CASE FILE // PC-2026-04
Status: Open


Filing 04.03.00Field 27 APR 2026Classification PublicStatus Open

Phishing cost for enterprise: $5.46M average and the 9-figure top tail

Average breach cost $5.46M for 25,000+ employee organisations (IBM 2025). The headline figure understates the top-tail risk: major Fortune 500 events routinely reach $10M+ and have crossed $100M in published cases. SEC Item 1.05 disclosure, derivative-suit exposure, and class-action settlement layer drive the structural cost premium.

Exhibit A

The enterprise breach-cost picture in 2026


Enterprise phishing breach cost sits at $5.46M average per IBM 2025 for organisations with more than 25,000 employees. The figure is above the cross-sector mean of $4.88M and above the mid-market $4.20M. The premium reflects regulatory exposure (SEC Item 1.05, NYDFS, DORA, sector-specific frameworks), larger absolute notification and monitoring spend, heavier legal and class-action exposure, and the cost of board-and-executive time during the disclosure window. The headline average obscures the more important point about the segment: the top tail is extreme.

Major Fortune 500 phishing-initiated events through 2022-2025 have produced disclosed costs that dwarf the $5.46M average. Change Healthcare (UnitedHealth Group) 2024 at approximately $2.45B (phishing-initiated credential reuse pivoted to ransomware, over 100M individuals affected). MGM Resorts 2023 at approximately $100M (vishing-initiated MFA-reset pivot to ransomware, multi-week operational disruption). Caesars Entertainment 2023 at approximately $15M ransom plus undisclosed remediation (same threat-actor cluster as MGM, different response strategy). T-Mobile 2021 at $350M class-action settlement plus remediation (phishing-initiated credential use against API surface). Equifax 2017 at approximately $1.4B in cumulative settlement and remediation (not directly phishing-initiated but illustrative of enterprise-scale event cost). The 9-figure top tail is the cost reality enterprise risk committees must size against, not the IBM average.[IBM 2025 enterprise sub-cohort + public 8-K filings + class-action settlement records]

Exhibit B

SEC Item 1.05 and the 4-business-day disclosure window

REFERENCE

SEC Item 1.05 of Form 8-K, effective December 2023, requires public-company disclosure of a material cybersecurity incident within four business days of materiality determination. The rule was substantially debated during its rule-making process; the SEC's final position is that the materiality bar is the standard total-mix-of-information test under federal securities law, and that the disclosure must include the nature, scope, and timing of the incident plus its material impact or reasonably likely material impact on the registrant.

The practical impact on enterprise breach-cost modelling is substantial in several ways. First, the four-business-day window forces rapid materiality determination, which compresses the forensic-investigation engagement into a higher-cost timeframe. Second, the disclosure itself becomes a market-moving event that can produce a discrete share-price decline and associated derivative-suit exposure. Third, the disclosure timing creates enforcement risk: the 2024-2025 SEC enforcement docket includes several actions where delayed disclosure was the violation, separate from any underlying control failure. Fourth, the disclosure language itself becomes a litigation surface where any inaccuracy or qualifications can be re-litigated in follow-on civil suits.

The 2024-2025 enterprise disclosure record shows the rule is working as intended in driving faster disclosure. The median time from incident discovery to 8-K filing has compressed from approximately 60 days under the pre-2023 voluntary-disclosure regime to approximately 12 days under Item 1.05. The disclosure rate has also risen: events that historically might have been settled quietly are now appearing in the public 8-K record because the SEC has signalled that non-disclosure carries higher enforcement risk than disclosure. The downstream effect is greater public visibility into enterprise phishing events, which has driven both increased class-action filing and increased D&O insurance scrutiny of the disclosure-and-control posture.[SEC Item 1.05 rule text + SEC enforcement docket 2023-2025 + Latham + WLRK securities-law analyses 2024-2025]

Exhibit C

Caremark-doctrine derivative suits and director personal liability


Beyond the corporate-liability layer, enterprise phishing-event cost increasingly includes director-personal-liability exposure through Caremark-doctrine derivative suits. The Caremark line of cases (In re Caremark, 1996, refined by Marchand v. Barnhill 2019 and Hughes v. Hu 2020) establishes a board duty to ensure that information and reporting systems exist and are monitored on mission-critical risks. Cyber is now treated as mission-critical for any public company, and a board that cannot demonstrate active oversight of cyber controls faces credible derivative-suit exposure when a major event occurs.

The 2023-2025 Caremark docket includes multiple cases where enterprise phishing events triggered derivative-suit filings naming directors in personal capacity. The settlement bands for these cases vary widely: most settle through indemnification provisions and D&O insurance without direct director payout, but the legal-fee and time cost on the directors named is material. The threat of personal-capacity exposure has shifted board behaviour materially: cyber is now a standing agenda item at the audit committee or a dedicated cyber-risk committee in approximately 70 percent of S&P 500 boards as of 2024-2025, up from approximately 25 percent in 2019.

The implication for enterprise cyber-spend prioritisation is that the board-level governance posture is itself a control input. Boards that can demonstrate documented cyber-risk oversight (regular CISO briefings, defined risk-tolerance, exercise participation, independent assessment) reduce derivative-suit exposure substantially. The cost of governance is small relative to the cost of an undefended derivative suit, and the post-event ability to point to documented oversight is one of the highest-leverage defensibility investments enterprise boards make.[In re Caremark 1996 + Marchand v. Barnhill 2019 + Hughes v. Hu 2020 + 2023-2025 derivative-suit docket]

Exhibit D

Cost-line build-up against the $5.46M figure


Cost lineShare of $5.46MDollar figureDriver
Legal + class-action exposure22%$1.20MClass-action filing near-routine above 100K records
Notification + monitoring18%$983KLower per-record but very high record count
Incident response + forensics15%$819KPrivileged-counsel-led, in-house team + IR firm
Direct wire / ransomware loss13%$710KBEC dominant; ransomware where it occurs
Regulatory fines (SEC + sector + state)11%$601KStacked regulatory layers
Reputation + customer churn9%$491KLower per-customer than mid-market
Board + executive time + D&O scrutiny7%$382KDistinct enterprise line; high opportunity cost
Security-control rebuild5%$273KOften pre-funded; smaller post-event spike

The legal-and-class-action line is structurally the largest at enterprise scale because affected-record counts in major enterprise breaches frequently exceed 1 million, which lifts the class-action exposure above the $1M settlement bar that triggers near-routine filing. The board-and-executive-time line is unique to the enterprise segment and reflects the opportunity cost of senior leadership during the disclosure and remediation windows.[IBM 2025 enterprise sub-cohort + class-action settlement records 2020-2025]

Exhibit E

The phishing-defence portion of the enterprise cyber budget


Major Fortune 500 firms in 2024-2025 typically spend 8 to 15 percent of total IT budget on cybersecurity, with the dollar amount ranging from $50M to $500M+ annually depending on firm size and industry. Phishing-defence-specific spending (email security platforms, awareness training, MFA programs, behavioural-detection tooling, identity-platform investments) typically represents 12 to 20 percent of the total cyber budget. For a Fortune 500 firm with $200M annual cyber budget, that puts phishing-defence at roughly $24M to $40M per year.

The line-item allocation within phishing defence varies but follows recognisable patterns. Email security platforms (Proofpoint, Mimecast, Abnormal, Microsoft Defender for Office 365 Plan 2) typically account for 25 to 35 percent of phishing-defence spend at $5 to $15 per user per month for enterprise tiers. Identity-platform and MFA programs (Okta, Microsoft Entra ID, Duo, plus FIDO2 hardware) account for 30 to 40 percent. Behavioural-detection and threat-intelligence tooling accounts for 15 to 25 percent. Awareness training and phishing simulation accounts for 10 to 15 percent. Incident-response retainer and managed-detection services account for the residual.

The single biggest 2024-2025 shift in enterprise phishing-defence allocation has been the rise of behavioural-AI email security at the expense of legacy gateway spending. Abnormal Security, Sublime Security, IRONSCALES, and similar behavioural-AI platforms have grown rapidly because they catch attack patterns (AitM, social-engineering BEC, vendor-impersonation) that the legacy gateway model handles poorly. Enterprise architecture choices increasingly run a behavioural-AI platform alongside or in place of the legacy gateway, with the gateway maintained for backwards-compatibility and rule-based hygiene rather than as the primary phishing-defence layer.[Forrester Cyber Security Market Forecast 2024-2025 + IDC Worldwide Security Spending Guide 2024 + Gartner Magic Quadrant Email Security 2024]

Exhibit F

Controls priority for enterprise: post-2023 reality check


#1Universal phishing-resistant MFA + token-binding

~95% of credential-pivot value
Cost: $2M to $10M one-time + ongoing

FIDO2 across the workforce plus token-protection conditional access (Microsoft) or DBSC (Google) to bind session cookies to device. Multi-year program at enterprise scale. The single most-leveraged structural investment.

#2Behavioural-AI email security alongside legacy gateway

~70% of detected AitM and BEC attempts
Cost: $3M to $15M per year

Behavioural-AI platform catches attack patterns the legacy gateway misses. Run alongside or in place of legacy gateway depending on architecture choice. Abnormal Security, Sublime, IRONSCALES are leading vendors.

#3Out-of-band confirmation on outbound wires above threshold

~80% of treasury BEC wire-loss
Cost: $0 tooling, policy work

Hard rule that wires above a defined threshold require dual approval through the banking portal with out-of-band verification of any banking-detail change. Cheap and high-leverage.

#4Privileged-access blast-radius reduction

~60% of post-compromise pivot cost
Cost: 6-18 months of identity-platform work

Just-in-time elevation, standing-access elimination, role-based scoping. Reduces the value of any single compromised identity dramatically. The single most-leveraged architectural control.

#5In-house SOC + 24x7 IR capability

~50% of dwell time
Cost: $5M to $30M per year

Enterprise scale typically justifies in-house SOC with 24x7 coverage. Combined IR-retainer for surge capacity during major events. Cost is high but the alternative (external-only IR for events at enterprise scale) is operationally untenable.

#6Board cyber-risk committee with documented oversight

Derivative-suit defensibility
Cost: Board-governance time

Standing agenda at audit committee or dedicated cyber-risk committee. Reduces Caremark-doctrine derivative-suit exposure. The post-event ability to point to documented oversight is one of the highest-leverage defensibility investments.

Exhibit G

Frequently filed questions

ON RECORD

What is the phishing cost for a large enterprise?[open]

$5.46M average per IBM 2025 for 25,000+ employees. Top tail is extreme: major events routinely reach $10M+ and have crossed $100M (MGM Resorts) and $1B (Change Healthcare, Equifax) in published cases.

What does SEC Item 1.05 require?[open]

Public-company disclosure of material cybersecurity incidents within four business days of materiality determination. Effective December 2023. The four-day window forces rapid materiality work and creates direct enforcement-risk exposure for delayed disclosure.

Are directors personally liable for cyber breaches?[open]

Increasingly, yes. Caremark-doctrine derivative suits naming directors are routine after 7-figure-plus enterprise phishing events. Most settle through D&O insurance but the legal-fee and time exposure on named directors is material.

What is the enterprise class-action exposure?[open]

Near-routine for breaches above 100K affected records. Settlement medians sit just above $2.1M but the distribution is heavily right-skewed: major events frequently settle at 8 or 9 figures.

What is the typical enterprise cyber-budget?[open]

8-15% of total IT budget for Fortune 500 firms in 2024-2025, with phishing-defence representing 12-20% of cyber spend. Dollar range $50M-$500M+ for total cyber, $24M-$40M+ for phishing-defence at $200M-cyber-budget firm.

Are enterprise organisations lower or higher cost per record?[open]

Lower per-record at enterprise scale (~$187 vs $164 cross-segment mean) because notification spend drops with volume. But aggregate event cost is higher because record counts are larger and regulatory plus litigation overhead is heavier.

What is the highest-leverage enterprise control?[open]

Universal phishing-resistant FIDO2 MFA plus token-binding. Multi-year program at enterprise scale. ~95% reduction in credential-pivot value across all phishing attack vectors.

Updated 2026-04-27