What does the news media tell us about information security incidents? What would we see if we applied the methodology of the DBIR to publicly-reported security incidents?
successfully lures an executive to open an attachment. Once executed, malware is installed on the exec’s laptop, creating a backdoor. The attacker then accesses the laptop via the backdoor, viewing email and other sensitive data. The attacker then finds and accesses a mapped file server that an internal admin failed to properly secure during the build/deployment process. This results in intellectual property being stolen from the server…” 2nd – Decide on a schema
my industry? • Drive decisions – Where should I concentrate my efforts? • Prioritize controls – I’m in Healthcare and our laptops aren’t encrypted. Should I look at that? • Informing risk management – frequency/impact – Including your own real world data, you can tell a powerful story of why your plan makes sense and should be funded. How Can I Use This?