Using Return Path Data to Protect Your Brand: Security Breakout Session - London

27
#RPWT Little Data, Big Decisions: The Path to Data Enlightenment Keynote 3:45 - 4:15 Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Session 5:00 - 5:45 Scott Roth, Chief Marketing Officer, Return Path Speakers: Guy Hanson, Sr. Director, Professional Services, Return Path Rob Holmes, General Manager, Email Fraud Protection, Return Path 4:15- 4:45 Real Data, Real Results: Customer Showcase & Panel Discussion 5:00 - 5:45 Using Return Path Data to Protect Your Brand: Security Breakout Session 5:45 - 7:00 Networking and cocktails Please join us as we wrap up the day! Opening Remarks Guest Speaker 3:00 - 3:45 Sara Murray, Entrepreneur & Founder of confused.com & Buddi 4:45 – 5:00 Coffee break

Transcript of Using Return Path Data to Protect Your Brand: Security Breakout Session - London

#RPWT

Little Data, Big Decisions: The Path to Data Enlightenment Keynote

3:45 - 4:15

Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Session

5:00 - 5:45

Scott Roth, Chief Marketing Officer, Return Path

Speakers:

Guy Hanson, Sr. Director, Professional Services, Return Path

Rob Holmes, General Manager, Email Fraud Protection, Return Path 4:15- 4:45

Real Data, Real Results: Customer Showcase & Panel Discussion

5:00 - 5:45 Using Return Path Data to Protect Your Brand: Security Breakout Session

5:45 - 7:00 Networking and cocktails Please join us as we wrap up the day!

Opening Remarks Guest Speaker

3:00 - 3:45

Sara Murray, Entrepreneur & Founder of confused.com & Buddi

4:45 – 5:00 Coffee break

Using Return Path Data to Protect Your Brand

Security Breakout Session

Rob Holmes, General Manager, Email Fraud Protection

Agenda • Email fraud trends and impact

• The power of data: email threat intelligence

• The Return Path Data Cloud • Tactics used by cybercriminals today

• Unite against email fraud: tips for defending your customers, brand, and

bottom line

• Questions

Email Fraud Trends & Impact

Email Delivers Business Value…

Increases Customer Loyalty

Boosts Revenue

Reduces Operating Costs

…But Its Impact Is Being Eroded

5 out of 6 big companies

are targeted with phishing attacks

Phishing costs brands worldwide $4.5 billion

each year

RSA identifies a phishing attack

every minute

Email fraud has up to a 45%

conversion rate

Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm

$4.5 B 1 MIN 5/6 45%

Phishing Leads To – Revenue Losses • Reduced effectiveness of email

• ISPs don’t know what to trust

• Reduced trust in brand: • Subscribers don’t know what to trust

Customers are 42% less likely to interact with a brand after being phished or spoofed.

Phishing Leads To – Unwanted Media Attention

“If you boil the jobs down of IT security professionals, they are ultimately tasked with protecting the brand… If you have a breach, research suggests that 60% of your customers will think about moving and 30% actually do.”

Bryan Littlefair Global Chief Information Security Officer

Aviva

Investigation Remediation

Phishing Leads To – Remediation Costs

Fraud Losses Malware Infection

Can You Spot a Spoof?

Anatomy Of A Phishing Email

to: You <[email protected]>

from: Phishing Company <[email protected]>

subject: Unauthorized login attempt

Dear Customer, We have recieved noticed that you have recently attempted to login to your account from an unauthorized device. As a saftey measure, please visit the link below to update your login details now: http://www.phishingemail.com/updatedetails.asp Once you have updated your details your account will be secure from further unauthorized login attempts. Thanks, The Phishing Team

1 attachment

Making an email look legitimate by

spoofing the company name in

the “Display Name” field.

Tricking email servers into

delivering the email to the inbox by spoofing the

“envelope from” address hidden in

the technical header of the email.

Including logos, company terms,

and urgent language in the

body of the email.

Making an email appear to come from a brand by

using a legitimate company domain, or a domain that looks like it in the “from”

field.

Creating convincing subject lines to drive

recipients to open the message.

Including links to malicious websites

that prompt users to give up

credentials

Including attachments

containing malicious content.

The Power of the Right Data

Knowledge Is Your Best Defense

• We know there is no silver bullet.

• But defense starts with understanding.

• Data is the key to that understanding.

Breadth, Depth, and Speed

Contactually Molto Paribus GetAirHelp

Message Finder Unsubscriber Organizer

EMAIL THREAT DATA · Consumer inbox data · Email delivery data · Authentication results · Message level data · SPAM trap & complaints data

EMAIL THREAT INTELLIGENCE

· Domain-spoofing alerts

· Brand-spoofing intelligence

· Suspicious activity map

· Fraudcaster URL feed

· Sender Score: IP reputation

Email Fraud: Primary Attack Vectors

Domain Spoofing (from domains owned by the brand)

Brand Spoofing (from domains outside the brand’s control)

[email protected] [email protected]

30% of Attacks Spoof Domains You Own

30% Domain Spoofing • Active Emailing Domains • Non-Sending Domains • Defensively-Registered

Domains

70% Brand Spoofing • Cousin Domains • Display Name Spoofing • Subject Line Spoofing • Email Account Spoofing

Source: Return Path / APWG White Paper, 2014

Unite Against Email Fraud Tips for defending your customers, your brand, and your bottom line.

DMARC (Domain-based Message Authentication Reporting & Conformance):

• Technical specification created to help reduce the potential for email-based abuse (www.dmarc.org)

• Prevents domain-based spoofing by blocking fraudulent activity appearing to come from domains under your control

• Provides threat reporting mechanism (aggregate and forensic data)

#1: Authenticate Your Email

“Simply put, the DMARC standard works. In a blended approach to fight email fraud, DMARC represents the cornerstone of technical controls that commercial senders can implement today to rebuild trust and retake the email channel for legitimate brands and consumers.”

Edward Tucker Head of Cyber Security

Her Majesty’s Revenue & Customs

• Addressing the 70% of email attacks that spoof your brand using domains your company does not own requires email threat intelligence.

• Get visibility into all types of email threats targeting you today.

#2: Leverage Email Threat Intelligence

Return Path’s Solution

Legitimate Email

Malicious Email

marketing@ company.com

marketing@ c0mpany.com

company @phish.com

phish@ company.com DMARC

Rejected

Provider Network

Return Path Data Cloud Email Threat

Intelligence

Email Governance

Company Security Operations Center

Takedown Vendor

Consumer Inbox

• The reality is, some attacks are always going to get through. • The more prepared your customers are, the better.

• Create an educational website • Include anti-fraud language within your legitimate email • In the event of an attack, warn your customers immediately

#3: Educate Your Customers

• Engage with Brand Protection teams to make the business case.

• Create a sense of urgency.

• Communicate the risks that result from not taking action: • Email fraud destroys brand reputation and erodes customer loyalty • Email fraud thwarts email marketing effectiveness • Email fraud negatively impacts revenue

#4: Raise Awareness with Top Executives

Learn More

www.returnpath.com/StopEmailFraud Twitter: @StopEmailFraud New: Download the Email Threat Intelligence report at bit.ly/EmailThreatIntel