November 7, 2018 By Christophe Veltsos 3 min read

As the old proverb goes, time is money. While much of the cost of a data breach is tied to the value of the lost records themselves, many organizations underestimate the costs associated with lost time and inefficient processes, especially when it comes to incident response.

Last month, IBM released its “2018 Cost of Data Breach Study: Impact of Business Continuity Management” in partnership with the Ponemon Institute. The goal of the study was to quantify the financial and reputational value organizations can derive by investing in active business continuity management (BCM) programs before a breach.

According to the report, organizations that have implemented proactive BCM into their incident response process have significantly reduced the time it takes to identify and contain a breach, as well as the possibility that their data will be compromised. As a result, these companies have reduced incident response costs by an average of 31.5 percent. What can security leaders learn from this trend?

How Can Companies Reduce MTTI and MTTC?

The study emphasized the efficacy of BCM practices in shrinking both the mean time to identify (MTTI) a breach and the mean time to contain (MTTC) one. Overall, MTTI has been on a slow but steady decline over the past four years. However, organizations with BCM integration reported an MTTI of 170 days in 2018 (down from 178 in 2015), while those without BCM reported an MTTI of 214 days (down from 234 in 2015), a difference of nearly a month-and-a-half. Although MTTI is generally improving, companies with BCM plans have consistently reported better numbers.

Similarly, MTTC for organizations with BCM integration was 52 days, compared to 90 for those without it. The cost savings from BCM integration stem in large part from the amount of time saved while identifying and containing a breach. The longer the attackers go undetected, the greater their loot and the damage they can do.

Organizations of all sizes should look internally at their current incident response capabilities — both in terms of reacting to and containing a breach — and find ways to make improvements. Most importantly, while a potential indicator of compromise (IoC) is under investigation, are your business operations still running as normal?

Smoothing over a response plan to minimize interruption could include running drills to sharpen response time and adjust playbooks, sharing and comparing response time averages with industry peers via information exchange channels, and leveraging technologies such as artificial intelligence (AI) to augment the capabilities of human incident responders and more accurately zoom in on trouble spots.

Add Up the Costs of a Breach

The single largest cost factor of a data breach — representing about 38 percent of costs — is the value of lost business. This number includes decreased client rosters, acquiring new customers post-breach and lost revenue from any downtime in operations.

Against this backdrop of average data breach costs ($3.86 million), the data reported shows a clear advantage in favor of organizations with BCM integration, which experienced an average total breach cost of $3.55 million, over organizations without BCM involvement, which risk losing $4.24 million.

In other words, the difference in the cost of a data breach favors organizations with BCM integration to the tune of $0.69 million.

Why You Should Automate Disaster Response

The report also pointed out the value of an automated disaster response (DR) process that also provides resiliency orchestration. While only 21 percent of organizations reported such an established function, those organizations saw a significant reduction in the daily cost of an active breach from $6,546 for a manual DR process down to $3,100 per day for those with an automated and orchestrated DR.

The lesson here is that there is a clear benefit to investing in worst-case scenarios. In case of a fire, would you organize people into a chain handling buckets of water, or would you rather have a fully automated sprinkler system that discharges in both the burning room and the surrounding area?

An automated and orchestrated DR process more than halves the daily cost of a breach. Would it be reasonable for your organization to pass on these kinds of savings? Would top leaders bet their jobs on going without it?

How Business Continuity Management Can Improve the Bottom Line

The “Cost of Data Breach Study” contains insights that chief information security officers (CISOs) and chief risk officers (CROs) can use to communicate the value of their cybersecurity strategy, including ranges of costs and benefits for improved decisions about cyber risks. It provides not only an updated picture of the time needed to detect and contain a breach, but also expected overall costs and benefits of implementing an integrated BCM function, including reducing the negative impacts on IT operations, reputation, customers and, ultimately, the bottom line.

CISOs can translate the impact of cyber risks into business and financial impacts by mapping their own figures against those of the report and generating a holistic picture of the dollars at stake. Overall, this data provides an important opportunity to demonstrate from a high level the interconnectivity of the business’s security program and its defining operations.

More from Risk Management

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Ransomware payouts hit all-time high, but that’s not the whole story

3 min read - Ransomware payments hit an all-time high of $1.1 billion in 2023, following a steep drop in total payouts in 2022. Some factors that may have contributed to the decline in 2022 were the Ukraine conflict, fewer victims paying ransoms and cyber group takedowns by legal authorities.In 2023, however, ransomware payouts came roaring back to set a new all-time record. During 2023, nefarious actors targeted high-profile institutions and critical infrastructure, including hospitals, schools and government agencies.Still, it’s not all roses for…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today