Contact Us

Verizon Threat Research Advisory Center

Enhance your cyber resiliency with the help of our incident response experts.

Cyber resiliency demands that organizations have a proven response plan for a wide array of incidents that can disrupt operations and imperil sensitive data.  And the best response plans are powered by threat intelligence tailored to an organization's specific risk profile. Over the last ten years our Verizon Threat Research Advisory Center (VTRAC) has investigated thousands of data breaches worldwide, and we leverage our expertise in investigations, forensics and discovery to help companies create effective incident response plans.

The VTRAC team brings together experts from the military, law enforcement, and IT technical backgrounds, and we are well-versed in criminal and civil investigative requirements.  Further, we are a payment card industry approved Qualified Forensics Investigator (QFI) and Qualified Incident Response Assessor (QIRA). VTRAC members are located throughout Asia-Pacific, the Americas, and Europe/Middle East.

Review Current Cybersecurity Threat Landscape

Monthly Intelligence Briefing 

Stop treating the symptoms - it is time to address the source.

Verizon’s annual Payment Security Report on payment card security and compliance with the Payment Card Industry Data Security Standards (PCI DSS) has become vital reading for those responsible for data security or compliance with security standards like GDPR, HIPAA or FISMA.

Prepare and Respond Like a Pro.

Introducing our first ever data-driven, scenario-based approach focusing on incident preparedness and response.   The Verizon Incident Preparedness and Response Readiness (VIPR) Report draws on  three years  of  Verizon’s Incident Response Plan “readiness assessments” and  breach simulation exercises, allowing us to share with you valuable ”lessons learned” to optimize your IR plan. With the VIPR, you’ll gain first-hand insight about the six phases of incident response and can apply what you’ve learned by using five “breach scenario” simulation kits included in the report.

Insider Threat Report:  Out of sight should never be out of mind.

When trusted insiders turn malicious, the motives are many: theft, espionage and even plain-old curiosity -- and the damage can be ruinous.  The team that brings you Verizon’s annual Data Breach Investigations Report shows you how to fight back with 11 proven countermeasures -- and new ideas for building a better Insider Threat Program.

Lessons Learned from Real-World Investigations.

For 11 years, the Data Breach Investigations Report has analyzed hundreds of thousands of real-world incidents and data breaches to help security professionals better understand what they’re up against.

As we look at the data breaches themselves, certain scenarios tend to repeat - scenarios that aren’t so much about threat actors or exploited vulnerabilities, but more about the situations in which the victim organizations find themselves. Here are some scenarios drawn from real-world investigations. Each is told from a different point of view, covering critical decision pivot points, actions taken and crucial lessons learned. 

A Gartner Leader.

Recognized by Industry Experts.

Our execution and vision helped make us a Leader in Gartner's Magic Quadrant for Managed Security Services, Worldwide* seven years running.


Related products

*Gartner, Magic Quadrant for Managed Security Services, Worldwide, Toby Bussa, Kelly M. Kavanagh, Sid Deshpande, Pete Shoard, May 2019

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.