Upload
beyondtrust
View
36
Download
1
Embed Size (px)
Citation preview
Sources include: Verizon 2016 DBIR, IBM X-Force Threat Intelligence Report 2016, Verizon 2016 DBIR, CVE Details, Intel Guide to the Internet of Things, Cisco 2016 Cloud Consumption Study.
large organizations use twenty times as many
cloud-based services than IT is aware
of
EVIL LURKS IN THE SHADOWS6
Reasons toChange the Game
in VulnerabilityManagement
BREACHESCONTINUE TO RISE
NEW VULNERABILITIES PILE UP
average annual increase in the numberof confirmed breaches since 2013
number of new CVEsidentified in the past
5 years alone
51%
35,000
20x
OLDIES BUT GOODIES
age of one third of vulnerabilities activelybeing exploited
10 yrs old
MANY,MANY THINGS
200 bn number of devices
that will comprise the Internet of Things
by 2020
EXPLOITSWEAPONIZED FASTER
15 daysthreat actors are weaponizing
exploits 3x faster than a few years ago, leaving organizations exposed for months
Want to take your vulnerability management game to the next level? Download our latest white paper, Change the Game in Vulnerability Management, and discover how orchestrating your cyber defenses can keep you steps ahead of the bad guys.
www.beyondtrust.com/game-change