
2015 Cost of Cyber Crime Study: Germany
Discover how your enterprise security expenditures can be affected by cyber crime attacks and how you can prepare your organization to properly address these issues.
The 5 internal cost activities include:
• Detection: Enabling an organization to reasonably detect cyber attacks.
• Investigation and escalation: Activities necessary to uncover the source, scope, and magnitude of incidents.
• Containment: Activities that focus on stopping the severity of cyber threats.
• Recovery: Repairing and remediating business process activities.
• Ex-post response: How to minimize potential future attacks.
