Total number of data breaches over previous 12 months per cybersecurity FTE

This measure calculates the total number of data breaches over previous 12 months per cybersecurity Full-time Equivalent (FTE). Cybersecurity is the ability to protect or defend the use of cyberspace from cyber-attacks. It is the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this, including defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. This Supplemental Information measure is intended to help companies evaluate additional variables related to the process "Develop and manage IT security, privacy, and data protection".

Benchmark Data

Lock

Sorry! Not all users have access to all of our resources.

Want to unlock access to all of our resources?

Learn about Membership Arrow with stem

Measure Category:
Supplemental Information
Measure ID:
110853
Total Sample Size:
697 All Companies
Performers:
25th Median 75th
- - -
Key Performance Indicator:
Yes

Sample image showing interactive filters for more detailed measure peer group data and an interactive graph.

Compute this Measure

Units for this measure are data breaches.

Back to Top

Total number of data breaches over previous 12 months / Total number of cybersecurity FTEs (including contractors and outsourced resources)

Key Terms

There are no key terms associated with this measure.
Back to Top

Measure Scope

Back to Top

Cross Industry (7.4)

  • 8.3.5.1 - Assess IT regulatory and confidentiality requirements and policies (20736)
  • 8.3.5.2 - Create IT security, privacy, and data protection risk governance (20737)
  • 8.3.5.3 - Define IT data security and privacy policies, standards, and procedures (20738)
  • 8.3.5.4 - Review and monitor physical and logical IT data security measures (20739)
  • 8.3.5.5 - Review and monitor application security controls (20740)
  • 8.3.5.6 - Review and monitor IT physical environment security controls (20741)
  • 8.3.5.7 - Monitor/analyze network intrusion detection data and resolve threats (20742)