Form: Cost-of-Breach DisclosureSource: IBM 2025Filed: 28 Apr 2026
DataBreachCost.comOpen calc
Schedule 05 / Prevention ROI10 controls / IBM-verified savings

Investment vs avoided cost

Every $1 in MFA blocks $32 of breach.

10 controls ranked by IBM 2025-verified ROI multiple. Implementation cost ranges, breach-cost saving, ROI calculation, tool categories, and 5-step implementation checklist for each. Vendor-neutral.

Top single saver

-$2.66M

Incident response team

Best ROI

32x

MFA across all accounts

Without controls

$5.72M

No AI/automation deployment

With AI/automation

$3.84M

Extensive deployment

Section 05.1 / Controls ranked by ROI

The investment ladder

Sorted by ROI multiple. Annual cost figures are mid-market typical (organizations between 500-5,000 employees). Smaller organizations realise the savings at lower implementation cost; enterprises pay more but face larger downside.

Rank #01 / Implementation: 1-3 months

MFA (Multi-Factor Authentication)

$25K

cost / yr

-$800K

avoided

32x

ROI

Credential theft drives roughly 16% of all breaches. MFA blocks 99.9% of automated attacks and over 76% of targeted attacks. The highest single-control ROI in the IBM dataset, especially when applied to privileged accounts, VPN, and remote-access surfaces.

Implementation checklist

  • [x]Enforce on all accounts, no exceptions
  • [x]Prioritize privileged / admin accounts first
  • [x]Use FIDO2 keys for executives
  • [x]Deploy conditional-access policies
  • [x]Monitor for MFA-fatigue attacks

Tool categories (vendor-neutral)

Phishing-resistant FIDO2 / hardware keysAuthenticator apps (TOTP)Passkeys

Rank #02 / Implementation: 1-2 months

Employee Security Training

$100K

cost / yr

-$1500K

avoided

15x

ROI

Human error is the precursor to roughly 35% of breaches. Security-awareness training reduces phishing click rates by 75%+ and is consistently the highest-ROI investment in IBM's control set after MFA. The $1.5M average saving comes from earlier detection and reduced human-error frequency.

Implementation checklist

  • [x]Quarterly phishing simulations
  • [x]Annual security-awareness certification
  • [x]Role-specific training (finance, IT, executives)
  • [x]Just-in-time training triggered by risky behaviour
  • [x]Insider-threat awareness program

Tool categories (vendor-neutral)

Phishing-simulation platformsAnnual security-awareness certificationJust-in-time micro-training

Rank #03 / Implementation: 6-12 months

AI & Security Automation

$300K

cost / yr

-$1900K

avoided

6.3x

ROI

Organizations with extensive AI and automation deployment averaged $3.84M in breach costs versus $5.72M for those without. Detection and containment speed improves dramatically. The 2025 figure of $1.9M is the largest single-technology cost difference IBM has ever measured.

Implementation checklist

  • [x]Deploy UEBA on identity logs
  • [x]Integrate AI-assisted triage into SOC
  • [x]Automate alert enrichment and triage
  • [x]Use predictive risk scoring on vulnerabilities
  • [x]Continuously tune detection rules

Tool categories (vendor-neutral)

AI-powered SIEMUEBA (user / entity behaviour analytics)AI-assisted threat huntingAutomated phishing triage

Rank #04 / Implementation: 3-6 months

Incident Response Team

$500K

cost / yr

-$2660K

avoided

5.3x

ROI

A dedicated IR team with tested runbooks is the single biggest cost reducer in IBM's 2025 dataset. Organizations with an IR team and tested plan averaged $3.27M versus $5.93M without one. The team need not be in-house: retained MDR / IR firms produce similar savings provided runbooks are rehearsed.

Implementation checklist

  • [x]Hire / appoint a dedicated IR lead
  • [x]Build and rehearse runbooks per threat type
  • [x]Run tabletop exercises quarterly
  • [x]Establish SIEM / SOAR tooling
  • [x]Define communication chains and escalation thresholds

Tool categories (vendor-neutral)

SIEM / SOAR platformOn-call orchestrationIR retainer (external)

Rank #05 / Implementation: 2-4 months

Encryption (Data at Rest & Transit)

$80K

cost / yr

-$360K

avoided

4.5x

ROI

Encrypting data at rest and in transit ensures stolen records are useless without keys. Even if attackers exfiltrate data, regulatory exposure is dramatically reduced because most state and federal laws contain encryption safe harbors that limit notification obligations.

Implementation checklist

  • [x]Encrypt all databases at rest (AES-256)
  • [x]Enforce TLS 1.3 for all data in transit
  • [x]Implement field-level encryption for PII / PHI
  • [x]Use HSMs for key management
  • [x]Audit encryption coverage quarterly

Tool categories (vendor-neutral)

KMS / HSM platformsTLS 1.3 enforcementField-level encryption for PII / PHI

Rank #06 / Implementation: 12-18 months

Zero Trust Architecture

$400K

cost / yr

-$1500K

avoided

3.75x

ROI

Zero Trust assumes breach and verifies every access request regardless of network location. Organizations with a mature Zero Trust approach averaged $3.76M in breach costs versus $5.04M without it. Microsegmentation and continuous verification reduce blast radius after initial compromise.

Implementation checklist

  • [x]Implement identity-centric access (MFA everywhere)
  • [x]Microsegment networks by workload
  • [x]Enforce least-privilege access (PAM)
  • [x]Continuous device-health verification
  • [x]Encrypt all east-west traffic

Tool categories (vendor-neutral)

Identity-centric access (PAM)ZTNA (Zero Trust Network Access)Microsegmentation

Rank #07 / Implementation: 2-4 months

Threat Intelligence

$200K

cost / yr

-$400K

avoided

2x

ROI

Threat-intelligence integration helps SOCs prioritise alerts and recognise emerging campaigns. The marginal saving is smaller than top-ranking controls but the cost is also lower, producing a respectable ROI.

Implementation checklist

  • [x]Integrate intel feeds into SIEM
  • [x]Subscribe to relevant ISACs
  • [x]Map detections to ATT&CK
  • [x]Brief executives on emerging threats
  • [x]Update IoCs continuously

Tool categories (vendor-neutral)

Commercial threat-intel feedsISAC sharingOpen-source intel (MITRE ATT&CK)

Rank #08 / Implementation: 6-12 months

DevSecOps

$150K

cost / yr

-$249K

avoided

1.7x

ROI

Shifting security left reduces the cost of fixing vulnerabilities from $80 per bug in production to less than $1 at design. The IBM saving of $249K is conservative; the larger benefit is fewer breaches in the first place.

Implementation checklist

  • [x]Integrate SAST into CI/CD pipelines
  • [x]Run DAST on every release
  • [x]Automate dependency scanning
  • [x]Include security review gates in sprints
  • [x]Train developers on OWASP Top 10

Tool categories (vendor-neutral)

SASTDASTDependency scanning (SCA)Secret scanning

Rank #09 / Implementation: 1-2 months

Penetration Testing

$50K

cost / yr

-$100K

avoided

2x

ROI

Annual penetration testing identifies exploitable issues before adversaries do. The IBM saving figure is conservative because the true value is probabilistic, an unprevented breach simply doesn't appear in the dataset. Higher value when paired with continuous external attack-surface monitoring.

Implementation checklist

  • [x]Annual external pen test (network + app)
  • [x]Continuous attack-surface monitoring
  • [x]Targeted re-tests after major changes
  • [x]Optional: ongoing bug-bounty program

Tool categories (vendor-neutral)

External pen-test engagementContinuous attack-surface monitoringBug-bounty program

Rank #10 / Implementation: 1-2 months

Cyber Insurance

$75K

cost / yr

-$0K

avoided

0x

ROI

Cyber insurance is risk transfer rather than cost reduction. It cannot prevent a breach but can soften the financial impact. Carriers increasingly require named controls (MFA, EDR, IR retainer) before binding, so the underwriting itself enforces hygiene.

Implementation checklist

  • [x]Engage broker for limit / sub-limit modelling
  • [x]Implement carrier-required controls before binding
  • [x]Review exclusions (nation-state, ransomware sub-limits)
  • [x]Test claim notification process

Tool categories (vendor-neutral)

Cyber liability policyBreach-response retainerIR carrier panel

Primary source:IBM Cost of a Data Breach Report 2025 (control savings); typical implementation cost ranges aggregated from public vendor pricing and analyst pricing benchmarks (Forrester, Gartner). Last verified April 2026.

Section 05.2 / Stack economics

Full stack vs $4.44M average

Total annual cost

$1880K

All 10 controls implemented

Maximum theoretical saving

-$9.47M

If every IBM-verified saving stacks (real-world: 40-60%)

vs average breach

$4.44M

Global average IBM 2025


The full security stack costs roughly the same per year as the IBM 2025 average breach is multiples larger than. The IBM dataset reports that organizations with extensive AI / automation and a tested IR plan averaged $3.84M in breach costs versus $5.72M for those without. The control investment pays back inside a single avoided incident.

Index / Companion schedules

Schedule F / Reference Q&A

Frequently Asked Questions