Verizon Threat Research Advisory Center MIB: Espionage Motivated Data Breaches

Logo
Presented by

John Grim, Dave Kennedy

About this talk

Espionage data varieties include Internal, Secrets, Credentials, and Classified. Protecting this data can be a challenge. The sheer size of an enterprise environment, number of assets, and the amount, formats, and locations of the data top the list of Espionage data breach challenges. We queried three years of DBIR data (2018-2020) to better understand Espionage data breaches. Specifically, we looked at Espionage data breaches for compromised data, threat actors, actor actions, victim assets, and asset attributes to see what the dataset tells us. Key takeaways Cyber Threat Landscape – Espionage data breach insights VERIS A4 Threat Model and Espionage data compromise Verizon security solutions to protect Espionage data and mitigate Espionage data breaches
Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (493)
Subscribers (62208)
We deliver the promise of the connected world. In today’s rapidly transforming environment, we integrate, secure and operate the networks, and mobile technologies that help businesses and governments around the globe expand reach, increase productivity, improve agility, and maintain longevity. Our solutions across Connectivity, Security and Advanced Business Communications are designed to help enterprises pursue new possibilities and create entirely new revenue streams – more efficiently than ever.