• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
The Oakmont Group

The Oakmont Group

Helpful Advice about Podcast Promotion

  • Federal Tech Podcast
  • Podcasting Success Blog
  • About

Ep. 36 Federal IT and the Verizon Data Breach Investigation Report

November 29, 2022

apple podcasts logo
spotify logp
melissa gilbert
Melissa Gilbert
verizon

It is not just lemmings that follow a herd off the cliff; technology professionals are garden-variety humans and subject to herd thinking as well.

If you try to keep up with trade publications you are subject to the editorial selection process of the folks who run the periodicals, newspapers, blog sites, newsletters, and podcasts.  Catchy phrases pop up and it puts some joy into the drudgery of a daily tech column. You can take that from experience, I wrote over 500 weekly technology columns for The Washington Post.

Occasionally, you need to get your head out of the sand to get a wider perspective.  For each of the past fifteen years, Verizon has provided the community with the Data Breach Investigation Report, or the DBIR. 

"DBIR is based on just under 24,000 security incidents and that includes about 50 to 100 actual breaches. with machine learning, artificial intelligence is leveraged to categorize and classify."

Melissa Gilbert, Verizon Tweet

During the interview, Melissa Gilbert tells listeners of the 23,816 incidents and 5,212 confirmed breaches included in the report. They gather information from over eighty organizations all over the world.  She elucidates upon the difference between an event, an incident, and a breach. She details the data schema used for the report and explains the 4 A’s:  Actor, Action, Asset, and Attribute.

You can get your own copy of the free report here: The Verizon Data Breach Investigative Report

One of the key findings was the 13% increase in ransomware reported in the 2021 survey.  If your agency has an initiative to prevent ransomware, you can be assured that you are not diving into an arcane topic.

The conclusion is to focus on securing credentials. Most of these attacks start with credential theft and then move deeper into the system.

If you enjoyed this article, you may want to listen to episode #29 Can Training Reduce Attacks on Federal Websites?  

Transcript for podcast
Transcript for Ep. 36
Federal Tech Podast
John Gilroy

John Gilroy

Has been behind a microphone since 1991.  He can help you structure, launch, and promote your company podcast.  johngilroy@theoakmontgroupllc.com  

Federal Tech Podcast Ep.36,  Melissa Gilbert,  Verizon

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

federal tech podcast logo

The purpose of the Federal Tech Podcast to discuss innovation to reduce cost for federal technology. Contact us if you think you are a good fit.

Recent Posts

  • Ep. 75 Digital Transformation Culture at the DLA
  • Ep. 74 Digital Transformation of an Enterprise Financial System
  • Ep. 73 How to Build Federal Systems for Scale and Resilience
  • Ep. 72 How Federal Leaders can get Value From Data Management
  • Ep. 71 Equity and Federal Identity with Socure
constellations podcast from Kratos

Fascinated by going to Mars?

Right now in Los Angeles a company is 3D printing rockets;  30,000 satellites will be launched in the next five years; satellite communications have advanced so far that companies are using normal cell phones to connect to satellites.  How to keep up with all this excitement?  The Constellations Podcast from Kratos.

Let’s work together

Get in touch with us and send some basic info about your podcast.

Appear on Federal Tech Podcast

Footer

Social

Follow along on social media.

email

johngilroy@theoakmontgroupllc.com

Policy

Policy for The Oakmont Group

Copyright © 2023 · Business Pro Theme on Genesis Framework · WordPress · Log in