As a cloud solutions integrator, we are laser-focused on security. The Data Breach Investigations Report (DBIR) by Verizon is our favorite, single piece of research for keeping up-to-date. 2016 marks their 9th yearly edition and it is the largest DBIR ever. It examines over 100,000 incidents, including 2,260 confirmed data breaches across 82 countries. 67 contributing organizations provide data, including security service providers, law enforcement and government agencies.

Get the 2016 Industry Data for Yourself

[pullquote align=”full” cite=”” link=”” color=”#1D428A” class=”” size=””]
[/pullquote]

Our Take: Where to Start?

Here are the top three statistics from the report that we find the most critical for stakeholders to be aware of:

  1. Hacker Motive: It’s about the money. 80% of beaches had financial motive. Established and Fortune 1000 companies are targeted daily.
  2. Time to Discovery: In 93% of breaches attackers take minutes or less to compromise systems. Only 20% of breaches are discovered within days. 80% of breaches take weeks, months. 7% even take years or longer to discover. Why? Security teams are looking through complex, traditional log tools manually.
  3. Phishing: Humans are not firewalls. We are are the easiest target for point of intrusion to an IT environment. 30% of phishing emails are opened. 12% of targets ultimately click the link or attachment. With such a large infrastructure one weak entry point makes you vulnerable.

 

 Badguyquicker 1-60819

 

All of the above are a summation of three main issues. First, CISOs are frozen. Cybersecurity strategies, skills, and technologies are complex. Second, there is an illusion of safety. Traditional SIEMs rely on an out-dated security rules framework. Third, the status quo is broken. Approaches are inflexible, narrow, and reactive.

Our Answer: Take Control with Real-Time Visibility

When a breach happens, organizations need a real-time, wide angle lens to get visibility immediately. The machine data platform Splunk can help.

[pullquote align=”full” cite=”” link=”” color=”#C0E86C” class=”” size=””][/pullquote]

 

So, How Credible is Splunk?

Great question. Gartner placed Splunk in the leaders quadrant and positioned Splunk furthest overall for “completeness of vision” for Security Information and Event Management (SIEM). Splunk received the highest scores for each use case in the Critical Capabilities: Basic Security Monitoring 4.2, Advanced Threat Detection 4.17 and Forensics and Incident Response 4.18 of 5.

Click Gartner’s Magic Quadrant for SIEM below to see the research findings.

[pullquote align=”full” cite=”” link=”” color=”#7FA9AE” class=”” size=””] Magic Quadrant[/pullquote]

Own your organization’s outcome. Embrace early detection, rapid response, and augment a culture committed to tearing down silos and teamwork. Start the journey here by incorporating analytics strategies and toolsets as soon as possible. Did the Executive Summary pique your interest to learn more? Get the 85 page Full 2016 Data Breach Investigations Report.

Sources:

  • Gartner “Magic Quadrant for Security Information and Event Management” by Kelly M. Kavanagh, Oliver Rochford, Toby Bussa, August 10, 2016
  • Verizon (2016). Data Breach Investigations Report. Retrieved from: http://www.verizonenterprise.com/DBIR/2016/
  • Splunk. (2014, February 19). Splunk For Security Vs. SIEM [Video file]. Retrieved from https://www.youtube.com/embed/h2_MiD9OC_8