Inside the 2016 Verizon Data Breach Investigations Report
-
Upload
intel-security -
Category
Technology
-
view
970 -
download
0
Transcript of Inside the 2016 Verizon Data Breach Investigations Report
![Page 1: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/1.jpg)
.
.
Inside the 2016 Verizon Data Breach Investigations Report
Marc Spitler | Senior Manager, Verizon Security Research
Raj Samani | CTO for EMEA, Intel Security
![Page 2: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/2.jpg)
.
2
2016 Verizon DBIR Key Findings@Marc_Spitler
![Page 3: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/3.jpg)
© 2016 Data Breach Investigations Report
2016 DBIR Key Findings
• Cybercriminals are exploiting humans as weakest link, organized in approach
• Phishing tops list of increasing concerns
• 89 percent of all attacks involve financial or espionage motivations
• Three-pronged attacks used frequently across several incident classification patterns
• Risk management is key to safeguarding assets
3
![Page 4: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/4.jpg)
© 2016 Data Breach Investigations Report
2016 Data Breach Investigations Report
Data from
67contributors.
4
Ninth edition.
100Kincidents.
82countries.
2,260analyzed breaches.
![Page 5: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/5.jpg)
© 2016 Data Breach Investigations Report
Over 95% of breaches fit into just nine incident classification patterns.
5
![Page 6: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/6.jpg)
© 2016 Data Breach Investigations Report6
What happens next is determined by the attacker’s end game.
Many incidents share the same threat actions in the early stages of the attack.
![Page 7: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/7.jpg)
© 2016 Data Breach Investigations Report
They’ve got the right credentials.
7
63of confirmed data breaches
involved leveraging a weak,
default or stolen password.
%
![Page 8: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/8.jpg)
© 2016 Data Breach Investigations Report
Phishing still works.
30of phishing messages were opened.
8
%
13of targets went on to click
the attachment or link.
%
![Page 9: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/9.jpg)
.
Post-Compromise Fraud@Raj_Samani
![Page 10: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/10.jpg)
.
Payment Card Market Prices
10
Estimated per card prices for stolen payment card data
Price per payment card over time
![Page 11: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/11.jpg)
.
Payment card purchase options
![Page 12: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/12.jpg)
.
Login access for sale
![Page 13: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/13.jpg)
.
Login access to critical infrastructure systems for sale
![Page 14: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/14.jpg)
.
Identity information for sale
![Page 15: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/15.jpg)
.
We’ve only just begun… health records for sale
15
![Page 16: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/16.jpg)
.
Questions and Answers
The Hidden Data EconomyThe Marketplace for Stolen Digital Information
www.mcafee.com/us/resources/reports/rp-hidden-data-economy.pdf
2016 Data Breach Investigations Report
www.verizonenterprise.com/resources/reports/rp_DBIR_2016_Report_en_xg.pdf
Join Marc and Raj during a Twitter #SecChat on June 22, 12:00 p.m. - 1:00 p.m. PDT to discuss findings from the 2016 Verizon DBIR.
@Marc_Spitler @Raj_Samani
![Page 17: Inside the 2016 Verizon Data Breach Investigations Report](https://reader031.fdocuments.us/reader031/viewer/2022030305/5873816c1a28ab272d8b4e41/html5/thumbnails/17.jpg)
.
17