This paper is about an incident related to either successful or failed penetration testing effort against an organization. The Verizon 2014 ‘Data Breach Investigation Report is web application associated incident. The Verizon DBIR is annual report publication that offers analysis of data security incidents, with the particular emphasis on the data breaches.Scope of Data Breach Investigation ReportThe increasing the depth and scope of report creates it almost single constant efforts during the year. From the various cases worked through USSS in 2010, the scope narrowed to simply those containing confirmed structural information breaches in arrangement with the focus of DBIR. The scope supplementary narrowed to contain individual circumstances for which Verizon does not conduct a forensic investigation. Earlier performing arts the penetration test, choosing a team to implement the test and authoring ‘vendor Statement of Work’ the essential scope of penetration investigation must be determined. The scope of the penetration testing is cardholder data environment and whole system and network also connected to it (Hoehl, 2014). Recommendations for futureThese annual report have become depressingly familiar: Of the 1,935 2017 breaches analysed, almost 90% were accomplished using the same list of nine attack vectors, meaning they could probably have been stop by updating software, installing and keeping updated AV or firewalls. The last couple of years haven’t seen any “new” attacks; just repeats of the same well-known and long patched vulnerabilities exploited in the same ole way, 81 percent of breaches employ either reused/stolen passwords or weak/crackable ones. The most common attacks Denial of Service, payment card skimmers, human error and Ransom-ware. ConclusionWith malware and ransomware continuing to be the number 1 issue with company personnel opening infected email attachments, it was concluded that in 66 percent of the attacks reviewed, the primary infection point was caused by an employee opening an malicious attachment or clicking a link in an email. A very interesting conclusion from 2017 is that the healthcare industry has the easiest path on focusing on its number one threat which is the insider, almost 70 percent of the breaches suffered by the healthcare industry involved internal threats. Of those incidents over 80 percent of those breaches involved the loss of theft of equipment or documents, through either human error or privilege misuse. The Report notes the importance of paper documents in assessing risk in health care organizations.All in all, these reports continues to provide a reality check on what is going on in the industry and provide practical solutions to enhance security in all organizations be it through recommended activities of procedural or technical. While the report does a good job and presenting the numbers, facts and then tying it all together with threat actions that will allow companies to do a better job of detecting cyber incidents early and responding to them quickly thus reducing the window of opportunity that attackers have to exploit your network, locate sensitive information and make off with it. So in the absence of perfect detection the response portion needs more attention so that any incident will fail to become full blown breaches. Lastly what the report really needs is a way to tie all of the data into a risk format so the business world can have actionable intelligence.