InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Verizon Threat Research Advisory Center MIB: Espionage Motivated Data Breaches

Presented by

John Grim, Dave Kennedy

About this talk

Espionage data varieties include Internal, Secrets, Credentials, and Classified. Protecting this data can be a challenge. The sheer size of an enterprise environment, number of assets, and the amount, formats, and locations of the data top the list of Espionage data breach challenges. We queried three years of DBIR data (2018-2020) to better understand Espionage data breaches. Specifically, we looked at Espionage data breaches for compromised data, threat actors, actor actions, victim assets, and asset attributes to see what the dataset tells us. Key takeaways Cyber Threat Landscape – Espionage data breach insights VERIS A4 Threat Model and Espionage data compromise Verizon security solutions to protect Espionage data and mitigate Espionage data breaches
Verizon Business

Verizon Business

78940 subscribers570 talks
Delivering the connected world. Simply. Securely. Reliably.
We deliver the promise of the connected world. In today’s rapidly transforming environment, we integrate, secure and operate the networks, and mobile technologies that help businesses and governments around the globe expand reach, increase productivity, improve agility, and maintain longevity. Our solutions across Connectivity, Security and Advanced Business Communications are designed to help enterprises pursue new possibilities and create entirely new revenue streams – more efficiently than ever.
Related topics