Learning Library

← Back to Library

Data Breach Costs and Security Essentials

Key Points

  • A data breach costs on average $4.35 million globally and $9.44 million in the United States, highlighting the huge financial risk of poor data security.
  • Effective data security starts with a governance framework that defines a data‑security policy, classification levels, and the specific protections required for each sensitivity tier.
  • Building and continuously updating a data catalog that maps where all data—including the most sensitive “keys to the kingdom”—resides is essential for discovery, protection, compliance, detection, and response.

Full Transcript

# Data Breach Costs and Security Essentials **Source:** [https://www.youtube.com/watch?v=UpkqXK0B2E0](https://www.youtube.com/watch?v=UpkqXK0B2E0) **Duration:** 00:14:42 ## Summary - A data breach costs on average $4.35 million globally and $9.44 million in the United States, highlighting the huge financial risk of poor data security. - Effective data security starts with a governance framework that defines a data‑security policy, classification levels, and the specific protections required for each sensitivity tier. - Building and continuously updating a data catalog that maps where all data—including the most sensitive “keys to the kingdom”—resides is essential for discovery, protection, compliance, detection, and response. ## Sections - [00:00:00](https://www.youtube.com/watch?v=UpkqXK0B2E0&t=0s) **Why Data Security Matters** - The presenter uses breach cost statistics—$4.35 M globally, $9.44 M in the U.S., and 83% of firms experiencing multiple breaches—to illustrate the urgency of data security and preview upcoming topics such as governance, discovery, protection, compliance, detection, response, and cost‑reduction strategies. - [00:03:07](https://www.youtube.com/watch?v=UpkqXK0B2E0&t=187s) **Data Discovery and DLP Strategy** - The speaker outlines moving from planning to discovery, emphasizing the need to locate both structured and unstructured sensitive data across databases, files, emails, and network traffic, and introduces Data Loss Prevention technology for real‑time protection. - [00:06:14](https://www.youtube.com/watch?v=UpkqXK0B2E0&t=374s) **Comprehensive Data Security Strategies** - The speaker outlines the need for quantum‑resistant encryption, strong access controls, reliable backups, and regulatory compliance to safeguard data against advanced attacks, ransomware, and disaster scenarios. - [00:09:16](https://www.youtube.com/watch?v=UpkqXK0B2E0&t=556s) **Detection and Response Overview** - The speaker outlines how monitoring, user behavior analytics, and alert generation enable the detection of data misuse, followed by case-based investigation as the response. - [00:12:22](https://www.youtube.com/watch?v=UpkqXK0B2E0&t=742s) **Five Strategies Cutting Breach Costs** - The speaker explains a data‑security ecosystem and then reveals the survey‑identified top five practices—AI‑driven detection, DevSecOps, incident response, cryptography, and an additional measure—that most reduce the financial impact of a data breach. ## Full Transcript
0:014.35 million. 0:039.44 million. 0:0583%. What do those numbers have to do with data security? 0:09I'll tell you in a minute. 0:11Welcome back to the Cyber Security Architecture series, where in the first few videos 0:15we talked about principles, fundamentals, about the various domains of cybersecurity. 0:20We covered identity and access. 0:21We looked at the endpoint, the network, applications in the last video. 0:26Today, we're going to talk about data security, which is what these numbers have to do with. 0:30So the first one, 4.35 million. 0:32Well, according to the Ponemon Institute, that's the average cost of a data 0:37breach worldwide. 0:41That's a lot of money every time somebody breaks in, 0:44that's what it's costing the organization on average. 0:46And by the way, that's taking out some of the really large numbers that might have skewed the average. 0:51So this is the baseline that we're looking at, 0:549.44 million--cost of a data breach 0:59in the US. Twice as much, 1:01if you're in the US, if you get hit with this. And 83%, what does that have to do with anything? 1:07That is the number of organizations that have been hit by more than one data breach. 1:12So this is answering the question "Why do we need to care about data security?" 1:17Now we're going to talk about in the rest of the video about some of these aspects, 1:21about governance, about discovery, about protection, compliance, detection, response. 1:26Hang around to the end. 1:27And I'm going to tell you the top five things that this survey found 1:31will reduce the cost of a data breach for you. 1:34So stay tuned for that. 1:36First of all, we're going to cover governance and discovery. 1:40So think of this as a data security ecosystem. 1:43We're going to fill this thing out. 1:44These are the technologies that go into allowing us to secure our data. 1:49First of all, we have to have some sort of governance plan. 1:53This is our way of saying this is what we want to do. 1:56If I don't define where the finish line is, I can expect people to end up there. 2:01So first of all, we're going to have a policy, a data security policy, and in that, 2:05we're going to spell out what kinds of things are sensitive and what kinds of things aren't. 2:09We're going to spell out a classification criteria 2:12that says this is keys to the kingdom and this is the lunchroom menu. 2:16Nobody needs to protect that. 2:17We don't really care, that sort of thing. 2:19We need to spell out that criteria. 2:21We need to also spell out what kinds of protections go with those different levels of sensitivity. 2:26So we may have confidential, unclassified. 2:29We may have super confidential, super top secret, super 2:33duper top secret, whatever your classification scheme is. 2:36But you need to spell out what those are. 2:38We can't expect the users in our company 2:41to protect the data if we haven't spelled out what those guidelines are. 2:45So it all starts with this governance policy classification. 2:48Build a catalog that tells us this is where the data is. 2:52This is where the really sensitive stuff is, and you want to know where that is all the time. 2:56We're going to be updating that as well. 2:59And then build a resilience plan that says if we lose data, how do we recover? 3:05So we'll talk a little more about that later as well. 3:07So that's the first stage is build the plan, then we're going to move into discovery. 3:12Now, I've said this is what I want to do to cover our data and protect it. 3:18Now let's go find where the data is. 3:20A couple of different places that we can look for data types--databases. 3:25That's where we expect that's going to be structured data in most cases. 3:30That's we're going to see a lot of the keys to the kingdom. 3:32But don't overlook this other area. 3:35Files, emails, spreadsheets, 3:37all kinds of other things that make up unstructured data. 3:41We need to be able to discover sensitive content in unstructured data as well. 3:46In other words, in places where we might not otherwise look. 3:49We expect the keys to the kingdom to be in the very sensitive database. 3:53But what if somebody makes a copy of that? 3:56What if somebody excerpts parts of it and emails it to someone? 3:59Now we've got sensitive data flying around a lot of other places, 4:03and I'd like to look on the network and see as this data is moving around as well, 4:08and maybe discover when there are certain types of issues that we could be running into. 4:13And one of those discovery things will help us in particular 4:17with a thing called data loss protection. 4:20So DLP is a technology that's important that allows us to discover this stuff 4:25in real time on various systems and as data is flowing across our networks. 4:31Okay. 4:32Now, we've covered the why of data security. 4:35These numbers down here should be sufficient motivation for you. 4:38How do we do governance and discovery, some of the general technologies there. 4:42Now, let's talk about protection and compliance. 4:45I figured out how I need to secure things and where the stuff is. Now 4:51how am I going to actually protect it? 4:53Well, encryption is a huge part of that. 4:56That is, I scramble the data so that only I can read it and the bad guys can't. 5:01And I need to be able to do that for data at rest. 5:03Like sitting in a database, for instance, or data at motion. 5:08Data that's in motion could be moving from one user to another, 5:11could be on a web server, and then being served up over across the Internet. 5:15So there's I wouldn't need to be able to keep the data secure all the time at rest 5:20and in motion if I'm going to be encrypting data. 5:23The other thing I need to be able to do a really good job of is managing the keys. 5:28If you lose the keys, you lose the data. 5:30So remember that we want to generate keys in a random way. 5:34If anyone can predict the way keys are generated, then all bets are off. 5:38They can read all your data. 5:39So it has to be done randomly and we need to be able to keep it. 5:43We also need to be able to keep up with the lifecycle of a key. That is, don't encrypt at once and forget it. 5:49It's not encrypt and forget, it's encrypt and then continuously follow the lifecycle and re-encrypt 5:55at appropriate times. 5:57We have keys that we rotate in and we rotate out. 6:00Another aspect of all this that you need to be paying attention 6:03to is this notion of quantum-safe crypto. 6:06Quantum computers are going to be able to break all of our existing cryptography in the next number of years. 6:12We don't know exactly when, but it's not that far off. 6:15And so we're going to need to keep an eye on this space right here so that we use new algorithms 6:20that will keep our data safe against the quantum threat that would be out there if someone had a quantum computer 6:26and started trying to crack all of our data that we had previously secured. 6:31Access control is another part of data security. 6:33Access control is also part of identity and access management, which was the first of the seven domains that we covered. 6:39But it relates here as well, because it doesn't matter how strong I've encrypted the information. 6:45If a user that has access to this set their password 6:49to the word "password", then it doesn't matter because they're getting in. 6:53If we don't have a good way of authenticating and authorizing users, 6:57then all of this strong crypto isn't going to matter. 7:01So access controls need to be there. Backup. 7:05If we face in particular a disaster recovery scenario or a ransomware 7:09type scenario where someone says, I've got your data and I'm not giving it back. 7:12Well, the best defense against that is saying, guess what, ransomware guy. 7:17I've also got a copy of my data and I'll just restore it and you can go pound sand. 7:22So this is the type of protection that we need 7:25not only to keep the data from prying eyes, but also keep the data 7:29so that we have a level of resilience that I mentioned earlier 7:33in case of attack or disaster or things of that sort. 7:37Also, I need to be able to ensure 7:40that I am complying to some of the industry regulations that might exist. 7:44The Generalized Data Protection Regulation in Europe, GDPR 7:48we have in the US, HIPAA for health care information. 7:51There are lots of regulations in lots of industries and lots of parts of the world. 7:56It's essentially, if you've got any information about somebody, 7:58there's a chance that you have would be subject to one of these regulatory requirements. 8:04So I need to be able to report on am I complying with that? Just as much, 8:09I need to be able to report when I'm not complying because if I don't know that, then one of the costs 8:14that goes into these data breaches are the fines that go along with it and with GDPR in particular. 8:19It's very substantial. 8:21And if you think because you're operating a company that's not in the in Europe, 8:25in the European Union, that you're exempt from this. 8:28Think again. 8:29If you've got European citizen data, even if you don't operate there, you could potentially be subject to that. 8:35Check with your lawyers to find out. 8:37And then a policy. 8:39I need an ability to retain records, but only as long as 8:43is necessary according to the law or other regulation. 8:46It really doesn't do us good to keep a lot of information and just store everything forever. 8:51So what we need to do, though, is the law will require that we store data for a certain period of time 8:57and we want to store it for that long and probably not longer because it gets more expensive. 9:01And the longer we're holding this data, the longer we're holding the burden 9:05that if in fact, we have one of these breaches, we could be held liable. 9:10So it's best not to have it in the first place if you don't really need it. 9:15Okay. 9:16Now, we've covered the first bunch of security protections that are needed 9:20about governance, about discovery and things of that sort. 9:24Now we're going to take a look at two more-- detection and response. Security is about prevention, detection and response. 9:30These first ones are mostly about the prevention. 9:32This is about the detection and response. Detection. 9:35Now, what does that involve? 9:37Well, I need to be able to monitor my systems and see how data is being used. 9:41How is it moving around my organization, who's using it, under what conditions? 9:46And in fact, I also may want to use a technology called user behavior analytics (UBA) 9:51that will monitor users and the way that they're looking at the data, 9:54if they're downloading normally a thousand files a day and suddenly they start 9:58downloading a million files in a day, then that could be suspicious. 10:03Or if someone who normally doesn't access certain data starts 10:06having a lot of interest in that data, then that could be an issue. 10:10If someone is doing something different than their peer group, then that could be an issue. 10:14So that's what user behavior analytics is looking for, those kind of cases. 10:18So we're trying to detect misuse and abuse of the data. 10:22And ultimately, I'm going to generate alerts that are going to go up to some console 10:26and someone then can go take an action on that. 10:29And the action is our response part. 10:31So one of the things I might do is open a case 10:34and then assign that case to someone and then they begin an investigation. 10:38We might guide all of those efforts with something called a dynamic playbook. 10:43A dynamic playbook would tell you, this is what just happened. 10:47Now you need to do the following steps. 10:49And based upon the results of those steps, I'm going to specify other steps for you to follow. 10:54So that's the dynamic nature of it, as opposed to just a 10:57a hardcoded script that someone follows. 11:00This is more like a dynamic script that they can follow. But it leads people through 11:05and allows them to automate the recovery 11:08and orchestration and automation of these problems. 11:12What's the difference between those two? 11:13In a perfect world, I'd automate all of my responses. 11:16But we don't live in a perfect world because we see a lot of these things 11:20that are first of a kind type of situations. A first of a kind, 11:24I can't automate because I don't know what I should have done because I've never seen it before. 11:28Orchestrate is what I have to do in a lot of these cases where basically 11:32I'm looking for certain things and I'm providing guidance, 11:35but like an orchestra, the conductor of the orchestra is conducting who's going to come in, 11:41when do the trumpets come in, 11:42when do the the saxophones come in. This sort of thing. 11:45They're going to basically direct all of this, and that's what we're going to do in our response. 11:51So think about those things. 11:52We're going to talk about these actually in more detail in our next two videos 11:56where we're going to talk about security monitoring and security response. 12:01Okay. 12:01Now we've done a quick flyover view of data security. 12:05We started off talking about governance, setting the plan and saying this is what we intend to do. 12:10And if we don't have that right, we can't expect to do the other parts right. 12:14Then we move into discovery, find out where all the data is that we need to apply those policies to. 12:20Then we're going to put those protections in place. 12:22Then we're going to check our compliance and see if, in fact we're doing what we intended to do. 12:28We're going to look for anomalies. 12:29Then we're going to respond when we find those and feed that information back into our policy. 12:35So the whole thing then becomes this ecosystem 12:38of data security, and it involves a lot of different technologies. 12:41So that's in general how we want to do this. 12:44And now what I told you is if you would stay to the end, 12:47I'm going to tell you the top five things and you can see them here already. 12:51So no need for a drum roll. 12:53But according to the cost of data breach survey, these were the top 12:57five things that reduced the cost of a data breach. 13:01Number one, I using artificial intelligence was top on the list. 13:06And in fact we started using AI a good deal already in this detect phase. 13:10You'll hear more about that in the future videos as we as we cover that in the next one. 13:16But you can expect to see AI be infused in all of these different spaces. 13:21So look for that moving forward. 13:23DevSecOps. That was a big part of the discussion in the previous video on application security. 13:28If you missed that, make sure you go back and check that out. 13:31But that breaks down the walls between dev[elopment], sec[urity] and ops organizations 13:35and put security in a shift left position. Incident response. 13:40We talked about that here. 13:41That's this response capability and it's going to be the subject of our video two videos from now. 13:47So again, stay tuned for that. Cryptography. 13:50We've talked about that here in this particular space. 13:53And as I said, if you can't encrypt the data, you can't protect it. 13:56And then ultimately employee training, 13:59because at the end of the day, it's not all about the technology. 14:02There's an end user and the user, the human, is 14:06almost always the weakest link in any security system. 14:09So don't ignore this part. 14:11If you do, it's at your own peril. 14:13Okay. There we go. 14:15Those are the top five things that you can do to reduce the cost of a data breach, 14:19to reduce the likelihood that it ever happens to you in the first place. 14:22Make sure you have a good plan for doing all of these things. 14:26All right. 14:26Now, in the next video, we will cover 14:29monitoring and then the following video security response. 14:33So make sure you stay tuned to check those out--[click] like, subscribe, 14:37and hit the notify button so you'll know and not miss any videos in the series.