SlideShare a Scribd company logo
1 of 13
Download to read offline
Using Real World Metrics to Calculate
Today’s Cost of a Data Breach
The Scary Truth
It now takes an average of 31 days at a cost of $20,000 per day to clean up
and remediate after a cyber attack
- Ponemon Institute, 2014
This presentation leverages metrics from the 2014 Ponemon Institute Study
• Conducted annually since 2005
• Analyzed 314 breaches in 16 industry sectors
• 61 of those breaches were in the United States
• Industries represented include financial, retail, healthcare, technology,
and pharmaceutical
Costs of a Data Breach
$201 Per Record*
• Direct Costs: $66
– Legal defense costs
– Audit and consulting services
– Public relations, communications with customers, etc.
• Indirect Costs: $135
– Lost business
– Increased costs to acquire new customers
– In-house investigations, etc.
• Financial Industry Costs: $236 average per record
*2005 Survey - $138, 2013 Survey - $188, 2005-2014 Average - $191
Costs of a Data Breach
• 44% involved malicious or criminal acts
– Malware, criminal insiders, phishing/social engineering, SQL
injection
– Cost per record of $246
• 31% involved “human error”
– Negligent or careless employees
– Cost per record of $171
• 25% involved system “glitches”
– Cost per record of $160
Costs of a Data Breach
• Average breach size: 29,087 records*
• Average notification costs: $509,000
• Average total cost: $5.85 million
• Abnormal customer churn increased 15% between 2013-2014
* By design the Ponemon survey excludes breaches greater than 100,000 records
What increases costs?
$10
$43
$37
$3
$18
$25
$15
($13)
($20)
($10)
$0
$10
$20
$30
$40
$50
Lost or stolen devices
Breaches involving third-
parties Notifying too quickly Engaging consultants
2013 2014
What decreases costs?
*2014 was the first year BCDR was included in this survey; therefore, there is no historical data.
($34)
($42)
($23)
($21)
($17)
($13)
($10)
($45)
($40)
($35)
($30)
($25)
($20)
($15)
($10)
($5)
$0
Having a strong security
posture
Having a formal incident
response plan in place
prior to the breach
Having a formal BCP in
place prior to the breach* Employment of a CISO
2013 2014
Real-World Example
Department of Veterans Affairs
• May 3, 2006, an employee copied data onto
a laptop and took it home without
authorization
• The data was neither encrypted nor
password protected
• The laptop was stolen
• The laptop was recovered a month after the
theft with no evidence that the data was
accessed or used
Real-World Example
Department of Veterans Affairs (cont’d)
• The data copied to the laptop included records on every American
veteran discharged since 1975
– 26,500,000 veterans exposed, including their names, dates of birth, and social
security numbers
– VA later revised estimate to include an additional 2.1 million active and reserve
service members
• $7 million in notification costs
• $7 million in call center costs
• $20 million class action settlement
Real-World Example
Ohio State University
• December 2010, “hackers” gained access to a university server
containing the personal information of over 760,000 current,
former, and prospective students and faculty
• The information included names, social security numbers, dates
of birth, etc.
Real-World Example
Ohio State University (cont’d)
• A year of free credit monitoring
• Dedicated call center for issue resolution
• Third-party forensic services were engaged to investigate
• All victims were notified in writing
• There was no evidence that access records were exploited
• The costs for the notification, investigation, and remediation
exceeded $4 million
References
• Ponemon Institute, “Cost of Data Breach Study”
• Zurich General Insurance, “Cost of a Data Breach”
• Kaspersky “Global Corporate IT Security Risks”
• American Bankers Association “Target Breach Impact Study”
• Verizon “Data Breach Investigations Report”
• Information Week “8 Most Common Causes of Data Breaches”
• Symantec “Internet Security Threat Report”
• PWC/CERT/CSO Magazine “US State of Cybercrime Survey”
For more educational content from TraceSecurity,
• Download thought leadership
• Watch webinars on-demand
• Read our blog, and
• Receive our monthly newsletter
• Follow us on social:
www.tracesecurity.com ©2014 TraceSecurity, Inc. All rights reserved worldwide.

More Related Content

Similar to Using Real World Metrics to Calculate Today's Cost of a Data Breach

2016 cost of data breach study brasil
2016 cost of data breach study   brasil2016 cost of data breach study   brasil
2016 cost of data breach study brasilJoão Rufino de Sales
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysisxband
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcementMeg Weber
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBsMary Brophy
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Fasoo
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyResilient Systems
 
Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14ACFCS
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsIvanti
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityJoan Weber
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 

Similar to Using Real World Metrics to Calculate Today's Cost of a Data Breach (20)

2016 cost of data breach study brasil
2016 cost of data breach study   brasil2016 cost of data breach study   brasil
2016 cost of data breach study brasil
 
2015 cost of data breach study
2015 cost of data breach study2015 cost of data breach study
2015 cost of data breach study
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysis
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Using Real World Metrics to Calculate Today's Cost of a Data Breach

  • 1. Using Real World Metrics to Calculate Today’s Cost of a Data Breach
  • 2. The Scary Truth It now takes an average of 31 days at a cost of $20,000 per day to clean up and remediate after a cyber attack - Ponemon Institute, 2014 This presentation leverages metrics from the 2014 Ponemon Institute Study • Conducted annually since 2005 • Analyzed 314 breaches in 16 industry sectors • 61 of those breaches were in the United States • Industries represented include financial, retail, healthcare, technology, and pharmaceutical
  • 3. Costs of a Data Breach $201 Per Record* • Direct Costs: $66 – Legal defense costs – Audit and consulting services – Public relations, communications with customers, etc. • Indirect Costs: $135 – Lost business – Increased costs to acquire new customers – In-house investigations, etc. • Financial Industry Costs: $236 average per record *2005 Survey - $138, 2013 Survey - $188, 2005-2014 Average - $191
  • 4. Costs of a Data Breach • 44% involved malicious or criminal acts – Malware, criminal insiders, phishing/social engineering, SQL injection – Cost per record of $246 • 31% involved “human error” – Negligent or careless employees – Cost per record of $171 • 25% involved system “glitches” – Cost per record of $160
  • 5. Costs of a Data Breach • Average breach size: 29,087 records* • Average notification costs: $509,000 • Average total cost: $5.85 million • Abnormal customer churn increased 15% between 2013-2014 * By design the Ponemon survey excludes breaches greater than 100,000 records
  • 6. What increases costs? $10 $43 $37 $3 $18 $25 $15 ($13) ($20) ($10) $0 $10 $20 $30 $40 $50 Lost or stolen devices Breaches involving third- parties Notifying too quickly Engaging consultants 2013 2014
  • 7. What decreases costs? *2014 was the first year BCDR was included in this survey; therefore, there is no historical data. ($34) ($42) ($23) ($21) ($17) ($13) ($10) ($45) ($40) ($35) ($30) ($25) ($20) ($15) ($10) ($5) $0 Having a strong security posture Having a formal incident response plan in place prior to the breach Having a formal BCP in place prior to the breach* Employment of a CISO 2013 2014
  • 8. Real-World Example Department of Veterans Affairs • May 3, 2006, an employee copied data onto a laptop and took it home without authorization • The data was neither encrypted nor password protected • The laptop was stolen • The laptop was recovered a month after the theft with no evidence that the data was accessed or used
  • 9. Real-World Example Department of Veterans Affairs (cont’d) • The data copied to the laptop included records on every American veteran discharged since 1975 – 26,500,000 veterans exposed, including their names, dates of birth, and social security numbers – VA later revised estimate to include an additional 2.1 million active and reserve service members • $7 million in notification costs • $7 million in call center costs • $20 million class action settlement
  • 10. Real-World Example Ohio State University • December 2010, “hackers” gained access to a university server containing the personal information of over 760,000 current, former, and prospective students and faculty • The information included names, social security numbers, dates of birth, etc.
  • 11. Real-World Example Ohio State University (cont’d) • A year of free credit monitoring • Dedicated call center for issue resolution • Third-party forensic services were engaged to investigate • All victims were notified in writing • There was no evidence that access records were exploited • The costs for the notification, investigation, and remediation exceeded $4 million
  • 12. References • Ponemon Institute, “Cost of Data Breach Study” • Zurich General Insurance, “Cost of a Data Breach” • Kaspersky “Global Corporate IT Security Risks” • American Bankers Association “Target Breach Impact Study” • Verizon “Data Breach Investigations Report” • Information Week “8 Most Common Causes of Data Breaches” • Symantec “Internet Security Threat Report” • PWC/CERT/CSO Magazine “US State of Cybercrime Survey”
  • 13. For more educational content from TraceSecurity, • Download thought leadership • Watch webinars on-demand • Read our blog, and • Receive our monthly newsletter • Follow us on social: www.tracesecurity.com ©2014 TraceSecurity, Inc. All rights reserved worldwide.