Learning Library

← Back to Library

Rising Costs of Data Breaches

Key Points

  • The IBM Cost of a Data Breach survey shows the average breach now costs about $4.9 million globally (roughly $10 million in the U.S.), a 10% increase over the previous year, and the figure has been trending upward over time.
  • Data is described as the “lifeblood” of modern enterprises; losing it can erode intellectual property, brand reputation, and customer trust.
  • The findings are based on a rigorous methodology that includes interviews with roughly 3,500 people across 600 organizations, marking the 19th consecutive year IBM has conducted the study.
  • Costs vary significantly by industry, with some sectors experiencing substantially higher breach expenses than others.
  • The video promises to share real‑world lessons and practical recommendations for reducing breach impact and controlling these rising costs.

Full Transcript

# Rising Costs of Data Breaches **Source:** [https://www.youtube.com/watch?v=c1K6bw5ATzk](https://www.youtube.com/watch?v=c1K6bw5ATzk) **Duration:** 00:14:24 ## Summary - The IBM Cost of a Data Breach survey shows the average breach now costs about $4.9 million globally (roughly $10 million in the U.S.), a 10% increase over the previous year, and the figure has been trending upward over time. - Data is described as the “lifeblood” of modern enterprises; losing it can erode intellectual property, brand reputation, and customer trust. - The findings are based on a rigorous methodology that includes interviews with roughly 3,500 people across 600 organizations, marking the 19th consecutive year IBM has conducted the study. - Costs vary significantly by industry, with some sectors experiencing substantially higher breach expenses than others. - The video promises to share real‑world lessons and practical recommendations for reducing breach impact and controlling these rising costs. ## Sections - [00:00:00](https://www.youtube.com/watch?v=c1K6bw5ATzk&t=0s) **IBM Data Breach Cost Overview** - The speaker introduces IBM's annual Cost of a Data Breach survey, highlighting the average $5 million breach cost, the study’s methodology involving 600 organizations and 3,500 interviews, and previews key findings, lessons, and recommendations for protecting enterprise data. - [00:03:02](https://www.youtube.com/watch?v=c1K6bw5ATzk&t=182s) **Data Breach Costs by Sector** - The speaker outlines average breach costs across the top sectors—energy, technology, industrials, financial and health care (peaking at $9.8 M)—and highlights staffing shortages and unmanaged shadow data as key challenges driving those figures. - [00:06:10](https://www.youtube.com/watch?v=c1K6bw5ATzk&t=370s) **Complexity Fuels Costly Data Breaches** - The speaker stresses that prolonged breach containment—especially for identity credential incidents averaging 292 days—escalates costs, and advocates simplifying security systems via the KISS principle to mitigate expenses. - [00:09:16](https://www.youtube.com/watch?v=c1K6bw5ATzk&t=556s) **Mitigating Breach Costs Through Trust, Verification, and Training** - The speaker outlines how limited budgets and talent drive reliance on AI, stresses the need to “trust but verify” third‑party and cloud providers, and highlights employee training as a key strategy to lower data‑breach expenses. - [00:12:21](https://www.youtube.com/watch?v=c1K6bw5ATzk&t=741s) **Strengthening Identity, Data, and Response** - The speaker outlines key tactics—multifactor authentication, passkeys, data discovery and posture management, visibility dashboards, and involving law enforcement—to reduce breach impact and ransom costs. ## Full Transcript
0:00Your data is really expensive. 0:03How much? 0:03Well, consider: according to IBM's annual cost of a data breach survey, 0:08we found it's on the order of $5 million 0:11every time there's a data breach. 0:13That's the average. 0:14So if you're looking at a bell curve, that's the stuff here. 0:17That means there are plenty more 0:18that are actually a lot more than that. 0:20Well, in this video we're going to take a look at 0:22what were the findings from that survey. 0:25And we've run it many years. 0:26And we're going to take a look at some lessons learned 0:29from real world data breaches 0:31and ultimately some recommendations of what you can do 0:33to guard against this and mitigate this cost. 0:38Data is the lifeblood of a modern enterprise. 0:41If you lose it, you lose your competitive edge. 0:43You could, for instance, lose your intellectual property. 0:46You could lose things like your company's reputation. 0:50And ultimately, you can lose these folks ... customers. 0:54You don't want to lose those. 0:55So it's really important that we not lose that information, 0:59that we're able to maintain that and keep it secure. 1:02So that's why IBM has conducted, for the 19th year in a row, 1:07the Cost of a Data Breach survey. 1:10And we produce a report which you can take a look at 1:13in detail and see those findings. 1:15In this video, we're going to take a look at what some of those major findings were. 1:19And to give you an idea of the methodology behind this. 1:22They actually went out and talked to about 600 organizations 1:27and interviewed in the range of 3500 people. 1:31So there was a lot of work that goes behind this, a lot of data. 1:35I don't want you to think that they just went and cherry picked a few people. 1:39These are all people that experienced real world data breaches. 1:42So when we talk about what the survey tells us, it tells us a lot. 1:46It tells us what real world data breaches actually were like. 1:51Okay, let's take a look at the cost and see what the trend has been over time. 1:55If we look at the last number of years, 1:57you can see generally the trend is working its way up. 2:00Not a huge surprise. 2:01Everything's more expensive. 2:02It turns out your data is as well. 2:05Last year we were at about 4.5 million 2:08on average for a data breach worldwide. 2:10Well, this year I have some bad news to report. 2:14We're now at about 4.9 million, which is an increase of around 10%. 2:21So that's not what we want to see happen. 2:23We'd like to see these costs going down. 2:25But they're not, they're continuing to increase. 2:27Oh and by the way, 2:29if you think that's a tolerable number, if you're in the U.S., 2:32you can pretty much multiply it by two 2:35because the U.S. numbers are about twice this. 2:38So again, not really what we want to see. 2:40We'd like to see these numbers come down. 2:42We'll talk later in the video about what we could be doing 2:45that will actually contribute to that. 2:47But let's also take a look at this from an industry perspective. 2:50Were there are certain industries that did better or did worse? 2:53Or that it was more expensive or less expensive? 2:56Based upon if their data was breached. 2:59Well, we'll start off with with the first. 3:01These are the top five. 3:02By the way, there are others that were lower than this. 3:05But if we're looking at just the top five at 5.3 million, 3:09that's where you're going to see the energy sector. 3:12At 5.5 million, just a little bit up from that, 3:16that's where you're going to see the technology sector. 3:18And then up from that, the industrials, 3:21industrial area 5.6 million per data breach. 3:26Then as we're building financial comes in at 6.1. 3:31Now who was the winner? 3:33Well, I don't know, maybe loser. 3:35But if you look at this way up here 3:38at 9.8 is where the health care industry came in. 3:42So information in that space is really important. 3:46And it's reflected in the numbers here. 3:50So what were the challenges that contributed to those kinds of numbers? 3:53Well, it turns out staffing shortage was a big one. 3:56That is, we've got these folks on board. 3:59But how about the others that we don't have? 4:01It turns out that a lot of organizations, in fact, more than 50%, 4:06reported staffing shortages 4:08as one of the major challenges that was contributing. 4:10That number is up 26% from last year's report. 4:14So that's not trending in the right direction. 4:17Another one. 4:18Let me ask you, do you know where your data is really? 4:21Well, you might know about this, 4:23but this other stuff, 4:24the shadow data where somebody has made a copy of the data, 4:27or maybe they created new data and didn't tell you about it, 4:30and yet it's still sensitive. 4:32And if this gets compromised, we're still in trouble. 4:35Well, that's an area that also turned out to be a challenge. 4:38And in fact, this area is not going to get better, I expect. 4:42When we start adding AI into the picture, we're going to see AI models 4:47that will be shadow versions as well, 4:49and we're going to need to discover those also. 4:51So keep an eye on that. 4:53How about some of the causes, 4:54the attack vectors, the top attack vectors. 4:57The top two were in fact the same as they were last year. 5:00It was phishing. 5:03And it was credential theft. 5:07And in fact, if you think about it, 5:08a lot of phishing attacks are really about stealing credentials anyway. 5:11So very similar that those two things came out. 5:14Number one, a lot of other things that contributed. 5:17And you can look at the report to see the details of other 5:20aspects that were exploited in this. 5:23But these were the two that stood out. 5:25So if we want to make a big difference, 5:27obviously we need to focus here. 5:29And what is that? 5:30That's all about identity and access management, 5:33at least the credential part. 5:35Okay, let's take a look at one other aspect 5:37where we actually saw a little bit of good news, but it wasn't a great deal. 5:42Nothing really to write home about. 5:43Meantime to Identify - 5:45how long does it take for you to figure out 5:47that the bad guy is in your system? 5:49That number has remained about the same for the last decade or so. 5:54It's about 200 days, which is way too long. 5:57Meantime to Contain - actually get the problem taken care of. 6:00That has remained at about 70 days. 6:03So you look at those together and you end up with about 270 days, 6:08which is about three fourths of a year. 6:11That is way too long. 6:12And again, that's the average. 6:13That means that there are a number of these that are taking well beyond that, 6:18maybe more than a year before we realize and get the situation contained. 6:23That's an intolerable situation, I think, going forward. 6:26And we found that if, in fact, the cause of the data breach 6:29was dealing with these identity credentials, 6:32that the number was actually even higher, it was 292 days. 6:36So let's focus on these kinds of things 6:39and we'll take a look at some recommendations. 6:42Okay, enough of the gloom and doom. 6:44How about a little sunshine? 6:45What can we do to improve the cost of a data breach? 6:48Well, it turns out there were three things that the report told us 6:52based upon the real world data that were lessons learned, 6:55that told us these are the things that actually contribute 6:58to the cost of a data breach and make it worse. 7:00And I'm going to give you five things, and then even a few bonus topics 7:04that will decrease the cost of the data breach. 7:06So stay through till the end. 7:09Number one on this list was complexity. 7:12Complexity of the security system. 7:15It turns out complexity is the enemy of security. 7:18So whatever we can do to follow what I refer to as the KISS principle: 7:23"Keep It Simple, Stupid". 7:25That's going to be to your benefit. 7:26Make the system as simple as you possibly can. 7:29Let me give you an example of what I mean by that. 7:32Let's take a look at in the identity and access management space. 7:35What typically happens in organizations is we will have 7:39a different identity management system directory, what have you. 7:43For each application or at least for a few different applications, 7:46different OS's and so forth. 7:48So that means I need an administrator for each one of these 7:52that is not following the KISS principle. 7:55This would be simplifying 7:57is if I put a layer here for identity and access management above. 8:01Then I can have an administrator up here 8:05who administers all of these systems 8:07through a central console, through a common interface. 8:11And then maybe I don't need as much of this. 8:14I can use those people on other areas where their skills are best utilized. 8:20The same thing applies in the data space. 8:22So if I've got data security, well, 8:24I'm securing each one of these databases using the native access control capabilities. 8:29But what if instead I use a common data security layer? 8:35Then I could have an administrator up here who administers through that, and then it pushes all these out. 8:42And again, it allows me to reduce the the impact that I have 8:47where I don't have enough staffing 8:48and it gives me a more consistent, more simple interface. 8:52So keep that in mind as a possibility. 8:55What else? 8:56Well, the skills shortage I mentioned that earlier. 8:59Turns out the skills shortage is causing the cost of a data breach to go up. 9:03So again, if I can do things here, 9:05it mitigates a lot of what would be otherwise a particular issue. 9:10Now, in a perfect world, I'd just hire more people. 9:13But we're not going to be able to hire all the people we want. 9:17We don't have the money to for it, 9:18and there are not enough skilled people out there. 9:21So what else could we do? 9:22Well, let's see what AI and automation can do for us. 9:26More on that later. 9:28Another thing that contributed to the cost of a data breach in a big way 9:31was third party issues. 9:34That is when you connect your system into others. 9:37You also inherit some of the risk that goes along with their systems. 9:41You might do a perfect job of security, 9:43but if they don't, you get to now downstream. 9:46Bring in all of the problems that they have as well. 9:49And we found that was a major area that was contributing to cost. 9:53So what should you do about that? 9:55Well, trust but verify. 9:57I need to go in and make sure that everything they're doing 10:00that they said that they're doing in their security as much as possible. 10:03I need to verify that that's the case. 10:05Make sure that their policies match my policies, 10:07their expectations, my expectations, and so forth. 10:11So that's a big area as well. 10:12And one of those third parties could in fact be your cloud provider as an example. 10:17All right. 10:17What are the things that we could do that will actually contribute 10:20to bringing the costs down. 10:22Those are the things that contributed to making it go up. 10:25So we'll look at the flip side of this. 10:26Well, number one on the list was employee training. 10:31This was maybe a little bit of a surprise for a lot of people, 10:34but training your employees so that they become part of your security system 10:39and not another weak link can make a big difference. 10:42What else could we do? 10:43Well, we could also, as I said before, use more AI and automation. 10:50And what the report showed us is that organizations that do that. 10:54We're able to save, in the order of $2.2 million on the cost of a data breach. 11:00That's significant. 11:01If the overall number is about 4.9, 11:04and you're able to save this much 11:06by doing any particular thing, that's a big difference. 11:09So that's a $2.2 million savings by organizations 11:13that had extensive use of automation in AI a 11:16s compared to those who didn't. 11:18So this is a big one that can make a huge difference, as we see. 11:21Having a good security information and event management system 11:25in place is important. 11:27You can't secure what you can't see. 11:29So you need a system that monitors 11:31all the different things that would be out there. 11:33So a good SIM helps you with that 11:36Incident Response Planning: that is, knowing in advance 11:41where the fire extinguisher is 11:42so that you're not searching for it at the moment that your hair is on fire. 11:46That's the way you want to approach this. 11:48So you want to plan out what all the contingencies would be 11:51and make sure that you have the plans, the tools, the processes all in place 11:55and you know how to do it in that moment when it occurs. 11:58And then obviously, if we're talking about data that is sensitive, encrypt it. 12:06That way, if someone does get into your system and copies that out, 12:10well, they can only do so much with it because it's encrypted. 12:12Hopefully you've encrypted it well and it will still be covered for you. 12:16So those are the kinds of things that make a lot of sense for us to do. 12:22But what else could we do? 12:24I told you I would give you some bonus topics in this space as well. 12:28Well, some other things that turned out to be very important. 12:31I mentioned earlier that credentials were a big part 12:34of what was causing these data breaches to occur. 12:36So whatever I can do to improve my identity and access management 12:40would make a big difference. 12:42What kinds of things could we do there? 12:44Well, how about multifactor authentication? 12:47How about using pass keys? 12:49Those are the kinds of things that if I use pass keys, 12:52no one can steal my password because I don't have one in the first place. 12:56And if you say, well, I'll just steal a passkey. 12:58Take a look at the video I did on Passkeys 13:00and you'll see how much more difficult something like that would in fact be. 13:04What are some other things you could do? 13:06How about data security? 13:07Posture management? 13:09Know where all your data is. 13:10Discover it all. 13:11Especially in cloud instances that shadow data that I mentioned earlier. 13:16We need to know where it is or we can't secure it. 13:19Also, I want to be able to make sure that I have the controls in place o 13:23nce I've found it, and that we've automatically verified that. 13:26And we have a dashboard that shows us all of that visibility. 13:29Very important. 13:30And then ultimately leverage law enforcement. 13:34It turns out that the organizations that did 13:36that two thirds of them that brought in law enforcement 13:42in a ransomware case, paid - are you ready for this? 13:46$0 in ransom. 13:48That's a nice number. 13:50So it's not a guarantee, 13:52but it certainly puts the odds in your favor if you have a ransomware attack. 13:56This reduces the likelihood, and it turns out 13:58it also reduce the cost of a data breach. 14:02So there you go. 14:03The cost of a data breach, unsurprisingly, is up. 14:06But the good news is there are some things you can do 14:09to lessen those costs and lessen your risk. 14:12Take a look at the full report and you can learn more. 14:15If you like this video and want to see more like it, 14:18please like and subscribe. 14:19If you have any questions or want to share your thoughts about this topic, 14:23please leave a comment below.