KEY HIGHLIGHTS FROM THE REPORT
Defend Forward with New Insights Into How Attackers Operate
57% can complete an end-to-end attack in less than a day.
64% can exfiltrate data in less than 5 hours once they gain access.
36% can escalate or move laterally in 3 to 5 hours.
Most common exploitable perimeter exposures
The Greatest Risks You Face
Which Exploitable Exposures Are Most Often Found on the Perimeter?
Average hours to collect and exfiltrate data
Racing To The Finish Line
How Quickly Can Your Data Be Exfiltrated?
How many organizations have adequate detection and response capabilities
The Struggle Continues
How Do Detection & Response Capabilities Stack Up?
Dive Deep Into the Survey Results with the Experts
Join Matt Bromiley of SANS and Tom Eston of Bishop Fox as they dive deep into the findings of our recent research, discuss what they found most surprising, and provide tips for leveraging the data to refine your offensive and defensive security strategies.
GAIN A STRATEGIC ADVANTAGE
Know Your Enemy, Know Yourself
- Sun Tzu, The Art of War
It’s no secret that attackers are evolving faster than defenses can keep up. By the time detection measures are in place, attackers have a new way to circumvent them. It’s a game of cat and mouse that attackers are poised to win. We hope that this inaugural report developed in collaboration with SANS can start to shift these dynamics. By mining insights from ethical hackers armed with the same tools, tactics, techniques, and procedures as modern attackers, we can better understand what we're up against and, in doing so, better empower the defenders. We hope you find the report useful!
-- The Bishop Fox Team
Hone Your Offensive Strategy with More Attacker Insights
Continue your journey into the minds and methods of modern adversaries and see how you can improve proactive defenses against common attacks with these additional resources.