Miscellaneous Data Points

Data Time

Metric

Value

Unit

Source

Data Time

Metric

Value

Unit

Source

2003

Insider / outsider security breach ratio

Insider: 29%

Outsider: 71%

%

Keeney et al., 2005

2003

Computer-systems intrusions leading to losses

Insider: 70%

Outsider: 30%

%

https://open-measure.atlassian.net/wiki/spaces/QUOT/pages/1472757858

2004

Computer-systems intrusions leading to losses

Insider: 77%

Outsider: 23%

%

https://open-measure.atlassian.net/wiki/spaces/QUOT/pages/1472725229

2011

IAM program typical duration

1-3

year

https://open-measure.atlassian.net/wiki/spaces/QUOT/pages/1451098228

2018

Budget/staff allocations for cyber risk management domains: Identity and Access Management

11

%

Friedman and Eckenrode, 2018, p. 6

2019

Identity lifecycle management processes for the File Systems Management discipline

2.5

FTE

One Identity, 2020, p. 2

2019

Global IAM market valuation

11.82 billion

USD

Verified Market Research, 2020(2)

2020

Identity lifecycle management processes for the File Systems Management discipline

0.5

FTE

One Identity, 2020, p. 2

2021

Ratio of data breaches involving stolen credentials

37%

%

https://open-measure.atlassian.net/wiki/spaces/QUOT/pages/1496514591

2027

Project (in 2020) global IAM market valuation

29.79 billion

USD

Verified Market Research, 2020(2)

 


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.