
Cyber-Espionage breaches pose a unique challenge. Through advanced techniques and a specific focus, Cyber-Espionage threat actors seek to swiftly gain access to heavily defended environments, laterally move with stealth, efficiently obtain targeted assets and data, and move out smartly (or even stay back and maintain covert persistence). The Verizon Cyber-Espionage Report (CER) is our first-ever data-driven publication that focuses on advanced cyberattacks as reflected in the DBIR “Cyber-Espionage” pattern. We've examined seven years (2014-2020) of Data Breach Investigations Report (DBIR) data for Cyber-Espionage breaches and all breaches.
John Grim, Distinguished Architect | Head of Research, Development, Innovation, Verizon Threat Research Advisory Center
View upcoming Summits:
Download the presentation slides (SANS account required) at
#CTISummit #cyberthreatintelligence