El costo real de los ataques ¿Cómo te impacta en ROI?

1
When Do Adversaries Call it Quits? The addional me to deter the majority of aacks is less than two days. The Myth of the Big Payout Many aackers are movated by economics, but actual earnings reveal a different reality. Does Crime Pay? Purely Economics Aackers say they are movated by earning potenal. Excellent IT Security Deters Adversaries 4 Days Past Their “Change Target” Point The average aacker only makes one quarter of what IT security pros make each year. Changing the Economics of Aacks Excellent IT Security doubles the me aackers need to plan and execute a successful aack The Path Forward? Sharing Threat Intelligence Sharing threat intelligence with peers is considered most effecve for prevenng aacks Read the full report: go.paloaltonetworks.com/ponemon 69 % 25 % Choosing Targets Most adversaries choose targets opportuniscally 72 % 39 % Aacks Can Be Thwarted by threat intelligence sharing $ 28,744 /annual earnings 70 hours 147hours i i Your Adversaries IT Security Professionals Aack on Typical IT Security Aack on Excellent IT Security $ 115,770 /annual earnings 60 % of aacks deterred 40 hours hours hours hours 20 36 % of aacks deterred 10 24 % of aacks deterred 5 13 % of aacks deterred THE REAL COST OF ATTACKS Prevent successful breaches by impacng aacker ROI.

Transcript of El costo real de los ataques ¿Cómo te impacta en ROI?

When Do Adversaries Call it Quits?The additional time to deter the majority of attacks is less than two days.

The Myth of the Big PayoutMany attackers are motivated by economics, but actual earnings reveal a different reality.

Does Crime Pay?

Purely EconomicsAttackers say they aremotivated by earning potential.

Excellent IT Security Deters Adversaries 4 Days Past Their “Change Target” Point

The average attacker only makes one quarterof what IT security pros make each year.

Changing the Economics of AttacksExcellent IT Security doubles the time attackers need to plan and execute a successful attack

The Path Forward? Sharing Threat IntelligenceSharing threat intelligence with peers is considered most effective for preventing attacks

Read the full report: go.paloaltonetworks.com/ponemon

69%

25%

Choosing TargetsMost adversaries choosetargets opportunistically

72%

39%

Attacks Can Be Thwartedby threat intelligence sharing

$28,744/annual earnings

70 hours

147hours

i i

Your Adversaries IT Security Professionals

Attack on Typical IT Security

Attack on Excellent IT Security

$115,770/annual earnings

60%of attacks deterred

40hours hours hours hours

20

36%of attacks deterred

10

24%of attacks deterred

5

13%of attacks deterred

THE REAL COSTOF ATTACKSPrevent successful breaches by impacting attacker ROI.