The Cost of Inactivity: Malware Infographic

Cisco Security
Cisco SecurityFounding Partner at Cisco Security

As the cost and likelihood of a breach grows you can't afford "good enough" protection before, during, AND after an attack. Protect your brand and data with Cisco email and web security. Learn more: http://cs.co/9003hKu3, http://cs.co/9003hKu9

The Cost of Inactivity
As the cost and likelihood of a breach grows you can’t afford
“good enough” protection before, during, AND after an attack.
Organizations Are Not Able To Detect A Breach
In A Timely Manner
2+ Years to Discover
the Breach
33% 55%
Unable to Determine the
Cause of the Breach
Top 3 causes of a breach
Malware Hacking Social Engineering
40% 52% 29%
Malware Impacts
Of Victims Report Measurable Impact to Business
80% 20142013 20142013
$5.9M$5.4M 32days
Average Cost of
a Breach
Average Time To
Resolve a Cyber-attack
MONTH
MONTH
MONTH
MONTH
45days
Cisco Security
5500
IPS Signatures in
Advanced Malware Protection (AMP)
21 Billion
Web Requests Through
Cisco Web Security (WSA+CWS)
35%
Of Global Enterprise Email Traffic
Processed Through Cisco Email
Security (ESA + CES)
Worms
Trojans Viruses
Rootkits
Sources
• Cisco Midyear Security Report 2014
• Cisco Annual Security Report 2014, ASR 2015
• ESG Endpoint security survey, Jan 15
• Ponemon Cost of Cyber crime, Oct 2014
• Ponemon cost of Data Breach 2013, May 2013
• Ponemon cost of Data Breach 2014, May 2014
• Ponemon cost of malware containment, Jan 2015
• 2014: A year of mega breaches, Ponemon
• 2013 & 2014 Verizon Data breach investigations report
www.cisco.com/go/emailsecurity
Protect your brand and data with Cisco Email and Web Security
www.cisco.com/go/websecurity
Industries Hit Hardest In 2014
Retail
$245M $80M $4.5M
Financial Services Healthcare
Top 2 Attack Vectors For Malware
Web Email

Recommended

Malware and the Cost of Inactivity by
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of InactivityCisco Security
8.8K views1 slide
CSS Trivia by
CSS TriviaCSS Trivia
CSS TriviaAlert Logic
272 views31 slides
Cisco Web and Email Security Overview by
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
26.4K views51 slides
Cisco Addresses the Full Attack Continuum by
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
4.4K views21 slides
Data Center Security Challenges by
Data Center Security ChallengesData Center Security Challenges
Data Center Security ChallengesCisco Security
8.5K views1 slide
Security Implications of the Cloud by
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the CloudAlert Logic
110 views10 slides

More Related Content

What's hot

Infographic - Three steps to stopping advanced email threats by
Infographic - Three steps to stopping advanced email threatsInfographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsProofpoint
15.8K views1 slide
Security Implications of the Cloud - CSS ATX 2017 by
Security Implications of the Cloud - CSS ATX 2017Security Implications of the Cloud - CSS ATX 2017
Security Implications of the Cloud - CSS ATX 2017Alert Logic
310 views8 slides
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné... by
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...Cristian Garcia G.
304 views46 slides
Reinforcing the Revolution: The Promise and Perils of Digital Transformation by
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationProofpoint
30.5K views1 slide
Cyber Ethics: Cyber Security Services | VAPT and WAPT by
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPTSaeelRelekar
182 views8 slides
Next Dimension and Veeam | Solutions for PIPEDA Compliance by
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension Inc.
134 views24 slides

What's hot(20)

Infographic - Three steps to stopping advanced email threats by Proofpoint
Infographic - Three steps to stopping advanced email threatsInfographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threats
Proofpoint15.8K views
Security Implications of the Cloud - CSS ATX 2017 by Alert Logic
Security Implications of the Cloud - CSS ATX 2017Security Implications of the Cloud - CSS ATX 2017
Security Implications of the Cloud - CSS ATX 2017
Alert Logic 310 views
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné... by Cristian Garcia G.
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Cristian Garcia G.304 views
Reinforcing the Revolution: The Promise and Perils of Digital Transformation by Proofpoint
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Proofpoint30.5K views
Cyber Ethics: Cyber Security Services | VAPT and WAPT by SaeelRelekar
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
SaeelRelekar182 views
Next Dimension and Veeam | Solutions for PIPEDA Compliance by Next Dimension Inc.
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Cyber Risk Management in the New Digitalisation Age - eSentinel™ by Netpluz Asia Pte Ltd
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Kill Chain Deck for General Audience by Tom K
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General Audience
Tom K354 views
Advanced Web Security Deployment by Cisco Canada
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
Cisco Canada1.7K views
FireEye Use Cases — FireEye Solution Deployment Experience by Valery Yelanin
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
Valery Yelanin3.5K views
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea... by Jacob Tranter
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Jacob Tranter94 views
Proatively Engaged: Questions Executives Should Ask Their Security Teams by FireEye, Inc.
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
FireEye, Inc.3K views
Ransomware 2020 Report by Fortis
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 Report
Fortis78 views
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges by Skybox Security
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Skybox Security1.1K views
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl... by Netpluz Asia Pte Ltd
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
2 factor authentication beyond password : enforce advanced security with au... by NetwayClub
2  factor  authentication beyond password : enforce advanced security with au...2  factor  authentication beyond password : enforce advanced security with au...
2 factor authentication beyond password : enforce advanced security with au...
NetwayClub818 views
Mobile Security: Perceptions vs Device-harvested Reality by Zimperium
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested Reality
Zimperium447 views
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers... by EC-Council
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
EC-Council2K views

Viewers also liked

AMP Helps Cisco IT Catch 50% More Malware threats by
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
4.9K views1 slide
3 Tips for Choosing a Next Generation Firewall by
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
2.5K views1 slide
Midsize Business Solutions: Cybersecurity by
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
3.4K views1 slide
Integrated Network Security Strategies by
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
3.5K views1 slide
Balance Data Center Security and Performance by
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and PerformanceCisco Security
2.5K views1 slide
Infographic: Security for Mobile Service Providers by
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
4.6K views1 slide

Viewers also liked(9)

AMP Helps Cisco IT Catch 50% More Malware threats by Cisco Security
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security4.9K views
3 Tips for Choosing a Next Generation Firewall by Cisco Security
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
Cisco Security2.5K views
Midsize Business Solutions: Cybersecurity by Cisco Security
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
Cisco Security3.4K views
Integrated Network Security Strategies by Cisco Security
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
Cisco Security3.5K views
Balance Data Center Security and Performance by Cisco Security
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
Cisco Security2.5K views
Infographic: Security for Mobile Service Providers by Cisco Security
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
Cisco Security4.6K views
A Reality Check on the State of Cybersecurity by Cisco Security
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
Cisco Security3.1K views
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur... by Cisco Security
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security4.2K views
Cisco ISE Reduces the Attack Surface by Controlling Access by Cisco Security
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco Security4.4K views

Similar to The Cost of Inactivity: Malware Infographic

Symantec's Internet Security Threat Report for the Government Sector by
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
3.6K views220 slides
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty by
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyOrganization
9 views14 slides
Cyber Security index by
Cyber Security indexCyber Security index
Cyber Security indexsukiennong.vn
847 views12 slides
MainPaper_4.0 by
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
138 views4 slides
Nonprofit Cybersecurity Incident Report by
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportCommunity IT Innovators
544 views19 slides
What you need to know about cyber security by
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
50 views6 slides

Similar to The Cost of Inactivity: Malware Infographic(20)

Symantec's Internet Security Threat Report for the Government Sector by Symantec
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec3.6K views
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty by Organization
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Organization9 views
MainPaper_4.0 by varun4110
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110138 views
OverseeCyberSecurityAsHackersSeekToInfiltrate by Kashif Ali
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
Kashif Ali84 views
Best practices for_implementing_security_awareness_training by wardell henley
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_training
wardell henley91 views
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19 by Citrin Cooperman
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
Citrin Cooperman308 views
Cybersecurity in BFSI - Top Threats & Importance by manoharparakh
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
manoharparakh9 views
Cyber Security for Digital-Era by JK Tech
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-Era
JK Tech654 views
Security - intelligence - maturity-model-ciso-whitepaper by CMR WORLD TECH
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
CMR WORLD TECH764 views
security_secure_pipes_frost_whitepaper by Alan Rudd
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaper
Alan Rudd532 views
Corporate Cybersecurity: A Serious Game by Tatainteractive1
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
Tatainteractive147 views
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA... by Netpluz Asia Pte Ltd
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx by arnoldmeredith47041
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx

More from Cisco Security

Incident Response Services Template - Cisco Security by
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
11.2K views2 slides
Cisco 2015 Midyear Security Report Slide Deck by
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
4.4K views28 slides
Enterprise Strategy Group: Security Survey by
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
3.1K views5 slides
Infonetics Network and Content Security Vendor Scorecard by
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
2.2K views12 slides
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ... by
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
7.3K views15 slides
The Evolution of and Need for Secure Network Access by
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
2.6K views11 slides

More from Cisco Security(16)

Incident Response Services Template - Cisco Security by Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
Cisco Security11.2K views
Cisco 2015 Midyear Security Report Slide Deck by Cisco Security
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
Cisco Security4.4K views
Enterprise Strategy Group: Security Survey by Cisco Security
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
Cisco Security3.1K views
Infonetics Network and Content Security Vendor Scorecard by Cisco Security
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
Cisco Security2.2K views
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ... by Cisco Security
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security7.3K views
The Evolution of and Need for Secure Network Access by Cisco Security
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Cisco Security2.6K views
Cisco 2014 Midyear Security Report by Cisco Security
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
Cisco Security2.4K views
String of Paerls Infographic by Cisco Security
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
Cisco Security1.4K views
Midyear Security Report Infographic by Cisco Security
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
Cisco Security478 views
Cisco Annual Security Report Infographic by Cisco Security
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
Cisco Security602 views
City of Tomorrow Builds in Next-Generation Security by Cisco Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
Cisco Security2.2K views
Laser Pioneer Secures Network End-to-End to Protect Assets by Cisco Security
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security1.1K views
McAllen Intermediate School District by Cisco Security
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
Cisco Security1.3K views
Leveraging Context-Aware Security to Safeguard Patient Data by Cisco Security
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
Cisco Security1.1K views
Secure, Automated Network Access for Any Device on Campus by Cisco Security
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
Cisco Security669 views

Recently uploaded

Future of Learning - Yap Aye Wee.pdf by
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdfNUS-ISS
41 views11 slides
Empathic Computing: Delivering the Potential of the Metaverse by
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the MetaverseMark Billinghurst
470 views80 slides
SAP Automation Using Bar Code and FIORI.pdf by
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
19 views38 slides
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... by
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...Vadym Kazulkin
75 views64 slides
Top 10 Strategic Technologies in 2024: AI and Automation by
Top 10 Strategic Technologies in 2024: AI and AutomationTop 10 Strategic Technologies in 2024: AI and Automation
Top 10 Strategic Technologies in 2024: AI and AutomationAutomationEdge Technologies
14 views14 slides
Report 2030 Digital Decade by
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital DecadeMassimo Talia
14 views41 slides

Recently uploaded(20)

Future of Learning - Yap Aye Wee.pdf by NUS-ISS
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
NUS-ISS41 views
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst470 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... by Vadym Kazulkin
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
Vadym Kazulkin75 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10209 views
Web Dev - 1 PPT.pdf by gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet55 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab15 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi120 views
Perth MeetUp November 2023 by Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price15 views
Transcript: The Details of Description Techniques tips and tangents on altern... by BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada130 views
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta15 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2216 views
.conf Go 2023 - Data analysis as a routine by Splunk
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk93 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software225 views
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu... by NUS-ISS
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
NUS-ISS37 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb12 views

The Cost of Inactivity: Malware Infographic

  • 1. The Cost of Inactivity As the cost and likelihood of a breach grows you can’t afford “good enough” protection before, during, AND after an attack. Organizations Are Not Able To Detect A Breach In A Timely Manner 2+ Years to Discover the Breach 33% 55% Unable to Determine the Cause of the Breach Top 3 causes of a breach Malware Hacking Social Engineering 40% 52% 29% Malware Impacts Of Victims Report Measurable Impact to Business 80% 20142013 20142013 $5.9M$5.4M 32days Average Cost of a Breach Average Time To Resolve a Cyber-attack MONTH MONTH MONTH MONTH 45days Cisco Security 5500 IPS Signatures in Advanced Malware Protection (AMP) 21 Billion Web Requests Through Cisco Web Security (WSA+CWS) 35% Of Global Enterprise Email Traffic Processed Through Cisco Email Security (ESA + CES) Worms Trojans Viruses Rootkits Sources • Cisco Midyear Security Report 2014 • Cisco Annual Security Report 2014, ASR 2015 • ESG Endpoint security survey, Jan 15 • Ponemon Cost of Cyber crime, Oct 2014 • Ponemon cost of Data Breach 2013, May 2013 • Ponemon cost of Data Breach 2014, May 2014 • Ponemon cost of malware containment, Jan 2015 • 2014: A year of mega breaches, Ponemon • 2013 & 2014 Verizon Data breach investigations report www.cisco.com/go/emailsecurity Protect your brand and data with Cisco Email and Web Security www.cisco.com/go/websecurity Industries Hit Hardest In 2014 Retail $245M $80M $4.5M Financial Services Healthcare Top 2 Attack Vectors For Malware Web Email