92025 DBIR How to use this report
Questions?
Comments?
Concerns?
Let us know! Send us a note at
[email protected], reach out
to Verizon Business (or one of
the authors) on LinkedIn, or
go bug your favorite Verizon
Business Representative for a
briefing on the report.
If your organization aggregates
incident or security data and
is interested in becoming
a contributor to the annual
Verizon DBIR (and we hope you
are), the process is very easy
and straightforward. Please
email us at dbircontributor@
verizon.com so we can meet
and see how we can make
this work.
Cyber Security NSW have been
using the VERIS framework
for incident recording for
over three years. At the time
of choosing VERIS we were
looking for an effective and
consistent way to record and
compare incidents. A number
of frameworks were assessed
against a set of weighted
criteria, including complexity,
features, learning curve,
documentation, popularity and
support, and integration and
interoperability with existing
systems and processes.
VERIS was selected for a
number of factors, including
that it is scalable in complexity
and enables security incidents
to be recorded in a structured
and consistent way, allowing for
both human and technological
factors. It also captures the
varying degrees of successful
and failed attacks, which is
important in assessing threat
and risk. Cyber Security NSW
have found using the VERIS
framework is an easy way to
be able to compare year on
year data and find great value
in being able to compare the
NSW environment to what
is happening on a global
scale, both in government
and more broadly.
A very
VERISversary
This year marks the 15th anniversary
of the VERIS framework, which was
introduced
6
to the world on Mar 1,
2010, in Metricon 4.5 by Wade Baker,
Alex Hutton and Chris Porter—some
of the original, old-school DBIR team
members. It would be nigh impossible to
consolidate all the datasets we gather
and subsequently write the report
you folks all read and love without the
foresight of this original team.
Back then, in 2010, the report was just
onboarding its first external contributor,
the U.S. Secret Service, and that
seemed like an imperative to help ensure
that incident data could be collected and
analyzed from disparate sources. Now,
in 2025, with several dozen incident
contributors, there is really no other
way to do what we do. We cannot help
but wonder
7
if our DBIR forefathers are
proud of the edifice that was built on
their foundation.
But enough of the past. We have
found over the years that there are a
good number of organizations from
all industries and the Public Sector
that leverage a version (or subset)
of VERIS to support their security
incident recording and risk management
practices. Looking at the future, the
DBIR team would like to make VERIS
more useful for the industry in general,
and that will entail a great deal of
streamlining of the standard and the
tooling to go alongside with it.
We will have been meeting
8
folks at the
RSA Conference to discuss how they
use VERIS and for what purpose in
order to better inform the direction of
the work we want to undertake. If you
want to chat about this, please reach
out to us at
[email protected] .
Throughout 2025, we expect to clean
up all the content and current tooling we
have to make it more discoverable and
easier to use, such as:
• The VERIS Webapp
9
that supports
the creation of JSON objects based
on the VERIS schema
• The VERIS Style Guide,
10
which
provides a lot of examples and
use cases on how the DBIR team
leverages VERIS to code many of
the most commonly found breaches
in the wild
• Mappings
11
alongside other standards
such as MITRE ATT&CK (Enterprise,
ICS and Mobile) and the CIS Critical
Security Controls
We would like to wrap up this
section with a brief testimonial from
the Cyber Security NSW folks in
New South Wales, Australia.
6. https://www.securitymetrics.org/attachments/Metricon-4.5-Baker-Hutton-VERIS.pdf
7. They are all active in the industry and are good friends of the report, of course; we just don’t ask them
because we don’t want to hear the answer.
8. Future prophetic tense. It had always happened and it probably has already happened when
you read this.
9. https://verisframework.org/veris_webapp
10. https://github.com/vz-risk/veris/tree/master/style_guide
11. https://github.com/vz-risk/veris/tree/master/mappings