About
16
Publications
79,863
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
141
Citations
Introduction
Suzanne Widup currently works at the RISK Team, Verizon Communications. Suzanne does research in Computer Security and Data breaches. Their most recent publication is '2018 Verizon Data Breach Investigations Report'.
Skills and Expertise
Current institution
Publications
Publications (16)
Based on forensic evidence collected from our partner organizations as well as the Verizon caseload, the 2023 Verizon Data Breach Investigations Report presents a rare and comprehensive view into the world of corporate cybercrime. Now in its sixteenth year of publication, this research has been used by thousands of organizations to evaluate and imp...
Based on forensic evidence collected from our partner organizations as well as the Verizon caseload, the 2022 Verizon Data Breach Investigations Report (DBIR) presents a rare and comprehensive view into the world of corporate cybercrime. Now in its fifteenth year of publication, this research has been used by thousands of organizations to evaluate...
Based on forensic evidence collected from 83 partner organizations, the 2021 Verizon Data Breach Investigations Report (DBIR) presents a data-driven view into the world of corporate cybercrime. Now in its 14th year of publication, this research has been used by countless organizations to evaluate and improve their security posture. This year’s repo...
Verizon Data Breach Investigations Report
Based on forensic evidence collected from 65 partner organizations as well as the Verizon caseload, the Verizon Data Breach Investigation Report (DBIR) presents a rare and comprehensive view into the world of corporate cybercrime. Now in its eleventh year of publication, this research has been used by thousands of organizations to evaluate and impr...
Attackers are constantly after valuable digital assets. It doesn’t matter about a company’s location, size or industry. A critical step in defending your reputation and the security of your customers is managing the risks involved in collecting and storing personally identifiable health information. In the new Verizon Protected Health Information D...
Welcome to the first Verizon Protected Health Information Data Breach Report (PHIDBR). We’re the same team that has brought you the Verizon Data Breach Investigations Report (DBIR) since 2008, and we are excited to revisit some of that data and bring in some new incidents for this report.
The purpose of this study is to shed light on the problem of...
The 2015 Data Breach Investigations Report (DBiR) continues the tradition of change with additions that we hope will help paint the clearest picture yet of the threats, vulnerabilities, and actions that lead to security incidents, as well as how they impact organizations suffering them. in the new “Before and Beyond the Breach” section, our securit...
Conduct repeatable, defensible investigations with EnCase Forensic v7
Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic v7 reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted...
Welcome to the 2014 Data Breach Investigations Report (DBIR).1 Whether you’re a veteran reader who’s
been with us since our initial publication back in 2008 or a newbie to our annual data party, we’re sincerely
glad you’re here. We hope that this year’s submission will improve awareness and practice in the field of
information security and support...
Perhaps more so than any other year, the large scale and diverse
nature of data breaches and other network attacks took center
stage. But rather than a synchronized chorus making its debut on New Year’s Eve, we
witnessed separate, ongoing movements that seemed to come together in full
crescendo throughout the year. And from pubs to public agencies,...
This paper proposes an analysis framework and model for estimating the impact of information security breach episodes. Previous methods either lack empirical grounding or are not sufficiently rigorous, general or flexible. There has also been no consistent model that serves theoretical and empirical research, and also professional practice. The pro...
The Leaking Vault 2011 presents data gathered from
studying 3,765 publicly disclosed data breach incidents,
and is the largest study of its kind to date. Information was
gleaned from the organizations that track these events, as
well as government sources. Data breaches from 33
countries were included, as well as those from the United
States.
This...
Data breaches are a concern for every organization. Until now, studies
have been based on data that must either be kept confidential or have a
small number of data points. The Leaking Vault study presents data on
2,807 data breach incidents—and is the largest study of its kind to date.
Information was gleaned from the organizations that track these...
Business continuity planning on an enterprise-wide level is an involved and costly process. Certainly, each company would do well to have some kind of comprehensive plan to handle crises. However, in these challenging economic times, many companies are choosing to postpone or eliminate business continuity planning from their budgets, even though th...