SlideShare a Scribd company logo
Probability
Data	
  Breach	
  Cost
The	
  Long	
  Long	
  Cyber	
  Risk	
  Tail
Or
Why	
  focusing	
  only on	
  security	
  
controls	
  misses	
  half	
  the	
  picture!
$0
$10
$20
$30
$40
$50
$60
$70
Likelihood	
  of	
  Breach	
  Cost
Breach	
  Cost
Millions
Distribution for the possible cost of a data breach that exposed personal and
financial data for 300,000 peopleand that was caused by a malicious outsider.
This distribution is a prediction from a linear regression model trained upon a large number of data
breaches, covering a large range of industries, incident types, data types and people affected. While the cost
of most breaches is less than $10 Million dollars, a significant portion are much larger – the long long tail.
80%	
  Confidence	
  (80%	
  of	
  
data	
  breaches	
  will	
  cost	
  less)
90%	
  Confidence	
  (90%	
  of	
  
data	
  breaches	
  will	
  cost	
  less)
10%	
  of	
  breaches	
  fall	
  here
– within	
  the	
  long	
  long	
  tail.
What	
  is	
  the	
  Long	
  Long Cyber	
  Risk	
  Tail?
Investigation
Notification
Call	
  center
Remediation
o Business	
  Loss
o Damage	
  to	
  personal	
  credit
o Theft	
  of	
  money	
  &	
  goods
o Credit	
  card	
  replacement	
  costs
Business	
  loss;	
  theft	
  of	
  
money	
  &	
  goods
Credit	
  monitoring	
  &	
  
privacy	
  insurance.
Fines	
  &	
  settlements
Public	
  &	
  Other	
  BusinessesBreach	
  Company
Mitigate
Transfer	
  
via	
  suits
Breakdown	
  of	
  Data	
  Breach	
  Cost
Total	
  Cost
The	
  cost	
  of	
  a	
  security	
  firm	
  to	
  investigate	
  and	
  
report	
  on	
  the	
  activities	
  of	
  a	
  malicious	
  intruder.	
  
Legal	
  response	
  to	
  the	
  many	
  many	
  government	
  
agencies	
  that	
  require	
  notification.
$0
$10
$20
$30
$40
$50
$60
$70
Likelihood	
  of	
  Breach	
  Cost
Breach	
  Cost
Millions
Variable	
  Costs	
  that	
  
Dominate	
  the	
  Tail
Investigation
Notification
Call	
  center
Remediation
Business	
  loss;	
  theft	
  of	
  
money	
  &	
  goods
Credit	
  monitoring	
  &	
  
privacy	
  insurance.
Fines	
  &	
  settlements
Breach	
  Company
Investigation
Notification
Call	
  center
Remediation
o Business	
  Loss
o Damage	
  to	
  personal	
  credit
o Theft	
  of	
  money	
  &	
  goods
o Credit	
  card	
  replacement	
  costs
Business	
  loss;	
  theft	
  of	
  
money	
  &	
  goods
Credit	
  monitoring	
  &	
  
privacy	
  insurance.
Fines	
  &	
  settlements
Public	
  &	
  Other	
  BusinessesBreach	
  Company
Mitigate
Transfer	
  
via	
  suits
Make	
  sure	
  you	
  are	
  capturing	
  information	
  
that	
  can	
  speed	
  the	
  investigation.	
  Engaging	
  
a	
  security	
  firm	
  early	
  can	
  save	
  millions.
Engage	
  a	
  law	
  firm	
  early,	
  negotiate	
  costs	
  and	
  
be	
  prepared.
Reduce probability of a lawsuit by
engaging a law firm to review
contracts and advertising promises.
How	
  to	
  Control	
  Variable	
  Costs	
  that	
  Dominate	
  the	
  Tail
Actions	
  to	
  Reduce	
  Your	
  Tail
ü Engage	
  a	
  law	
  firm;	
  negotiate	
  notification	
  costs
ü Strengthen	
  contracts	
  with	
  partners;	
  be	
  careful	
  with	
  advertised	
  promises.
ü Engage	
  a	
  security	
  company,	
  instrument	
  your	
  enterprise,	
  negotiate	
  
investigation	
  costs
VivoSecurity	
  Inc.	
  Contact:	
  ThomasL@VivoSecurity.com
ü Use a Cyber Loss Model to clarify potential loss;
consider Insurance.

More Related Content

What's hot

SecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_ReportSecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_Report
Alex Himmelberg
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
Kartik Mehta
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
SAS Institute India Pvt. Ltd
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
Capgemini
 
Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)
AML Source
 
Reduce your aml compliance workload
Reduce your aml compliance workloadReduce your aml compliance workload
Reduce your aml compliance workload
Alessa
 
My blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banksMy blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banks
Kishore Jethanandani, MBA, MA, MPhil,
 
Risk Based Approach Bachir El Nakib July 2009 [Compatibility Mode]
Risk Based Approach   Bachir El Nakib July 2009 [Compatibility Mode]Risk Based Approach   Bachir El Nakib July 2009 [Compatibility Mode]
Risk Based Approach Bachir El Nakib July 2009 [Compatibility Mode]
bashirnakib
 
FACTA Red Flags 2010
FACTA Red Flags 2010FACTA Red Flags 2010
FACTA Red Flags 2010
Credit Management Association
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
FraudBusters
 
Suspicious Activities Reports, Perceptions and Reality in AML Investigations
Suspicious Activities Reports, Perceptions and Reality in AML InvestigationsSuspicious Activities Reports, Perceptions and Reality in AML Investigations
Suspicious Activities Reports, Perceptions and Reality in AML Investigations
Sarah George
 
Synthetic Identities and AML
Synthetic Identities and AMLSynthetic Identities and AML
Synthetic Identities and AML
doylebc
 
Risk based approach
Risk based approachRisk based approach
Risk based approach
Pierre Simon, CCEP-I
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
Security B-Sides
 
June newsletter 2017
June newsletter 2017June newsletter 2017
June newsletter 2017
KAW Management Services Ltd.
 
Fraud Detection Using A Database Platform
Fraud Detection Using A Database PlatformFraud Detection Using A Database Platform
Fraud Detection Using A Database Platform
EZ-R Stats, LLC
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
Don Grauel
 
Winning Tactics for Data Governance
Winning Tactics for Data GovernanceWinning Tactics for Data Governance
Winning Tactics for Data Governance
Colleen Beck-Domanico
 
A42 banks race to defend from further reputational damage
A42   banks race to defend from further reputational damageA42   banks race to defend from further reputational damage
A42 banks race to defend from further reputational damage
Freddie McMahon
 
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
Louise Malady
 

What's hot (20)

SecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_ReportSecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_Report
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)
 
Reduce your aml compliance workload
Reduce your aml compliance workloadReduce your aml compliance workload
Reduce your aml compliance workload
 
My blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banksMy blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banks
 
Risk Based Approach Bachir El Nakib July 2009 [Compatibility Mode]
Risk Based Approach   Bachir El Nakib July 2009 [Compatibility Mode]Risk Based Approach   Bachir El Nakib July 2009 [Compatibility Mode]
Risk Based Approach Bachir El Nakib July 2009 [Compatibility Mode]
 
FACTA Red Flags 2010
FACTA Red Flags 2010FACTA Red Flags 2010
FACTA Red Flags 2010
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
 
Suspicious Activities Reports, Perceptions and Reality in AML Investigations
Suspicious Activities Reports, Perceptions and Reality in AML InvestigationsSuspicious Activities Reports, Perceptions and Reality in AML Investigations
Suspicious Activities Reports, Perceptions and Reality in AML Investigations
 
Synthetic Identities and AML
Synthetic Identities and AMLSynthetic Identities and AML
Synthetic Identities and AML
 
Risk based approach
Risk based approachRisk based approach
Risk based approach
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
 
June newsletter 2017
June newsletter 2017June newsletter 2017
June newsletter 2017
 
Fraud Detection Using A Database Platform
Fraud Detection Using A Database PlatformFraud Detection Using A Database Platform
Fraud Detection Using A Database Platform
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Winning Tactics for Data Governance
Winning Tactics for Data GovernanceWinning Tactics for Data Governance
Winning Tactics for Data Governance
 
A42 banks race to defend from further reputational damage
A42   banks race to defend from further reputational damageA42   banks race to defend from further reputational damage
A42 banks race to defend from further reputational damage
 
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
 

Similar to Half the Picture

Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6
Accounting_Whitepapers
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106
Ted Richmond
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
Teo Leonard
 
Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for Businesses
Shred Station
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
aiimnevada
 
RT_Corporate Fraud_NOV16
RT_Corporate Fraud_NOV16RT_Corporate Fraud_NOV16
RT_Corporate Fraud_NOV16
Maxwell Carr-Howard
 
Business Identity Theft
Business Identity TheftBusiness Identity Theft
Business Identity Theft
- Mark - Fullbright
 
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdfHow to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
Bahaa Abdulhadi
 
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com
 
Fighting financial crime with connected data
Fighting financial crime with connected dataFighting financial crime with connected data
Fighting financial crime with connected data
Connected Data World
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
Steve Mitchinson
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
amiable_indian
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
ClubHack
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse System
oldshaman
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
annmarieboyd
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
annmarieboyd
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Springboard
 
Identity Theft Protection. The Best Answer
Identity Theft Protection. The Best AnswerIdentity Theft Protection. The Best Answer
Identity Theft Protection. The Best Answer
forcesuccess
 
Life Lock Customer Selling
Life Lock Customer SellingLife Lock Customer Selling
Life Lock Customer Selling
Charles Seay
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
Christopher Uriarte
 

Similar to Half the Picture (20)

Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
 
Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for Businesses
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
RT_Corporate Fraud_NOV16
RT_Corporate Fraud_NOV16RT_Corporate Fraud_NOV16
RT_Corporate Fraud_NOV16
 
Business Identity Theft
Business Identity TheftBusiness Identity Theft
Business Identity Theft
 
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdfHow to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
 
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
 
Fighting financial crime with connected data
Fighting financial crime with connected dataFighting financial crime with connected data
Fighting financial crime with connected data
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse System
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft Protection. The Best Answer
Identity Theft Protection. The Best AnswerIdentity Theft Protection. The Best Answer
Identity Theft Protection. The Best Answer
 
Life Lock Customer Selling
Life Lock Customer SellingLife Lock Customer Selling
Life Lock Customer Selling
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
 

Recently uploaded

一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
74nqk8xf
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
kuntobimo2016
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
Lars Albertsson
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
mzpolocfi
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
aqzctr7x
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
g4dpvqap0
 

Recently uploaded (20)

一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
 

Half the Picture

  • 1. Probability Data  Breach  Cost The  Long  Long  Cyber  Risk  Tail Or Why  focusing  only on  security   controls  misses  half  the  picture!
  • 2. $0 $10 $20 $30 $40 $50 $60 $70 Likelihood  of  Breach  Cost Breach  Cost Millions Distribution for the possible cost of a data breach that exposed personal and financial data for 300,000 peopleand that was caused by a malicious outsider. This distribution is a prediction from a linear regression model trained upon a large number of data breaches, covering a large range of industries, incident types, data types and people affected. While the cost of most breaches is less than $10 Million dollars, a significant portion are much larger – the long long tail. 80%  Confidence  (80%  of   data  breaches  will  cost  less) 90%  Confidence  (90%  of   data  breaches  will  cost  less) 10%  of  breaches  fall  here – within  the  long  long  tail. What  is  the  Long  Long Cyber  Risk  Tail?
  • 3. Investigation Notification Call  center Remediation o Business  Loss o Damage  to  personal  credit o Theft  of  money  &  goods o Credit  card  replacement  costs Business  loss;  theft  of   money  &  goods Credit  monitoring  &   privacy  insurance. Fines  &  settlements Public  &  Other  BusinessesBreach  Company Mitigate Transfer   via  suits Breakdown  of  Data  Breach  Cost Total  Cost The  cost  of  a  security  firm  to  investigate  and   report  on  the  activities  of  a  malicious  intruder.   Legal  response  to  the  many  many  government   agencies  that  require  notification.
  • 4. $0 $10 $20 $30 $40 $50 $60 $70 Likelihood  of  Breach  Cost Breach  Cost Millions Variable  Costs  that   Dominate  the  Tail Investigation Notification Call  center Remediation Business  loss;  theft  of   money  &  goods Credit  monitoring  &   privacy  insurance. Fines  &  settlements Breach  Company
  • 5. Investigation Notification Call  center Remediation o Business  Loss o Damage  to  personal  credit o Theft  of  money  &  goods o Credit  card  replacement  costs Business  loss;  theft  of   money  &  goods Credit  monitoring  &   privacy  insurance. Fines  &  settlements Public  &  Other  BusinessesBreach  Company Mitigate Transfer   via  suits Make  sure  you  are  capturing  information   that  can  speed  the  investigation.  Engaging   a  security  firm  early  can  save  millions. Engage  a  law  firm  early,  negotiate  costs  and   be  prepared. Reduce probability of a lawsuit by engaging a law firm to review contracts and advertising promises. How  to  Control  Variable  Costs  that  Dominate  the  Tail
  • 6. Actions  to  Reduce  Your  Tail ü Engage  a  law  firm;  negotiate  notification  costs ü Strengthen  contracts  with  partners;  be  careful  with  advertised  promises. ü Engage  a  security  company,  instrument  your  enterprise,  negotiate   investigation  costs VivoSecurity  Inc.  Contact:  ThomasL@VivoSecurity.com ü Use a Cyber Loss Model to clarify potential loss; consider Insurance.