The following quotes from page 14 –
“Though we do not assert that the full impact of a breach is limited to the number of records compromised, it is a measurable indicator of it.”
“There is not a linear relationship between frequency and impact; harm done by external agents far outweighs that done by insiders and partners. This is true for Verizon and for the USSS and true for this year and in years past … We could provide commentary to Figure 9, but what could it possibly add? If a chart in this report speaks with more clarity and finality we aren’t sure what it is.”
I’d like to see the PCI DSS and PII/PHI database breaches broken out from the other (information property, trade secret, national security) breaches. Looking at the data where they are detailed (p 41), there are not a whole lot of them. Based on the statement on page 18, viz:
”It is worth noting that while executives and upper management were not responsible for many breaches, IP and other sensitive corporate information was usually the intended target when they were.”
NPI/PII/PHI mandatory disclosure type breaches may be characterized by a different set of threats, impacts, frequencies, and require a differing set corresponding controls than the breaches associated with occupational fraud. Yeah, I said “fraud” not “insider.” And I’d like to keep on saying “fraud” until I’m comfortable that the internal controls over non-regulated data are targeted at management override rather than external organized crime. Is organized crime recruiting from the sysadmins and call centers? Or is the insider a fraud (corruption/breach of fiduciary duty) issue? Little help and we’ll all be safer.
(I personally believe in Solove’s assertion that management should have a fiduciary duty to the privacy of data, but from what I’ve seen, we ain’t there yet, and it is still all about compliance.)
“In over 60% of breaches investigated in 2009, it took days or longer for the attacker to successfully compromise data.”
Good thing it the follow up on page 50 struck me like a diamond, a diamond bullet right through my forehead:
Internal audit methods—both financial and technical—are the bright spot in all of this.
(Image of Roger Lee Hayden’s Moto2 Moriwaki Amerigasm courtesy Motorcycle News, American Honda and USA! USA! USA! because a) it is not wholly unlike a CRB600RR and CBR sounds like DBR, b) all information security can be seen as a metaphor for motorcycle roadracing (technology, engineering, empiricism, piloted by moody irrational egomaniacs who are only in it for the birds & booze) and c) it looks totally awesome! Porkchop better clean the clock of some euro trash come Indy what with big ol’ #34 plastered on the faring)
