Ok, preventable is one thing, but what about predictable?
That is the tougher argument to make in the board room, in my experience. The CxOs know that things can be prevented, but they are not phased unless the security team can accurately predict failures ahead.
In other words, you can tell someone they should prevent getting wet by carrying an umbrella but good luck expecting them to carry their umbrella unless you can convince them that there is more than a 70 percent chance of precipitation.
Some of the findings may be contrary to widely held beliefs, such as that insiders are responsible for most breaches. Key findings include:
* Most data breaches investigated were caused by external sources. Thirty-nine percent of breaches were attributed to business partners, a number that rose five-fold during the course of the period studied.
* Most breaches resulted from a combination of events rather than a single action. Sixty-two percent of breaches were attributed to significant internal errors that either directly or indirectly contributed to a breach. For breaches that were deliberate, 59 percent were the result of hacking and intrusions.
* Of those breaches caused by hacking, 39 percent were aimed at the application or software layer. Attacks to the application, software and services layer were much more commonplace than operating system platform exploits, which made up 23 percent. Fewer than 25 percent of attacks took advantage of a known or unknown vulnerability. Significantly, 90 percent of known vulnerabilities exploited had patches available for at least six months prior to the breach.
* Nine of 10 breaches involved some type of “unknown” including unknown systems, data, network connections and/or account user privileges. Additionally, 75 percent of breaches are discovered by a third party rather than the victimized organization and go undetected for a lengthy period.
* In the modern organization, data is everywhere and keeping track of it is an extremely complex challenge. The fundamental principle, however, is quite simple – if you don’t know where data is, you certainly can’t protect it.
I do not see any of these as a surprise. In fact, I think most security practitioners know these issues by heart. The opportunity is for those in the security space to now have third-party validation of their concerns. This is much cheaper than hiring a big-four audit firm for six figures and then trying to beat some sense into the inexperienced students they assign to your project so you can get a report similar to this one. Thank you Verizon!
American Banker uses this perspective
Here’s one the board of directors won’t want to hear: nine out of 10 corporate data breaches could have been prevented; this according to a report by Verizon Business that looked into 500 forensic investigations.
I disagree with this analysis, but I know why it happens. They employ a past-tense to the “prevention” as in “we could have prevented those losses”. That confuses the reality of security and risk management. If incidents have already happened, then (assuming impact is significant) a board of directors will want to hear why it happened and what will be done to prevent it again. However, and this is a big however, if these incidents have not happened yet then it is very likely the board will have absolutely zero interest in hearing about preventing them. The only caveat is if there is a high probability OR if there are regulations demanding that they take preventative action. If you can not speak to the predictability of risks, then the prevention of them becomes a moot topic at the executive level.