17
. . Inside the 2016 Verizon Data Breach Investigations Report Marc Spitler | Senior Manager, Verizon Security Research Raj Samani | CTO for EMEA, Intel Security

Inside the 2016 Verizon Data Breach Investigations Report

Embed Size (px)

Citation preview

Page 1: Inside the 2016 Verizon Data Breach Investigations Report

.

.

Inside the 2016 Verizon Data Breach Investigations Report

Marc Spitler | Senior Manager, Verizon Security Research

Raj Samani | CTO for EMEA, Intel Security

Page 2: Inside the 2016 Verizon Data Breach Investigations Report

.

2

2016 Verizon DBIR Key Findings@Marc_Spitler

Page 3: Inside the 2016 Verizon Data Breach Investigations Report

© 2016 Data Breach Investigations Report

2016 DBIR Key Findings

• Cybercriminals are exploiting humans as weakest link, organized in approach

• Phishing tops list of increasing concerns

• 89 percent of all attacks involve financial or espionage motivations

• Three-pronged attacks used frequently across several incident classification patterns

• Risk management is key to safeguarding assets

3

Page 4: Inside the 2016 Verizon Data Breach Investigations Report

© 2016 Data Breach Investigations Report

2016 Data Breach Investigations Report

Data from

67contributors.

4

Ninth edition.

100Kincidents.

82countries.

2,260analyzed breaches.

Page 5: Inside the 2016 Verizon Data Breach Investigations Report

© 2016 Data Breach Investigations Report

Over 95% of breaches fit into just nine incident classification patterns.

5

Page 6: Inside the 2016 Verizon Data Breach Investigations Report

© 2016 Data Breach Investigations Report6

What happens next is determined by the attacker’s end game.

Many incidents share the same threat actions in the early stages of the attack.

Page 7: Inside the 2016 Verizon Data Breach Investigations Report

© 2016 Data Breach Investigations Report

They’ve got the right credentials.

7

63of confirmed data breaches

involved leveraging a weak,

default or stolen password.

%

Page 8: Inside the 2016 Verizon Data Breach Investigations Report

© 2016 Data Breach Investigations Report

Phishing still works.

30of phishing messages were opened.

8

%

13of targets went on to click

the attachment or link.

%

Page 9: Inside the 2016 Verizon Data Breach Investigations Report

.

Post-Compromise Fraud@Raj_Samani

Page 10: Inside the 2016 Verizon Data Breach Investigations Report

.

Payment Card Market Prices

10

Estimated per card prices for stolen payment card data

Price per payment card over time

Page 11: Inside the 2016 Verizon Data Breach Investigations Report

.

Payment card purchase options

Page 12: Inside the 2016 Verizon Data Breach Investigations Report

.

Login access for sale

Page 13: Inside the 2016 Verizon Data Breach Investigations Report

.

Login access to critical infrastructure systems for sale

Page 14: Inside the 2016 Verizon Data Breach Investigations Report

.

Identity information for sale

Page 15: Inside the 2016 Verizon Data Breach Investigations Report

.

We’ve only just begun… health records for sale

15

Page 16: Inside the 2016 Verizon Data Breach Investigations Report

.

Questions and Answers

The Hidden Data EconomyThe Marketplace for Stolen Digital Information

www.mcafee.com/us/resources/reports/rp-hidden-data-economy.pdf

2016 Data Breach Investigations Report

www.verizonenterprise.com/resources/reports/rp_DBIR_2016_Report_en_xg.pdf

Join Marc and Raj during a Twitter #SecChat on June 22, 12:00 p.m. - 1:00 p.m. PDT to discuss findings from the 2016 Verizon DBIR.

@Marc_Spitler @Raj_Samani

Page 17: Inside the 2016 Verizon Data Breach Investigations Report

.

17