0 Results Found
            Back To Results
              White Papers

              Determining the True Costs of a Data Breach

              An In-Depth Look At The True Costs of a Data Breach With Tips To Reduce Risk and Impact

              According to the Identity Theft Resource Center, the number of data breaches tracked in the United States reached an all time high of 783 in 2014. This is a 27.5% increase over the number of breaches reported in 2013.

              The number of data breach incidents tracked in the United States since 2005 also hit a milestone of more than 5,000 and involved an estimated 675 million records.

              When an incident occurs, the natural reaction is to think about the short-term impact. Most companies focus on assessing the damage; developing a response; and securing funds to pay for fines, legal fees, consulting third parties, and consumer identity protection services. The real challenge is to mitigate risk to the organization from the long-term effects, such as class-action lawsuits, damage to brand reputation, erosion of consumer trust, and lost business opportunities. This paper takes an in-depth look at the true costs - both short and long term - of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.

              Recent high-profile breaches have resulted in executive shakeups and measurable breach costs as high as nine figures after insurance and deductions. However, calculating the intangible long-term costs is difficult due to the many variables that can negatively impact the bottom line. Organizations that have experienced recent data breaches are still in the process of uncovering these costs, such as: business opportunities lost due to the distraction of these crises, erosion of investor and consumer confidence, abnormal churn, and increased acquisition costs just to name a few. Before delving into these costs and how to assess and develop effective strategies, it's important to understand the nature of the threat.

              Like what you're reading ?
              Get instant access by completing the form below

              Select Role:

              • Board of Directors
              • CEO / CFO / COO
              • CISO / CSO
              • CIO / CTO
              • IT / IS / Security VP/Director
              • IT / IS / Security Manager
              • IT / IS / Security Staff
              • IT / IS / Non-Security
              • Risk / Legal / Compliance / Finance
              • Sales / Marketing
              • Press / Industry Analyst
              • Student

              Select Country:

              • Select an item

              Select State:

              • Select an item

              Select Annual Revenue:

              • ≥ $500M
              • $100-$499M
              • ≤ $100M

              Select Industry:

              • Banking
              • Business Services
              • Credit Union
              • Education
              • Finance
              • Government
              • Health Care (Non-Hospital)
              • Heavy Industry
              • Hospitality
              • Hospitals
              • Insurance
              • Legal
              • Manufacturing
              • Media
              • Membership Organizations
              • Retail
              • Technology
              • Telecom
              • Transportation
              • Utilities
              • Other

              Current Security Environment?:

              • Managing In-House
              • Managing Externally (3rd Party)
              • Blended Model (In-house and 3rd Party)
              • Not sure

              Select Next Security Initiative Timeframe:

              • 0-3 months
              • 3-6 months
              • 6-12 months
              • 12-24 months

              Select Our Greatest Security Challenge:

              • Securing The Cloud
              • Assessing security posture
              • Optimizing Security Operations
              • Protecting critical assets
              • Meeting & maintaining compliance
              • Preventing a data breach
              • Access to actionable security intelligence
              • Access to security expertise
              • Preparing & responding to an incident

              Interested in learning more

              Currently Looking for Assistance With (Select all that Apply)

              Select Best time to call:

              • Early morning (8-10am EST)
              • Late morning (10am-12pm EST)
              • Early afternoon (12-3pm EST)
              • Late afternoon (3-5pm EST)

              SecureWorks News :

              Related Content