Post-Breach Impact: Learn the Positive and Negative Factors That Influence Breach Costs

Bethesda, Md. – A variety of both positive and negative factors influence the expenses organizations incur as a result of breach, according to results of a new survey to be released by SANS Institute on November 19, 2105. A lot of it depends on their preparedness, along with the types of data breached and scope of the breach.

"Having a proactive approach to handling security, a data classification program and policy, and a solid response and clean-up plan are significant positive steps organizations can take to reduce the costs and effects of a breach," says SANS Analyst and author of the survey paper, Barb Filkins.

The type of data accessed and/or exfiltrated in the breach strongly impacts post-breach costs. For 58% of the incidents reported in this survey, two or more types of sensitive, regulated data (such as financial data and personal identifiable data) were compromised, so fines, judgments and other expenses may increase over the costs of one sensitive data type being exposed.

There are also some factors that tend to increase the expense associated with a breach, including disruption of work, time for remediation and media attention, to name just a few.

Filkins continues, "We took a close look at the results for breaches of fewer than 1,000 records, the largest group within our survey sample, and found the results enlightening."

For the largest group--those that exposed fewer than 1,000 records--only 20% had their breaches covered in the media. For the vast majority (94%), there were no regulatory proceedings, judgments, fines or penalties associated with the breach. Yet the respondents incurred total expenses that range from under $1,000 to falling within the range of $1 million to $10 million. Cyber insurance is also a determining factor in post-breach costs, yet 60% did not have commercial cyber insurance because they found it hard to acquire.

Full results will be shared during a November 19 webcast at 1 PM EST, sponsored by Identity Finder, and hosted by SANS. Register to attend the webcast at

Those who register for the webcast will also receive access to the results paper developed by SANS Analyst and security expert, Barb Filkins to be published in December 2015.

Tweet This

What is the common denominator in reducing the financial impact of a #databreach? Attend Nov. 19 Webcast and See.

Data sensitivity plays largest role in costs of cleaning up after a #breach. Learn more 11-19, #infosec

New survey examines post-breach costs across several key industries. Hear results 11/19, #infosec #databreach

SANS Media Contact

About SANS Institute

The SANS Institute was established in 1989 as a cooperative research and education organization. Today, SANS is the most trusted and, by far, the largest provider of cyber security training and certification to professionals in government and commercial institutions world-wide. Renowned SANS instructors teach more than 60 courses at in-person and virtual cyber security training events and on demand. GIAC, an affiliate of the SANS Institute, validates practitioner skills through more than 35 hands-on, technical certifications in cyber security. The SANS Technology Institute, a regionally accredited independent subsidiary, offers a master’s degree, graduate certificates, and an undergraduate certificate in cyber security. SANS Security Awareness, a division of SANS, provides organizations with a complete and comprehensive security awareness solution, enabling them to easily and effectively manage their ‘human’ cybersecurity risk. SANS also delivers a wide variety of free resources to the InfoSec community including consensus projects, research reports, webcasts, podcasts, and newsletters; it also operates the Internet's early warning system–the Internet Storm Center. At the heart of SANS are the many security practitioners, representing varied global organizations from corporations to universities, working together to support and educate the global information security community. (