Quantifying the cost of a data breach
Click on a flag to register for a country-specific report.
IBM is proud to sponsor the ninth annual Cost of Data Breach Study, the industry’s gold-standard benchmark research independently conducted by Ponemon Institute. More than 250 organizations from these eleven countries participated in this year’s study: Australia, Brazil, France, Germany, India, Italy, Japan, United Kingdom, United States and, for the first time, Saudi Arabia and the United Arab Emirates.
Although findings differ from country to country, the study reveals some general trends that have significant implications for organizations across the globe:
With up to nine years of data to work with, the Ponemon Cost of Data Breach Study offers detailed trending information on the cost of a data breach based on study participants’ actual experience with a data breach involving 1,000 to 100,000 compromised records. The cost measurement includes direct, indirect and opportunity costs associated with an organization’s response to the theft or loss of personal information.
Register to download a country-specific report by clicking on the map at the top of this page. For a worldwide perspective plus additional findings on the security threats behind data breaches and the role of business continuity management in the security landscape, register to download the global report.
IBM Emergency Response Services Subscription
Take a proactive and preventive approach to potential security breaches
Data Breach Risk Calculator
Find out how much a data breach can cost your organization
Get the global view, with bonus data on security and continuity
Read the global analysis for a worldwide view plus new data on security threats and the role of business continuity management.
Critical data protection program
Safeguard your most critical data from compromise
IBM Threat Protection System
Prevention is possible. Discover how the latest advances in Threat Protection can keep your organization safe.
An information resource for data breach prevention and response
Evaluate the risk
Understand the impact of a IT security breach on reputation and brand image