2014 Cost of Data Breach Study

From Ponemon Institute, sponsored by IBM10 reports, 11 countries. Industry-leading benchmarks.

Quantifying the cost of a data breach

Click on a flag to register for a country-specific report.

Japan Australia India Brazil United States United Kingdom Germany France Italy Saudi Arabia UAE

IBM is proud to sponsor the ninth annual Cost of Data Breach Study, the industry’s gold-standard benchmark research independently conducted by Ponemon Institute. More than 250 organisations from these eleven countries participated in this year’s study: Australia, Brazil, France, Germany, India, Italy, Japan, United Kingdom, United States and, for the first time, Saudi Arabia and the United Arab Emirates.

Although findings differ from country to country, the study reveals some general trends that have significant implications for organisations across the globe:

With up to nine years of data to work with, the Ponemon Cost of Data Breach Study offers detailed trending information on the cost of a data breach based on study participants’ actual experience with a data breach involving 1,000 to 100,000 compromised records. The cost measurement includes direct, indirect and opportunity costs associated with an organisation’s response to the theft or loss of personal information.

Register to download a country-specific report by clicking on the map at the top of this page. For a worldwide perspective plus additional findings on the security threats behind data breaches and the role of business continuity management in the security landscape, register to download the global report.

Share

We're here to help

  • Kenneth Berry

    Kenneth Berry

    Lead Development Rep for Global Technology Services, UKI

Get the global view, with bonus data on security and continuity

2014 Cost of Data Breach Study: Global Analysis

Read the global analysis for a worldwide view plus new data on security threats and the role of business continuity management.

IBM Cyber Security Intelligence Index

Find out how cyber security events break down by country and who’s behind the majority of attacks.

Evaluate the risk

Understand the impact of a IT security breach on reputation and brand image