Listing Thumbnail

    Threat Beta: Cybersecurity Breach Likelihood Risk Metrics

     Info
    Deployed on AWS
    Threat Beta derives from several underlying components that measure the threat surface, weighted vulnerabilities, and attack likelihood, which is also available in this dataset. Very high Threat Betas are associated with an over 6x higher likelihood of a breach over six months.

    Overview

    Threat Beta is a measure of cybersecurity breach risk. Very high Threat Betas are associated with an over 6x higher likelihood of a breach over six months than a very low Threat Beta. Threat Beta derives from several underlying components that measure the threat surface, weighted vulnerabilities, and attack likelihood, which is also available in this dataset.

    Use Cases: 1. For asset managers, use the data to determine which companies in a portfolio have a very high chance of being breach in a cybersecurity attack. Breach risk can inform equity and debt investment decisions because breaches result in losses of 2% to 4% of revenue for most companies. Smaller companies could face bankruptcy from a single attack because a single breach requires significant upfront investments to prevent further breaches. 2. Insurance companies benefit from knowing the cybersecurity risk of their portfolio and potential customers. 3. For companies with large supply chains, use the breach prediction data to prevent supply shortages or IP leakage from key suppliers. 4. Industry consortiums can benefit by giving their members access to a data source that informs their membership of their cyber risk level. 5. Energy companies use this data to ensure a stable supply of power by avoiding hacking-related disruptions.

    Metadata • Update Frequency: Annually, quarterly, monthly, and weekly • Data Source(s): Public information sources • Geographic coverage: Global, but with an emphasis on North American and Europe • Time period coverage: Five years • Is historical data “point-in-time”: Yes. It’s monthly for the last 60 months (five years) • Data Set(s) Format(s): CSV • Raw or scraped data: Process data from raw and scrapped data • Key Fields: Threat Beta Rating, % breach probability, Risk bucket (high, low, medium), weighted vulnerability, attack likelihood, and attack surface. • Number of companies/brands covered: 20,000 public and private companies to start. A larger scope is available upon request. • Standard entity identifiers: None, but available upon request.

    Key Data Points • Symbol: GOOG • Name: Alphabet Class A • Threat Beta Rating: 2.10 (1.0 is average) • Last updated: November 26, 2021

    Data Dictionary: Available upon request. Definitions below: • Threat Beta: Threat Beta (Tb) is a proprietary analytical framework that informs a company’s future breach likelihood. By analyzing such factors as a company’s digital footprint, business relationships (note: using this to mean subsidiaries, etc. that we include in the Tb calc), deployed products and third-party services, coupled with the current state of operational cyber-attacks, Tb allows a company to better forecast breach likelihood down to the IP-level of their organization.

    Additional Information: • Data Schema: Available upon request • Data Source: Available upon request • Data Due Diligence Questionnaire: Available upon request • Sample Data Set: Available upon request

    Need Help? If you have questions about our products, contact us using the support information below. • Resource URL 1: https://www.cybeta.com/  • Support Contacts: https://www.cybeta.com/contact-us/  • Support Resources: Help onboarding and utilizing the data

    About Your Company https://www.cybeta.com/the-cybeta-team/  US intelligence-trained experts built Cybeta®. Our cadre gained their cybersecurity experience and skills from decades of experience at the DoD and US National Intelligence communities. Cybeta® experts have been consulting, conducting reconnaissance, and planning operations against targets for decades. We are now applying those same targeting methods, in reverse, to protect your business proactively.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Threat Beta: Cybersecurity Breach Likelihood Risk Metrics

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    1-month contract (1)

     Info
    Dimension
    Description
    Cost/month
    Product Access
    Dimension that grants access to the product for subscribers.
    $2,000.00

    Vendor refund policy

    Refunds not available on this product.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    AWS Data Exchange (ADX)

    AWS Data Exchange is a service that helps AWS easily share and manage data entitlements from other organizations at scale.

    Additional details

    Data sets (1)

     Info

    You will receive access to the following data sets.

    Data set name
    Type
    Historical revisions
    Future revisions
    Sensitive information
    Data dictionaries
    Data samples
    Cybersecurity Risk Scores
    All historical revisions
    All future revisions
    Not included
    Not included

    Resources

    Vendor resources

    Similar products