Learning Library

← Back to Library

The Real Price of Data Breaches

Key Points

  • Security spending should be justified by the true costs of breaches—downtime, reputational damage, and lost trust—rather than just budget constraints.
  • IBM’s 2025 Cost of a Data Breach Report surveyed 600 breached organizations and 3,500 leaders, providing real‑world insights rather than theoretical estimates.
  • The average global cost of a breach fell 9% to **$4.44 million**, a realistic figure that excludes extreme outliers that would skew the mean.
  • Mean Time to Identify (MTI) and Mean Time to Contain (MTC) together improved modestly, dropping from **257 days to 241 days**, indicating progress but still leaving organizations vulnerable for many months.
  • Although the trend shows incremental gains, the report underscores that most breaches are preventable and that data‑driven security investments remain essential.

Full Transcript

# The Real Price of Data Breaches **Source:** [https://www.youtube.com/watch?v=7ypI1oojoII](https://www.youtube.com/watch?v=7ypI1oojoII) **Duration:** 00:15:14 ## Summary - Security spending should be justified by the true costs of breaches—downtime, reputational damage, and lost trust—rather than just budget constraints. - IBM’s 2025 Cost of a Data Breach Report surveyed 600 breached organizations and 3,500 leaders, providing real‑world insights rather than theoretical estimates. - The average global cost of a breach fell 9% to **$4.44 million**, a realistic figure that excludes extreme outliers that would skew the mean. - Mean Time to Identify (MTI) and Mean Time to Contain (MTC) together improved modestly, dropping from **257 days to 241 days**, indicating progress but still leaving organizations vulnerable for many months. - Although the trend shows incremental gains, the report underscores that most breaches are preventable and that data‑driven security investments remain essential. ## Sections - [00:00:00](https://www.youtube.com/watch?v=7ypI1oojoII&t=0s) **Rethinking Security Investment Costs** - The speaker urges firms to base security spending decisions on IBM's 2025 Cost of a Data Breach Report, emphasizing that while breach costs have dropped 9%, the hidden downtime, reputation loss, and preventable incidents make under‑investment riskier than overspending. - [00:03:05](https://www.youtube.com/watch?v=7ypI1oojoII&t=185s) **Rising US Data Breach Costs** - The speaker notes that U.S. data breach expenses have jumped 9% to roughly $10‑22 million—nearly twice the global average—due to higher regulatory fees and detection costs, while also introducing AI‑related insights in the latest report. - [00:06:10](https://www.youtube.com/watch?v=7ypI1oojoII&t=370s) **Third-Party Risk and AI-Driven Phishing** - The speaker highlights third‑party access and phishing—particularly AI‑enhanced phishing—as the most costly and frequent attack vectors, urging improvements in both technology and employee training. - [00:09:13](https://www.youtube.com/watch?v=7ypI1oojoII&t=553s) **AI‑Driven Security Cuts Costs** - While many firms lack clear success metrics, those leveraging AI for security see incident response times drop by 80 days and savings of about $1.9 million, highlighting the need for stronger identity and access management. - [00:12:19](https://www.youtube.com/watch?v=7ypI1oojoII&t=739s) **Uncovering and Safeguarding Shadow AI** - The speaker stresses the necessity of automated discovery of hidden AI applications and sensitive data, followed by comprehensive security measures—model testing, protection against prompt‑injection attacks, strong IAM controls, and encryption—to secure data, models, and usage. ## Full Transcript
0:00How many times have you heard this? 0:02We really can't afford to spend that much on security. 0:05Maybe instead, we should be asking ourselves 0:07if we can afford not to. 0:09After all, it's not just about dollars. 0:12It's downtime. Reputation. Lost trust. 0:15And the fact is that many of these breaches are preventable. 0:18But let's face the decision regarding security investments 0:21on actual numbers rather than just gut feel. 0:24The good news is that we have the information that can help guide 0:28those decisions in the form of IBM's 2025 Cost of a Data Breach Report. 0:33In this video, we're going to take a look at some of the key 0:36findings from the report and lessons learned 0:39that you can apply to your own environment. 0:41So stay tuned. 0:43Okay. 0:44What did the 2025 report tell us? 0:47Well, first of all, a little bit of background on this. 0:50We went out and talked to 600 different organizations 0:55that actually experienced a data breach. 0:57So this is not theoretical. And interviewed 1:00approximately 3,500 leaders from those organizations. 1:05So, these are people with direct knowledge, 1:08firsthand knowledge of what occurred. 1:10And those are the ones who can tell us 1:12and give us these insights that we're looking for. Okay. 1:14What did the report tell us? 1:17Drumroll, please. 1:18Let's take a look. 1:20Cost of a data breach. 1:21The actual number. 1:23Raw numbers. 1:24And we've got a little bit of good news 1:25and a little bit of bad news to counteract it. 1:27First of all, the good news. Worldwide, 1:30the cost of a data breach number 1:32actually went down 9%. 1:35So, congratulations world. 1:37We did a little better. Um, 1:39and that number was 4.44 million dollars as 1:45the average cost of the data breach. 1:47So, that's big breaches, small breaches. 1:50By the way, in the report, 1:51we always take the really mega breach, the really huge numbers. 1:54We take those out because they would skew the average. 1:57So, this is a realistic average when you get a number like that. 2:00Another thing that I thought was really encouraging. 2:02It's something that I've watched over the years, 2:05is the numbers that relate to 2:07mean time to identify and mean time to contain. 2:11So, this is how long. 2:13If uh the bad guy broke into your house, how long is he in there? 2:17That's mean time to identify 2:18before you realize that you've, in fact, got somebody living in your house. 2:22And then meantime to contain is how long does it take 2:24'til you get him out of the house? Well, 2:27these numbers actually improved a little bit, 2:29and we've seen a little bit of improvement over the last bunch of years. 2:32I'm going to tell you, they're still not great, but it's an improvement. 2:36So, if we look back, uh say 4 or 5 years ago, 2:39this number combined was about 2:42257 days for mean 2:44time to identify and then contain. 2:47Most of that time is on the identify side. 2:50But, in the most recent report, 2:52we moved down to 241 days. 2:55Now you say, well, that's not a huge improvement, 2:58but hey, we'll take small victories at this point and keep chopping away at this. 3:02Bottom line is there's still work that needs to be done. 3:05That's not acceptable. To have the bad guy in your environment 3:09and doing what they're doing, 3:10and us not be in control of that situation for 241 days. 3:14That's again, still the better part of a year. 3:16But, keep up the faith. 3:18We're we're doing some good work here. Now, 3:20a little bit of bad news. 3:22Okay, folks in the US. We 3:24need to do better. 3:26Uh, the number here was up 9% in terms of cost. 3:30So it was 9% more expensive than it used to be. 3:33And the cost of a data breach in the US 3:34has always run higher than the rest of the world. Well, 3:37now it's even higher still. 3:39So, we're in the range of two point 3:42or 10.22 million dollars. 3:45That's a really big number. 3:46So, you're looking at a number that's almost twice what the worldwide average is. 3:50And this number is continuing to grow. 3:53Now why was it more expensive? Um. There's 3:55a number of different factors that go into this. 3:57One of the things that increased are regulatory fees. 4:00So, when you actually experience a data breach, 4:03maybe uh ah a law is requiring you to pay 4:07certain kinds of things in order to get that back. 4:10Uh. Another thing that went up were the detection costs. 4:13So, in this case, 4:15the cost to do detection 4:17and putting in the tooling and all this kind of stuff, 4:20that was also driving up some of these costs. 4:22So, again, we've got some good news. 4:25We've got some not so good news, 4:27but, overall we've got news. 4:29A new feature of this year's report, 4:31because it's a new feature in everyone's environment 4:34these days, artificial intelligence. 4:36And what we found was that 13% of organizations 4:41experienced a data breach related to AI. And 4:44that caused a ripple effect. Of the 13%, 4:48then, we had 60% 4:50that experienced a data compromise. 4:53And another 31% experienced operations disruptions. 4:59So, that is showing that AI is not only doing some good stuff for us, 5:03but it's also introducing some new attack vectors, 5:07which is not a surprise or shouldn't be a surprise to anyone. 5:10Another thing that we found in this was shadow AI. Now, 5:13what is that? 5:15There were 20% of organizations found that they had AI, 5:20unauthorized AI implementations in their environment. 5:23So nobody approved this, 5:25and maybe no one was aware of it until it became a problem. 5:28So clearly this is an area we need to start focusing on, 5:31because this stuff will just start popping up all over the place. 5:34Now let's take a look at what were the main vectors that were causing 5:38these big numbers that we had. Well, 5:40the number one in in terms of vectors. 5:44So causes of these attacks, uh, 5:46turned out to be insider threat. 5:50Insiders have an advantage 5:53because they understand what the environment already looks like. So, 5:56they were doing the attacks that were the most costly. Again, 6:01with that inside knowledge, 6:02they're able to go right to the heart of what they need to get, 6:05and they can do a lot of damage that way 6:07without having to trip around in the dark. 6:10What we found. 6:11Almost a dead heat tie, though, 6:13was third-party risk. Third-party, uh, 6:17situations where we had 6:19other types of of people having access into the systems 6:23or third-party software, 6:25a number of these different kinds of things, those were also contributing. 6:29So these were really the top most costly. 6:31But, in terms of frequency, this is another way of looking at 6:35what's the most important attack vectors. 6:37In this case, 16% 6:40were the result of phishing. And phishing 6:42has continued to be 6:45at the top of these lists in one way 6:47or another for the last few years. 6:49So, phishing attacks are essentially social 6:51engineering attacks on your people. 6:53So if you look at this, here's an attack where an individual is doing 6:57this. Here's an attack that's on the individual. 7:00So, we're going to have to do a lot to 7:02not only make our technology better, 7:04but make our people better too. 7:06Continuing with that theme of AI, 7:08let's take a look at what the impact of the cost of a data breach 7:11was from the attacker's use of AI versus 7:14the organization's use of AI. 7:16So, what we found in the report was that 16% 7:20of organizations experienced data breaches 7:23as a result of attackers' AI. 7:25And the breakdown on that was that it was roughly 37% 7:31were involving phishing attacks. 7:33So, that's a case where, 7:35in fact, we did some research once and found 7:38that you could automate a phishing attack 7:41and make it uh nearly as convincing 7:43as the best phishing attack a person could come up with. 7:46And we spent 16 hours 7:49with a skilled cybersecurity person 7:51to come up with a phishing attack 7:54versus five minutes with a chatbot. 7:57And the chatbot was able to do nearly as well as the person. 8:00So, expect to see more of this impact of AI 8:04in making more convincing phishing attacks, 8:07because it doesn't make the spelling and grammar errors, 8:11and it can come up with a very convincing scenario 8:13in a very short period of time. 8:15Another area that we're starting to see some impact from in 8:1935% of cases are deepfakes, 8:22which is another use of generative AI 8:24where you basically do an imitation of a person. 8:27Their voice, their likeness, their image. 8:30And you convince a person to do something 8:32that they're really not supposed to do. 8:34So, that's another thing that we've got to take a look at. 8:37The attackers will be using AI, 8:39and we're already seeing its impact 8:42on costing of the data breach. 8:44Now, how about the organizations' use of AI? Well, 8:47what have we found in this case? Well, 8:49what we've found in, this is unfortunate, 8:52is that uh and it's a big negative 8:54in this case, that 63% of organizations 8:58have no governance policy 9:01or are still in the process of developing one. 9:04So, if you don't have a policy, 9:06then you don't really know where it is 9:07you're going and what you're trying to achieve. 9:10Security and governance are really important that they work together. 9:13I'll talk more about that later. 9:15But a significant number of organizations really have not even defined 9:18what success looks like. So it's going to be pretty hard to achieve. 9:22Now, on the positive side, in terms of organizational use of AI, 9:26we see that organizations that have an extensive use 9:29of AI in the security space. 9:32So they're using AI in order to do a better job of security. Well, 9:35they actually saw a big impact. 9:38In fact, they saw their number of days go down to 9:42do that mean time to identify, 9:45mean time to contain, it decreased by 80 days. 9:49Now, time is money. So, guess what? 9:51That's what we also saw 9:53is that the numbers went down for the cost here as well. 9:56And the number in that case was in the range of 1.9 million dollars less. 10:03So, we can use 10:04AI to do a better job 10:07of securing our systems and responding and containing these costs. 10:11And the bad guys are going to be using it to attack us. 10:14Okay. Now we know the numbers. 10:17The cost of a data breach. 10:18I reviewed those numbers with you. 10:20The causes of those data breaches as well. 10:22Now, what are we supposed to do about it? 10:24Let's take a look at some recommendations. 10:26First of all, we continue to see that attackers 10:29find it's easier to log in than it is to hack in. 10:32So that means they're exploiting 10:34login capabilities. Authentication. 10:37What's our answer to that? 10:39Well, it's stronger identity and access management capabilities. 10:42So here we're seeing a need to focus 10:45not only on the regular user identities 10:47that are associated with people, 10:49but also a focus on non-human identities 10:52Some of these system-level accounts 10:54that have super-level access, very high levels of access, 10:59but, in many cases are not being managed. 11:01The passwords are not changing very frequently on them. 11:04We need basically a system of secrets management 11:08that allows us to do a better job of those. 11:11And some of those secrets, as I mentioned, could be passwords. 11:14They could be API keys. 11:16So for instance, maybe I've got ah an application 11:20and it's got one of these non-human IDs 11:22that goes and queries a database. 11:24And it's got an API key. These kinds of functions. 11:27Crypto keys, because we want to keep all this information encrypted. 11:31So, a lot of different information that needs to be kept secret. 11:34It's too much to scale and manage all of this 11:37if you don't have a good secrets management tool in place. 11:40Some other things that we can do and I'm a big proponent of this, 11:43we recommend this in the report 11:46is the thing that's better than a password is a passkey. 11:49Nobody can steal your password if you don't have one. Passkeys 11:52sound like a similar kind of thing, but it's actually a much stronger technology 11:57that's based on cryptographic techniques. 11:59And we're seeing more and more even consumer-level sites 12:02adopt this technology. So the more we can move to that, 12:06potentially the better we'll be and the harder 12:08these things are to break into. In particular, 12:11think about those phishing attacks. Well, 12:13it's these things are pretty resistant to phishing types of attacks. 12:17So that would make a big difference in that case. 12:19Another big area. Ah. 12:21I mentioned the impact of AI on this year's report. Well, 12:25we don't have AI if it weren't for data. 12:29So all of that is based on data. 12:31And what we need to be able to do now is discover. 12:34So I've got to discover my, all my uses 12:38and all of my cases of sensitive data in the organization 12:42and all of my uses of AI in the organization. 12:45In other words, I have to shine a light on the shadows, the shadow 12:50AI, the shadow data, all of these things that are sitting out there 12:54that might be issues for me. 12:55So I need tools that can do that sort of discovery automatically. 12:59People are not always going to tell me. If they were, 13:01it wouldn't be shadow in the first place. 13:03Another thing is, for these AI implementations, 13:06once I've found them, now I've got to do some things to secure them. 13:10I need a secure the posture of that AI. I 13:13need to be able to test the models. 13:15So I need to be able to add in security for AI models. 13:19And I need to be able to secure the usage of these systems as well. 13:24Ah. In other words, things like prompt injection attacks and things of that sort. 13:28Those are usage-based attacks against the AI. 13:30So secure the data, secure the models and secure the usage. 13:34Now, on the data side, also, 13:36we need to have strong access controls. 13:39So, that kinda leads back into this IAM topic. 13:42Identity and access management as well. 13:45This was more about the authentication. 13:47This is about the authorization. 13:49I need to have all of my sensitive data encrypted 13:52because, if I don't, then 13:54potentially anyone would be able to see it. 13:56And I need to be able to monitor 13:58the use of that data. 14:01Just because I put all of these controls in place doesn't mean everything's okay. 14:05Someone might be abusing their privileges. Again, 14:08we talked about insider threats. 14:11That's why we need to be able to monitor. 14:14And then ultimately, as I mentioned, a lot of organizations are using 14:17AI more and more, and we're starting to see it more 14:20and more as a vector of attack into the organization. But, 14:24at the same time, we see most organizations 14:27don't have these two dots connected. 14:30Governance and security. 14:33And I can tell you they're very important in AI in 14:35both cases. We need these in non-AI environments. 14:38But in AI it's particularly important. 14:41And there's a lot of overlap in these areas. 14:43The things that we need to do to do right in security 14:46can also be complemented by the things that we do in governance. 14:49So, a big emphasis on this moving forward. 14:53If you take care of these kinds of things, 14:55hopefully next year when we come back to look at this video again, 14:58the cost of a data breach will be even lower. 15:01So there's a quick summary of the 2025 Cost of a Data Breach Report. 15:05There's lots more details. 15:07To read the full report and do your own analysis of the data, 15:10click on the link in the description below and download your own copy now.