budgeted resources ¥11.0 ¥0.0 ¥10.0 ¥20.0 ¥30.0 ¥40.0 ¥50.0 ¥60.0 ¥70.0 Ponemon Institute© Research Report Page 19
  • 21. Part 4. Global Findings Table 4 provides a summary of the total annualized cost of cyber crime for five countries (totaling 199 separate companies). As revealed, there is a significant variation among country samples in terms of total cost. The UK sample reports the lowest and the US sample reports the highest total cost of cyber crime (about a 2.75 X difference). Table 4: Country analysis Sample size Local currency US$ United States (US) 56 $8,933,510 $8,933,510 United Kingdom (UK) 38 £2,083,165 $3,252,912 Australia (AU) 33 $3,216,891 $3,386,201 Germany (DE) 43 4,840,320 ! $5,950,725 Japan (JP) 29 ¥402,820,000 $5,154,447 Figure 22 examines in percentages five external costs or “consequences” of cyber crime for five countries. It clearly shows variation among countries, especially in two categories – that is, business disruption and information loss. Information loss appears to be a more significant external cost for the US (at 44 percent) and German (40 percent) companies than for the UK (23 percent) and Australia (25 percent). In contrast, business disruption appears to be a more significant external cost for Australian (41 percent) and UK (38 percent) companies than for German (25 percent) and US (30 percent) companies. Finally, Japanese companies rate both business disruption and information loss equally at 36 percent. Figure 22. Five external costs of cyber crime by country 38% 23% UK 30% 6% 3% 41% 25% AU 29% 3% 2% 36% 36% JP 18% 6% 4% 25% 40% DE 28% 5% 2% 30% 44% US 19% 5% 2% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Business disruption Information loss Revenue loss Equipment damages Other costs Ponemon Institute© Research Report Page 20
  • 22. Figure 23 examines five internal or activity cost categories in percentage terms for five countries. It also shows variation among countries, especially in the detection and recovery cost categories. Recovery cost appears to be most significant for UK (35 percent) and Australian (33 percent) companies. Detection cost, appears to be most significant for German companies (33 percent). Finally, Japanese companies rate investigation (20 percent) and incident management (18 percent) at a higher percentage than other countries. Figure 23. Five internal costs of cyber crime by country 35% 20% 9% UK 12% 8% 16% 33% 23% 13% AU 18% 5% 8% 22% 23% 20% JP 13% 18% 4% 22% 33% 19% DE 12% 9% 5% 21% 26% 13% US 15% 9% 16% 0% 5% 10% 15% 20% 25% 30% 35% 40% Recovery Detection Investigation Containment Incident mgmt Ex-post response Ponemon Institute© Research Report Page 21
  • 23. Figure 24 presents the consolidated number of cyber incidents examined within all five countries (including 199 separate companies). Our results show virus and malware are the most frequent attack vectors for participating organizations. While at a much lower incident frequency level, our research shows malicious insiders, malicious code, denial of services and web-based incidents are the most costly types of attacks experienced by companies in all countries. Figure 24. Consolidated number of cyber incidents examined in five country samples n = 199 separate companies Viruses, worms, trojans 15,669 Malware 13,327 Botnets 6,334 Phishing & social engineering 398 Stolen devices 252 Web-based attacks 158 Denial of service 100 Malicious code 88 Malicious insiders 67 - 2,000 4,000 6,000 8,000 10,000 12,000 14,000 16,000 18,000 Figure 25 reports the attack frequency adjusted by sample size for the four most expensive types of cyber incidents. As can be seen, companies in the US sample were more likely to experience malicious insiders, malicious code and web-based incidents than other countries. UK and Australian companies appear to be more likely to experience denial of services. Japanese companies appear to be least likely to experience malicious insiders and web-based attacks. German companies are least likely to experience malicious code and denial services. Figure 25. Adjusted frequency of four types of cyber attacks by country Each bar shows the total frequency of the attack type divided by sample size *The US sample shows that web-based attacks were observed more than once for some companies 1.20 1.13 1.00 0.74 0.76 0.80 0.64 0.61 0.58 0.61 0.60 0.52 0.50 0.48 0.52 0.45 0.37 0.39 0.40 0.33 0.33 0.36 0.28 0.21 0.17 0.20 - US* DE JP AU UK Malicious insiders Malicious code Denial of service Web-based attacks Ponemon Institute© Research Report Page 22
  • 24. Part 5. Framework Benchmark results of 29 organizations are intended to provide a meaningful baseline for companies experiencing a wide array of cyber attacks including viruses, malware, trojans, worms, malicious code, botnets, malicious insiders, denial of services and others. The cost framework in Figure 26 presents the two separate cost streams used to measure the total cyber crime cost for each participating organization. These two cost streams pertain to internal security-related activities and the external consequences experienced by organizations after experiencing an attack. Our benchmark methods attempt to elicit the actual experiences and consequences of cyber attacks. Our cost of cyber crime study is unique in addressing the core systems and business process-related activities that drive a range of expenditures associated with a company’s response to cyber crime. Figure 26 Cost Framework for Cyber Crime Internal cost activity External consequences centers and costs Detection Information loss or theft Investigation & escalation Direct, indirect and Business disruption opportunity costs associated with Containment cyber crimes Equipment damage Recovery Ex-post response Revenue loss This study addresses the core process-related activities that drive a range of expenditures associated with a company’s cyber attack. The five internal cost activity centers in our framework 7 include: ! Detection: Activities that enable an organization to reasonably detect and possibly deter cyber attacks or advanced threats. This includes allocated (overhead) costs of certain enabling technologies that enhance mitigation or early detection. 7 Internal costs are extrapolated using labor (time) as a surrogate for direct and indirect costs. This is also used to allocate an overhead component for fixed costs such as multiyear investments in technologies. Ponemon Institute© Research Report Page 23
  • 25. ! Investigation and escalation: Activities necessary to thoroughly uncover the source, scope, and magnitude of one or more incidents. The escalation activity also includes the steps taken to organize an initial management response. ! Containment: Activities that focus on stopping or lessening the severity of cyber attacks or advanced threats. These include shutting down high-risk attack vectors such as insecure applications or endpoints. ! Recovery: Activities associated with repairing and remediating the organization’s systems and core business processes. These include the restoration of damaged information assets and other IT (data center) assets. ! Ex-post response: Activities to help the organization minimize potential future attacks. These include adding new enabling technologies and control systems. In addition to the above process-related activities, organizations often experience external consequences or costs associated with the aftermath of successful attacks – which are defined as attacks that infiltrate the organization’s network or enterprise systems. Accordingly, our Institute’s research shows that four general cost activities associated with these external consequences are as follows: ! Cost of information loss or theft: Loss or theft of sensitive and confidential information as a result of a cyber attack. Such information includes trade secrets, intellectual properties (including source code), customer information and employee records. This cost category also includes the cost of data breach notification in the event that personal information is wrongfully acquired. ! Cost of business disruption: The economic impact of downtime or unplanned outages that prevent the organization from meeting its data processing requirements. ! Cost of equipment damage: The cost to remediate equipment and other IT assets as a result of cyber attacks to information resources and critical infrastructure. ! Lost revenue: The loss of customers (churn) and other stakeholders because of system delays or shutdowns as a result of a cyber attack. To extrapolate this cost, we use a shadow costing method that relies on the “lifetime value” of an average customer as defined for each participating organization. While not specifically mentioned in Figure 26, the nature of attacks that underlie cost in our framework include the following attack types: viruses, worms, trojans; malware; botnets; web-based attacks; phishing and social engineering; malicious insiders (including stolen devices); malicious 8 code (including SQL injection); and denial of services. 8 We acknowledge that these seven attack categories are not mutually independent and they do not represent an exhaustive list. Classification of a given attack was made by the researcher and derived from the facts collected during the benchmarking process. Ponemon Institute© Research Report Page 24
  • 26. Part 6. Benchmark Methods The cost of cyber crime benchmark instrument is designed to collect descriptive information from IT, information security and other key individuals about the actual costs incurred either directly or indirectly as a result of cyber attacks actually detected. Our cost method does not require subjects to provide actual accounting results, but instead relies on estimation and extrapolation from interview data over a four-week period. Cost estimation is based on confidential diagnostic interviews with key respondents within each benchmarked organization. Table 5 reports the frequency of individuals by their approximate functional discipline that participated in this year’s study. As can be seen, this year’s study involved 252 individuals or an average of 8.69 interviews for each benchmarked company. Table 5: Functional areas of interview respondents Frequency Compliance 42 IT operations 40 IT security 36 Data center management 34 Network operations 21 Accounting & finance 17 Internal or IT audit 11 Legal 11 Physical security/facilities mgmt 8 Quality assurance 8 Industrial control systems 8 Application development 5 Procurement/vendor mgmt 4 Human resources 3 Other 4 Total 252 Interviews per company 8.69 Data collection methods did not include actual accounting information, but instead relied upon numerical estimation based on the knowledge and experience of each participant. Within each category, cost estimation was a two-stage process. First, the benchmark instrument required individuals to rate direct cost estimates for each cost category by marking a range variable defined in the following number line format. How to use the number line: The number line provided under each data breach cost category is one way to obtain your best estimate for the sum of cash outlays, labor and overhead incurred. Please mark only one point somewhere between the lower and upper limits set above. You can reset the lower and upper limits of the number line at any time during the interview process. Post your estimate of direct costs here for [presented cost category] LL ______________________________________|___________________________________ UL Ponemon Institute© Research Report Page 25
  • 27. The numerical value obtained from the number line rather than a point estimate for each presented cost category preserved confidentiality and ensured a higher response rate. The benchmark instrument also required practitioners to provide a second estimate for indirect and opportunity costs, separately. Cost estimates were then compiled for each organization based on the relative magnitude of these costs in comparison to a direct cost within a given category. Finally, we administered general interview questions to obtain additional facts, including estimated revenue losses as a result of the cyber crime. The size and scope of survey items was limited to known cost categories that cut across different industry sectors. In our experience, a survey focusing on process yields a higher response rate and better quality of results. We also used a paper instrument, rather than an electronic survey, to provide greater assurances of confidentiality. Figure 26 (shown in Part 5) illustrates the activity-based costing schema we used in our benchmark study. As can be seen, we examined internal cost centers sequentially – starting with incident discovery to escalation to containment to recovery to ex-post response and culminating in diminished business opportunities or revenues. The cost driver of ex-post response and lost business opportunities is business disruption resulting from the attack. In total, the benchmark instrument contained descriptive costs for each one of the five cost activity centers. Within each cost activity center, the survey required respondents to estimate the cost range to signify direct cost, indirect cost and opportunity cost, defined as follows: ! Direct cost – the direct expense outlay to accomplish a given activity. ! Indirect cost – the amount of time, effort and other organizational resources spent, but not as a direct cash outlay. ! Opportunity cost – the cost resulting from lost business opportunities as a consequence of reputation diminishment after the incident. To maintain complete confidentiality, the survey instrument did not capture company-specific information of any kind. Subject materials contained no tracking codes or other methods that could link responses to participating companies. To keep the benchmark instrument to a manageable size, we carefully limited items to only those cost activities we considered crucial to the measurement of cyber crime cost. Based on discussions with learned experts, the final set of items focused on a finite set of direct or indirect cost activities. After collecting benchmark information, each instrument was examined carefully for consistency and completeness. In this study, a few companies were rejected because of incomplete, inconsistent or blank responses. Utilizing activity-based costing (ABC), cost estimates were captured using a standardized instrument for direct and indirect cost categories. Specifically, labor (productivity) and overhead costs were allocated to five internal activity centers (see Figure 13). External costs, including the loss of information assets, business disruption, equipment damage and revenue loss, were captured using shadow-costing methods. Total costs were allocated to eight discernible attack vectors. Field research was conducted over a five-month period concluding in August 2012. To maintain consistency across all benchmarked companies, we collected information over six consecutive weeks. The four consecutive weeks for any given organization was not necessarily the same time period as every other organization is this study. The extrapolated direct, indirect and opportunity costs of cyber crime were annualized by dividing the total cost collected over four weeks (ratio = 4/52 weeks). Ponemon Institute© Research Report Page 26
  • 28. Part 7. Benchmark Sample The present study was launched in January 2012. The recruitment started with a personalized letter 9 and a follow-up phone call to 499 Japanese organizations for possible participation in our study. While 35 organizations initially agreed to participate, 29 organizations permitted our researchers to complete the benchmark analysis. Pie Chart 1 summarizes the current (FY 2012) sample of participating companies based on 12 primary industry classifications. As can be seen, both technology and industrial (both at 17 percent) followed by financial services (14 percent) represent the largest segments. Pie Chart 1. Industry sectors of participating organizations Technology 3% 3% 3% 17% Industrial 4% Financial services 4% Services 4% Consumer products Public sector 7% 17% Retail Utilities & energy 10% Transportation Education & research 14% Automotive 14% Media Pie Chart 2 reports the percentage frequency of companies based on the number of enterprise seats connected to networks or systems. Our analysis of cyber crime cost only pertains to organizations with 1,003 to 80,290 seats. Pie Chart 2. Distribution of participating organizations by enterprise seats (size) 14% 17% < 2,000 2,000 to 5,000 17% 14% 5,001 to 10,000 10,001 to 15,000 15,001 to 25,000 > 25,000 17% 21% 9 Approximately, half of the organizations contacted for possible participation in this year’s study are members of Ponemon Institute’s benchmarking community. This community of companies is composed of organizations that have participated in one or more benchmarking studies over the past nine years. Ponemon Institute© Research Report Page 27
  • 29. Part 8. Limitations & Conclusions This study utilizes a confidential and proprietary benchmark method that has been successfully deployed in earlier Ponemon Institute research. However, there are inherent limitations to benchmark research that need to be carefully considered before drawing conclusions from findings. ! Non-statistical results: The purpose of this study is descriptive rather than normative inference. The current study draws upon a representative, non-statistical sample of organizations, all Japanese-based entities experiencing one or more cyber attacks during a four-week fielding period. Statistical inferences, margins of error and confidence intervals cannot be applied to these data given the nature of our sampling plan. ! Non-response: The current findings are based on a small representative sample of completed case studies. An initial mailing of benchmark surveys was sent to a targeted group of 499 separate organizations, all believed to have experienced one or more cyber attacks. Twenty- nine companies provided usable benchmark surveys. Non-response bias was not tested so it is always possible companies that did not participate are substantially different in terms of the methods used to manage the cyber crime containment and recovery process, as well as the underlying costs involved. ! Sampling-frame bias: Because our sampling frame is judgmental, the quality of results is influenced by the degree to which the frame is representative of the population of companies being studied. It is our belief that the current sampling frame is biased toward companies with more mature information security programs. ! Company-specific information: The benchmark information is sensitive and confidential. Thus, the current instrument does not capture company-identifying information. It also allows individuals to use categorical response variables to disclose demographic information about the company and industry category. Industry classification relies on self-reported results. ! Unmeasured factors: To keep the survey concise and focused, we decided to omit other important variables from our analyses such as leading trends and organizational characteristics. The extent to which omitted variables might explain benchmark results cannot be estimated at this time. ! Estimated cost results. The quality of survey research is based on the integrity of confidential responses received from companies. While certain checks and balances can be incorporated into the survey process, there is always the possibility that respondents did not provide truthful responses. In addition, the use of a cost estimation technique (termed shadow costing methods) rather than actual cost data could create significant bias in presented results. Report Conclusions The findings of our first Japanese study on the cost of cyber crime provide evidence that companies expend considerable time and resources responding to a plethora of different types of attacks. As in prior years, the most significant costs result from the theft or misuse of information assets. Our findings also suggest that the cost of cyber crime is on the rise. On a positive note, we found that the cost of any given attack can be substantially reduced by deploying certain security technologies and by advancing good governance practices throughout the company. Finally, despite its stated limitations, this research is encouraging to those who believe in the proposition that good security practices have a positive return on investment. Ponemon Institute© Research Report Page 28
  • 30. If you have questions or comments about this research report or you would like to obtain additional copies of the document (including permission to quote or reuse this report), please contact by letter, phone call or email: Ponemon Institute LLC Attn: Research Department 2308 US 31 North Traverse City, Michigan 49629 USA 1.800.887.3118 research@ponemon.org Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute© Research Report Page 29