0 Results Found
              Back To Results
                White Papers

                Determining the True Costs of a Data Breach

                An in-depth look at the true costs of a data breach with tips to reduce risk and impact

                According to the Australian Cyber Security Centre 2016 THrea Report, the number of cyber incidents responded to by CERT Australia between July 2015 and June 2016 was 14,804.

                This is a 25% increase over the number of breaches reported in the previous 12 month period.

                When an incident occurs, the natural reaction is to think about the short-term impact. Most companies focus on assessing the damage; developing a response; and securing funds to pay for fines, legal fees, consulting third parties, and consumer identity protection services. The real challenge is to mitigate risk to the organisation from the long-term effects such as, damage to brand reputation, erosion of consumer trust, and lost business opportunities. This paper takes an in-depth look at the true costs - both short and long term - of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.

                Recent high-profile breaches have resulted in executive shakeups and measurable breach costs as high as nine figures after insurance and deductions. However, calculating the intangible long-term costs is difficult due to the many variables that can negatively impact the bottom line. Organisations that have experienced recent data breaches are still in the process of uncovering these costs, such as: business opportunities lost due to the distraction of these crises, erosion of investor and consumer confidence, abnormal churn, and increased acquisition costs just to name a few. Before delving into these costs and how to assess and develop effective strategies, it's important to understand the nature of the threat.

                Like what you're reading ?
                Get instant access by completing the form below

                Select Role:

                • Board of Directors
                • CEO / CFO / COO
                • CISO / CSO
                • CIO / CTO
                • IT / IS / Security VP/Director
                • IT / IS / Security Manager
                • IT / IS / Security Staff
                • IT / IS / Non-Security
                • Risk / Legal / Compliance / Finance
                • Sales / Marketing
                • Press / Industry Analyst
                • Student

                Select Country:

                • Select an item

                Select State:

                • Select an item

                Select Annual Revenue:

                • > 1000
                • 501 - 999
                • < 500

                Select Industry:

                • Banking
                • Business Services
                • Credit Union
                • Education
                • Finance
                • Government
                • Health Care (Non-Hospital)
                • Heavy Industry
                • Hospitality
                • Hospitals
                • Insurance
                • Legal
                • Manufacturing
                • Media
                • Membership Organizations
                • Retail
                • Technology
                • Telecom
                • Transportation
                • Utilities
                • Other

                Current Security Environment?:

                • Managing In-House
                • Managing Externally (3rd Party)
                • Blended Model (In-house and 3rd Party)
                • Not sure

                Select Next Security Initiative Timeframe:

                • 0-3 months
                • 3-6 months
                • 6-12 months
                • 12-24 months

                Select Our Greatest Security Challenge:

                • Securing The Cloud
                • Assessing security posture
                • Optimizing Security Operations
                • Protecting critical assets
                • Meeting & maintaining compliance
                • Preventing a data breach
                • Access to actionable security intelligence
                • Access to security expertise
                • Preparing & responding to an incident

                Interested in learning more

                Currently Looking for Assistance With (Select all that Apply)

                Select Best time to call:

                • Early morning (8-10am)
                • Late morning (10am-12pm)
                • Early afternoon (12-3pm)
                • Late afternoon (3-5pm)

                SecureWorks News :

                Related Content