Data is everywhere, and what constitutes sensitive data for organizations today has greatly expanded. Security and privacy pros must align their concerns with actual breach causes, understand what types of data are being compromised, match the type of compromised data to post breach impact and response actions, and benchmark their investment in data security technologies for cybersecurity programs and privacy compliance. Security and privacy pros should use this report to understand trends and modify their programs accordingly.