174.7 Billion Spent on Security
- 58% of of individuals have accidentally sent sensitive information to the wrong person.
- 81% of corporate breaches involve weak or stolen passwords.
- 83% of confirmed data breaches involve, weak, default, or stolen passwords.
- 63% of senior managers admit to regularly uploading work files to a personal email or cloud account.


Identify
Develop organizational understanding to manage cybersecurity risk to systems, assets, data, & capabilities.

Protect

Detect
Develop & implement the appropriate activities to identify an occurrence of a cybersecurity event.

Respond
Develop & implement the appropriate activities to take action regarding a detected cybersecurity event.

Recover
Develop & implement the appropriate activities to maintain plans for resilience and restore any capabilities or services that were impaired due to a cybersecurity event.