{"id":39326,"date":"2025-01-15T16:10:45","date_gmt":"2025-01-15T16:10:45","guid":{"rendered":"https:\/\/staging.kepner-tregoe.com\/resources\/white-papers\/cyber-security-incident-strategies-for-survival\/"},"modified":"2025-07-16T10:55:35","modified_gmt":"2025-07-16T10:55:35","slug":"cyber-security-incident-strategies-for-survival","status":"publish","type":"white-paper","link":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/resources\/whitepapers\/cyber-security-incident-strategies-for-survival\/","title":{"rendered":"The $10.5 Trillion Cyber Threat:<br> Incident Strategies for Survival"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">By Dr Clive King &amp; Conor Horgan<\/h2>\n\n\n\n<p>If measured as a country, cyber crime would be the world\u2019s third largest economy after the U.S. and China (<em>Cyber Crime Magazine, April 2024<\/em>). It was predicted to inflict damages totaling $10.5 trillion globally in 2025 \u2013 that is averaging around $350 for each of the 29 billion internet connected devices.<\/p>\n\n\n\n<p>This white paper discusses the scale and inevitability of cyber crime, the increasing compliance demands from DORA and NIS2 regulations and offers <strong>three strategies to respond more effectively<\/strong> to them and enhance your current prevention approaches:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Incident Mapping to identify and strengthen your cyber vulnerabilities<\/li>\n\n\n\n<li>\u201c4-colour thinking\u201d to manage your cyber incident bridge with more clarity<\/li>\n\n\n\n<li>Engineering your Performance System to make your Cyber Strategies work<\/li>\n<\/ul>\n\n\n\n<p>Is your organization adequately protected? Discover in our white paper how the KT Clear Thinking process can help you plan effective measures to prevent and contain cyber security threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If measured as a country, cyber crime would be the world&#8217;s third largest economy after the U.S. and China (<i>Cyber Crime Magazine, April 2024<\/i>). It is predicted to inflict damages totaling $10.5 trillion globally by 2025 &#8211; that is averaging around $350 for each of the 29 billion internet connected devices. <\/p>\n<p>This white paper discusses the scale and inevitability of cyber crime, the increasing compliance demands from DORA and NIS2 regulations and offers <b>three strategies to respond more effectively<\/b> to them and enhance your current prevention approaches.<\/p>\n","protected":false},"author":8,"featured_media":39327,"template":"","white-paper-type":[],"class_list":["post-39326","white-paper","type-white-paper","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.6 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The $10.5 Trillion Cyber Threat: Incident Strategies for Survival - Kepner-Tregoe<\/title>\n<meta name=\"description\" content=\"If measured as a country, cyber crime would be the world&#039;s third largest economy after the U.S. and China (Cyber Crime Magazine, April 2024). It is predicted to inflict damages totaling $10.5 trillion globally by 2025 - that is averaging around $350 for each of the 29 billion internet connected devices.  This white paper discusses the scale and inevitability of cyber crime, the increasing compliance demands from DORA and NIS2 regulations and offers three strategies to respond more effectively to them and enhance your current prevention approaches.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The $10.5 Trillion Cyber Threat: Incident Strategies for Survival\" \/>\n<meta property=\"og:description\" content=\"If measured as a country, cyber crime would be the world&#039;s third largest economy after the U.S. and China (Cyber Crime Magazine, April 2024). It is predicted to inflict damages totaling $10.5 trillion globally by 2025 - that is averaging around $350 for each of the 29 billion internet connected devices.  This white paper discusses the scale and inevitability of cyber crime, the increasing compliance demands from DORA and NIS2 regulations and offers three strategies to respond more effectively to them and enhance your current prevention approaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.kepner-tregoe.com\/zh-hans\/resources\/whitepapers\/cyber-security-incident-strategies-for-survival\/\" \/>\n<meta property=\"og:site_name\" content=\"Kepner-Tregoe\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-16T10:55:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.kepner-tregoe.com\/wp-content\/uploads\/2025\/07\/The-10.5-Trillion-Cyber-Threat-Incident-Strategies-for-Survival-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"447\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/resources\\\/whitepapers\\\/cyber-security-incident-strategies-for-survival\\\/\",\"url\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/resources\\\/whitepapers\\\/cyber-security-incident-strategies-for-survival\\\/\",\"name\":\"The $10.5 Trillion Cyber Threat: Incident Strategies for Survival - Kepner-Tregoe\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/resources\\\/whitepapers\\\/cyber-security-incident-strategies-for-survival\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/resources\\\/whitepapers\\\/cyber-security-incident-strategies-for-survival\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/The-10.5-Trillion-Cyber-Threat-Incident-Strategies-for-Survival-1-1.jpg\",\"datePublished\":\"2025-01-15T16:10:45+00:00\",\"dateModified\":\"2025-07-16T10:55:35+00:00\",\"description\":\"If measured as a country, cyber crime would be the world's third largest economy after the U.S. and China (Cyber Crime Magazine, April 2024). It is predicted to inflict damages totaling $10.5 trillion globally by 2025 - that is averaging around $350 for each of the 29 billion internet connected devices. This white paper discusses the scale and inevitability of cyber crime, the increasing compliance demands from DORA and NIS2 regulations and offers three strategies to respond more effectively to them and enhance your current prevention approaches.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/resources\\\/whitepapers\\\/cyber-security-incident-strategies-for-survival\\\/#breadcrumb\"},\"inLanguage\":\"zh-Hans\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/resources\\\/whitepapers\\\/cyber-security-incident-strategies-for-survival\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/resources\\\/whitepapers\\\/cyber-security-incident-strategies-for-survival\\\/#primaryimage\",\"url\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/The-10.5-Trillion-Cyber-Threat-Incident-Strategies-for-Survival-1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/The-10.5-Trillion-Cyber-Threat-Incident-Strategies-for-Survival-1-1.jpg\",\"width\":1000,\"height\":447,\"caption\":\"The $10.5 Trillion Cyber Threat - Incident Strategies for Survival\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/resources\\\/whitepapers\\\/cyber-security-incident-strategies-for-survival\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u8d44\u6e90\",\"item\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/resources\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"White Papers\",\"item\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/resources\\\/whitepapers\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The $10.5 Trillion Cyber Threat: Incident Strategies for Survival\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/#website\",\"url\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/\",\"name\":\"Kepner-Tregoe\",\"description\":\"Leaders in problem solving\",\"publisher\":{\"@id\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-Hans\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/#organization\",\"name\":\"Kepner-Tregoe\",\"url\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/kepner-tregoe-logo.png\",\"contentUrl\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/kepner-tregoe-logo.png\",\"width\":264,\"height\":38,\"caption\":\"Kepner-Tregoe\"},\"image\":{\"@id\":\"https:\\\/\\\/staging.kepner-tregoe.com\\\/zh-hans\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/14495\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The $10.5 Trillion Cyber Threat: Incident Strategies for Survival - Kepner-Tregoe","description":"If measured as a country, cyber crime would be the world's third largest economy after the U.S. and China (Cyber Crime Magazine, April 2024). It is predicted to inflict damages totaling $10.5 trillion globally by 2025 - that is averaging around $350 for each of the 29 billion internet connected devices.  This white paper discusses the scale and inevitability of cyber crime, the increasing compliance demands from DORA and NIS2 regulations and offers three strategies to respond more effectively to them and enhance your current prevention approaches.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"zh_CN","og_type":"article","og_title":"The $10.5 Trillion Cyber Threat: Incident Strategies for Survival","og_description":"If measured as a country, cyber crime would be the world's third largest economy after the U.S. and China (Cyber Crime Magazine, April 2024). It is predicted to inflict damages totaling $10.5 trillion globally by 2025 - that is averaging around $350 for each of the 29 billion internet connected devices.  This white paper discusses the scale and inevitability of cyber crime, the increasing compliance demands from DORA and NIS2 regulations and offers three strategies to respond more effectively to them and enhance your current prevention approaches.","og_url":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/resources\/whitepapers\/cyber-security-incident-strategies-for-survival\/","og_site_name":"Kepner-Tregoe","article_modified_time":"2025-07-16T10:55:35+00:00","og_image":[{"width":1000,"height":447,"url":"https:\/\/staging.kepner-tregoe.com\/wp-content\/uploads\/2025\/07\/The-10.5-Trillion-Cyber-Threat-Incident-Strategies-for-Survival-1-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"1 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/resources\/whitepapers\/cyber-security-incident-strategies-for-survival\/","url":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/resources\/whitepapers\/cyber-security-incident-strategies-for-survival\/","name":"The $10.5 Trillion Cyber Threat: Incident Strategies for Survival - Kepner-Tregoe","isPartOf":{"@id":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/resources\/whitepapers\/cyber-security-incident-strategies-for-survival\/#primaryimage"},"image":{"@id":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/resources\/whitepapers\/cyber-security-incident-strategies-for-survival\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.kepner-tregoe.com\/wp-content\/uploads\/2025\/07\/The-10.5-Trillion-Cyber-Threat-Incident-Strategies-for-Survival-1-1.jpg","datePublished":"2025-01-15T16:10:45+00:00","dateModified":"2025-07-16T10:55:35+00:00","description":"If measured as a country, cyber crime would be the world's third largest economy after the U.S. and China (Cyber Crime Magazine, April 2024). It is predicted to inflict damages totaling $10.5 trillion globally by 2025 - that is averaging around $350 for each of the 29 billion internet connected devices. This white paper discusses the scale and inevitability of cyber crime, the increasing compliance demands from DORA and NIS2 regulations and offers three strategies to respond more effectively to them and enhance your current prevention approaches.","breadcrumb":{"@id":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/resources\/whitepapers\/cyber-security-incident-strategies-for-survival\/#breadcrumb"},"inLanguage":"zh-Hans","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.kepner-tregoe.com\/zh-hans\/resources\/whitepapers\/cyber-security-incident-strategies-for-survival\/"]}]},{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/resources\/whitepapers\/cyber-security-incident-strategies-for-survival\/#primaryimage","url":"https:\/\/staging.kepner-tregoe.com\/wp-content\/uploads\/2025\/07\/The-10.5-Trillion-Cyber-Threat-Incident-Strategies-for-Survival-1-1.jpg","contentUrl":"https:\/\/staging.kepner-tregoe.com\/wp-content\/uploads\/2025\/07\/The-10.5-Trillion-Cyber-Threat-Incident-Strategies-for-Survival-1-1.jpg","width":1000,"height":447,"caption":"The $10.5 Trillion Cyber Threat - Incident Strategies for Survival"},{"@type":"BreadcrumbList","@id":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/resources\/whitepapers\/cyber-security-incident-strategies-for-survival\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/"},{"@type":"ListItem","position":2,"name":"\u8d44\u6e90","item":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/resources\/"},{"@type":"ListItem","position":3,"name":"White Papers","item":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/resources\/whitepapers\/"},{"@type":"ListItem","position":4,"name":"The $10.5 Trillion Cyber Threat: Incident Strategies for Survival"}]},{"@type":"WebSite","@id":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/#website","url":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/","name":"Kepner-Tregoe","description":"Leaders in problem solving","publisher":{"@id":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-Hans"},{"@type":"Organization","@id":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/#organization","name":"Kepner-Tregoe","url":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/","logo":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/#\/schema\/logo\/image\/","url":"https:\/\/staging.kepner-tregoe.com\/wp-content\/uploads\/2025\/06\/kepner-tregoe-logo.png","contentUrl":"https:\/\/staging.kepner-tregoe.com\/wp-content\/uploads\/2025\/06\/kepner-tregoe-logo.png","width":264,"height":38,"caption":"Kepner-Tregoe"},"image":{"@id":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/14495"]}]}},"_links":{"self":[{"href":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/wp-json\/wp\/v2\/white-paper\/39326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/wp-json\/wp\/v2\/white-paper"}],"about":[{"href":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/wp-json\/wp\/v2\/types\/white-paper"}],"author":[{"embeddable":true,"href":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/wp-json\/wp\/v2\/users\/8"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/wp-json\/wp\/v2\/media\/39327"}],"wp:attachment":[{"href":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=39326"}],"wp:term":[{"taxonomy":"white-paper-type","embeddable":true,"href":"https:\/\/staging.kepner-tregoe.com\/zh-hans\/wp-json\/wp\/v2\/white-paper-type?post=39326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}