Download presentation
Presentation is loading. Please wait.
Published byKelley French Modified over 8 years ago
1
CHALLENGES OF MANAGING STATE DATA SYSTEMS
2
70CONTRIBUTINGORGANIZATIONS 79,790 SECURITY INCIDENTS 2,122 CONFIRMED DATA BREACHES 61 COUNTRIES REPRESENTED
6
Threat Actors: Virtually no change in overall proportion attributed to external, internal, and partner actors.
7
In 70% of the attacks where we know the motive for the attack, there’s a secondary victim. RAM scraping has grown in a big way. This type of malware was present in some of the most high-profile retail breaches.
8
23% OF RECIPIENTS NOW OPEN PHISHING MESSAGES AND CLICK ON 11% OF THEM For Two years, more than two-thirds of incidents that comprise the Cyber-Espionage pattern have featured phishing. 50% NEARLY 50% OPEN E-MAILS AND CLICK ON PHISHING LINKS WITHIN THE FIRST HOUR “One of the most effective ways you can minimize the phishing threat is through awareness and training”
9
COMMON VULNERABILITIES AND EXPOSURES (CVES) 99% OF THE EXPLOITED VULNERABILITIES WERE COMPROMISED MORE THAN A YEAR AFTER THE CVE WAS PUBLISHED
10
95% OF MALWARE TYPES SHOWED UP FOR LESS THAN A MONTH, AND FOUR OUT OF FIVE DIDN’T LAST BEYOND A WEEK These charts show the weekly average number of malware events for five industries: FinancialInsuranceRetailUtilitiesEducation VOLUME, VELOCITY, AND VARIATION
11
October 8, 2015 9:00 am – 4:00 pm St Alphonsus Regional Medical Center McCleary North Auditorium 1055 N Curtis Road Boise, Idaho 83706 Register today at: http//bit.ly/idcyber
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.