contact us

Use the form on the right to contact us.

You can edit the text in this area, and change where the contact form on the right submits to, by entering edit mode using the modes on the bottom right.

3 Jakobs torg
Stockholm, Stockholms län, 11152

AmCham Sweden is the voice of American business in Sweden. We are champions of US - Swedish trade and investment and US commercial interests in Sweden and give members a networking platform, critical business information, and an amplified voice.



Verizon Data Breach Investigations Report

For the ninth time, the 2016 Data Breach Investigations Report (DBIR) lifts the lid on what's really happening in cybersecurity. The 2016 dataset is bigger than ever, examining over 100,000 incidents, including 2,260 confirmed data breaches across 82 countries. With data provided by 67 contributors including security service providers, law enforcement and government agencies, this year's report offers unparalleled insight into the cybersecurity threats you face.


Verizon Data Breach Digest – Scenarios from the field

There is tremendous commonality in real-world cyber-attacks. In fact, according to Verizon RISK Team incident data set over the previous three years, just 12 scenarios represent over 60% of our investigations.1This report is our opportunity to slice through the fear, uncertainty, and doubt that’s so prevalent in security to reveal what’s really happening in the cyber investigation field. These scenarios paint the picture behind the numbers  - they illustrate how breaches work, and include intrusion vectors, threat actions, and targeted vulnerabilities. Most of all, they help to prescribe a recipe for prevention, mitigation, and, if necessary, efficient and effective incident response.

  • Built on first-hand experience and data set
  • An educational effort for the market and end-users
  • Many data breach victims believe they are in isolation, dealing with sophisticated tactics and zero-day malware never seen before
  • There is tremendous commonality in real-world cyber-attacks; at any given point in time, a small number of breach scenarios comprise the vast majority of incidents we investigate
  • Slices through the Fear, Uncertainty, and Doubt that’s so prevalent in security to reveal what’s really in the cyber investigations trenches


Verizon Protected Health Information Data Breach Report.

Protected health information (PHI) is defined as personally identifiable health information collected on an individual, and covered under one of the state, federal or international data breach disclosure laws.

In the U.S., the disclosure of this type of information would trigger a duty to report the breach under the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health Act (HITECH), or one or more of the state laws. 

The purpose of this study is to shed light on the problem of medical data loss—how it is disclosed, who is causing it and what can be done to combat it. This is a far-reaching problem that impacts not only organizations that are victims of these breaches, but also doctor-patient relationships. And it can have consequences that spread more broadly than just those directly affected by the incidents.


Verizon PCI Compliance Report

The scale of recent payment-data breaches makes it clear that many organizations’ security measures aren’t slowing attackers down. In the Verizon PCI Compliance Report, we take a critical look at whether the problem is a result of current security standards or the way compliance is being approached, and what organizations can do to better manage the risk.

The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit cards from the major card schemes including Visa, MasterCard, American Express, Discover, and JCB. The PCI Standard is mandated by the card brands and administered by the Payment Card Industry Security Standards Council. The standard was created to increase controls around cardholder data to reduce credit card fraud. Validation of compliance is performed annually, either by an external Qualified Security Assessor (QSA) or by a firm specific Internal Security Assessor (ISA) that creates a Report on Compliance (ROC) for organizations handling large volumes of transactions, or by Self-Assessment Questionnaire (SAQ) for companies handling smaller volumes.

Member Login
Welcome, (First Name)!

Forgot? Show
Log In
Enter Member Area
My Profile Log Out