A Netskope foi nomeada Líder no Quadrante Mágico do Gartner™ de 2022 para Security Service Edge. Obtenha o Relatório

  • Plataforma

    Visibilidade incomparável e proteção de dados e contra ameaças em tempo real na maior nuvem privada de segurança do mundo.

  • Produtos

    Os produtos Netskope são construídos na Netskope Security Cloud.

A Netskope oferece uma pilha de segurança na nuvem moderna, com capacidade unificada para proteção de dados e ameaças, além de acesso privado seguro.

Explore a nossa plataforma
Birds eye view metropolitan city

Netskope é nomeada Líder no Relatório do Quadrante Mágico™ do Gartner de 2022 para SSE

Obtenha o Relatório Vá para a plataforma
Netskope gartner mq 2022 sse leader

Mude para serviços de segurança na nuvem líderes de mercado com latência mínima e alta confiabilidade.

Saiba mais
Lighted highway through mountainside switchbacks

Previna ameaças que muitas vezes contornam outras soluções de segurança usando uma estrutura SSE de passagem única.

Saiba mais
Lighting storm over metropolitan area

Soluções de zero trust para a implementação de SSE e SASE

Saiba mais
Boat driving through open sea

A Netskope permite uma jornada segura, inteligente e rápida para a adoção de serviços em nuvem, aplicações e infraestrutura de nuvem pública.

Saiba mais
Wind turbines along cliffside
  • Customer Success

    Proteja a sua jornada de transformação digital e aproveite ao máximo as suas aplicações na nuvem, na web e privadas.

  • Atendimento ao cliente

    Suporte proativo e o compromisso em otimizar seu ambiente da Netskope e acelerar seu sucesso.

  • Treinamento e certificação

    Os treinamentos da Netskope vão ajudar você a ser um especialista em segurança na nuvem.

Confie na Netskope para ajudar você a enfrentar ameaças emergentes, novos riscos, mudanças tecnológicas, mudanças organizacionais e de rede, e novos requisitos regulatórios.

Saiba mais
Woman smiling with glasses looking out window

Contamos com engenheiros qualificados no mundo todo, com experiências variadas em segurança na nuvem, redes, virtualização, entrega de conteúdo e desenvolvimento de software, prontos para prestar assistência técnica oportuna e de alta qualidade.

Saiba mais
Bearded man wearing headset working on computer

Proteja sua jornada de transformação digital e aproveite ao máximo seus aplicativos de nuvem, web e privados com o treinamento da Netskope.

Saiba mais
Group of young professionals working
  • Recursos

    Saiba mais sobre como a Netskope pode ajudá-lo a proteger sua jornada para a nuvem.

  • Blog

    Saiba como a Netskope viabiliza a segurança e a transformação de redes através do security service edge (SSE).

  • Eventos e workshops

    Esteja atualizado sobre as últimas tendências de segurança e conecte-se com seus pares.

  • Security Defined

    Tudo o que você precisa saber em nossa enciclopédia de segurança cibernética.

Podcast Security Visionaries

Episódio bônus: a importância do Security Service Edge (SSE)

Reproduzir o podcast
Black man sitting in conference meeting

Leia as últimas novidades sobre como a Netskope pode viabilizar a jornada Zero Trust e SASE por meio dos recursos do security service edge (SSE).

Leia o Blog
Sunrise and cloudy sky

Trabalho Híbrido Netskope

Esta série de webinars destaca o impacto do trabalho híbrido em seu negócio, assegurando seu talento, aplicativos e dados a qualquer hora e em qualquer lugar.

Registrar
Série Webinar: O impacto do trabalho híbrido em seu negócio

O que é o Security Service Edge?

Explore o lado de segurança de SASE, o futuro da rede e proteção na nuvem.

Saiba mais
Four-way roundabout
  • Empresa

    Ajudamos você a antecipar os desafios da nuvem, dos dados e da segurança da rede.

  • Por que Netskope

    A transformação da nuvem e o trabalho em qualquer lugar mudaram a forma como a segurança precisa funcionar.

  • Liderança

    Nossa equipe de liderança está fortemente comprometida em fazer tudo o que for preciso para tornar nossos clientes bem-sucedidos.

  • Parceiros

    Fazemos parceria com líderes de segurança para ajudá-lo a proteger sua jornada para a nuvem.

A Netskope possibilita o futuro do trabalho.

Saiba mais
Curvy road through wooded area

A Netskope está redefinindo a nuvem, os dados e a segurança da rede para ajudar as organizações a aplicar os princípios de Zero Trust para proteger os dados.

Saiba mais
Switchback road atop a cliffside

Pensadores, construtores, sonhadores, inovadores. Juntos, fornecemos soluções de segurança na nuvem de última geração para ajudar nossos clientes a proteger seus dados e seu pessoal.

Meet our team
Group of hikers scaling a snowy mountain

A estratégia de comercialização da Netskope, focada em Parcerias, permite que nossos Parceiros maximizem seu crescimento e lucratividade enquanto transformam a segurança corporativa.

Saiba mais
Group of diverse young professionals smiling
Blog Full Skope How to Use Your Last Breach to Justify Security Spend
Jul 12 2022

How to Use Your Last Breach to Justify Security Spend

I recently wrote a blog post outlining what to do in the first 24 hours after you have been breached, and in my conclusion I mentioned that capturing the incident in a case study could help unlock budget in future. Today, I want to look at this in more detail, and consider the approaches you can take to analyse the cost of a breach in order to make a request for appropriate preventative spend.

Security teams often attempt to capture the hypothetical cost of a data loss incident, but it is incredibly hard to convincingly calculate the complex factors of a potential data loss incident because every organisation will require its own formula based on its business model, market conditions, and the data it holds. Not all data is equal, and even within a single data set, value and associated risk can fluctuate dramatically over time. And then there is the fact that these calculations are hypothetical anyway—even if you reach a defensible number you have to anticipate a reluctance to acknowledge the likelihood of the incident occurring in the first place.

After an incident has occured, you are perfectly placed to prove not only that incidents occur, but that they have real costs attached. 

So let’s picture ourselves coming out of a breach, one that was identified as a data loss incident.  Where do we start in assessing the true costs?

1. Loss of productivity

This cost category should capture any reduction in the organisation’s ability to generate value from the core business proposition during and after the incident. Make sure you capture this using metrics that the board recognises and agrees with. Time is your root number here—how long was the business impacted? Use financial reports to determine what revenue would usually be achieved in that time, using the systems or data sources that were unavailable or lost during the breach.

2. Response costs

Here you should detail all expenses which were accrued in managing the incident. This may include internal resource costs (time and equipment), as well as supplier fees. Don’t limit this to IT team costs; include lawyers, communications support, and anyone else who was pulled into the incident both internally and externally.

3. Cost of replacement

While “response costs” covers assets that were able to be fixed or reconstructed, there will be others that are lost or damaged in a breach that will need replacing—including the data itself. This value will vary widely depending on the nature and extent of the data loss, and whether it is lost from the organisation, or lost to the organisation (i.e. does the organisation still have the data itself or does it need replacing). List prices can provide quotations on replacement infrastructure or hardware assets. Insurance costs (both third-party and warranty policies) with suppliers should be included here.

4. Fines and judgement fees

It can take some time to get a clear picture of any costs that are incurred in this category, but the moment you are aware either that you are potentially liable, or that a complaint has been raised relating to your breach, you can include these in your cost calculation. If your breach might incur a fine of up to 4% revenue from a supervisory authority in relation to the GDPR—for instance—and you are asking for significantly less budget to rectify the issue, it is worth noting that there is precedent for authorities to lessen the fine imposed as a result of the response you  demonstrate, even after the event.

5. Loss of competitive advantage 

Following a breach, organisations can see a decline in the value of competitively differentiating assets. This isn’t an easy one to identify, but the value of individual data sets within large organisations is something that should be assessed and measured by individual data owners within each team (engineering, product,  marketing, HR, etc). These data owners understand the lifecycle, value, and use of their specific data and it is a valuable conversation to see if they can put a more accurate number on the impact of any loss of data.

6. Reputational damage  

The scale of reputational and brand damage depends on the organisational business model, and the details of the incident with reputation-related costs being either minor, moderate or substantial. Reputational damage can be predicted based on the percentage of lost customers or customers who limit their use of your services for a period after a breach. This can often lead to the most substantial disruption to the organisation and may last months, years or indefinitely until reputation is restored, so temporal factors should be included along with potential impact to the supply chain through terminated contracts.   

For security teams who struggle to get appropriate budgets to ensure appropriate security, a breach will often clear the path to obtaining the correct budget. Once the immediate issue has been dealt with, you are left with a tailored case study and the perfect business case for security spend reviews and potential increase in investment in vulnerable areas. There’s more helpful advice on assessing the impact of a data loss impact in this paper.

author image
About the author
Neil Thacker is a veteran information security professional and a data protection and privacy expert well-versed in the European Union General Data Protection Regulation (EU GDPR).
Neil Thacker is a veteran information security professional and a data protection and privacy expert well-versed in the European Union General Data Protection Regulation (EU GDPR).