Using Return Path Data to Protect Your Brand: Security Breakout Session - London
-
Upload
return-path -
Category
Data & Analytics
-
view
203 -
download
0
Transcript of Using Return Path Data to Protect Your Brand: Security Breakout Session - London
#RPWT
Little Data, Big Decisions: The Path to Data Enlightenment Keynote
3:45 - 4:15
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Session
5:00 - 5:45
Scott Roth, Chief Marketing Officer, Return Path
Speakers:
Guy Hanson, Sr. Director, Professional Services, Return Path
Rob Holmes, General Manager, Email Fraud Protection, Return Path 4:15- 4:45
Real Data, Real Results: Customer Showcase & Panel Discussion
5:00 - 5:45 Using Return Path Data to Protect Your Brand: Security Breakout Session
5:45 - 7:00 Networking and cocktails Please join us as we wrap up the day!
Opening Remarks Guest Speaker
3:00 - 3:45
Sara Murray, Entrepreneur & Founder of confused.com & Buddi
4:45 – 5:00 Coffee break
Using Return Path Data to Protect Your Brand
Security Breakout Session
Rob Holmes, General Manager, Email Fraud Protection
Agenda • Email fraud trends and impact
• The power of data: email threat intelligence
• The Return Path Data Cloud • Tactics used by cybercriminals today
• Unite against email fraud: tips for defending your customers, brand, and
bottom line
• Questions
…But Its Impact Is Being Eroded
5 out of 6 big companies
are targeted with phishing attacks
Phishing costs brands worldwide $4.5 billion
each year
RSA identifies a phishing attack
every minute
Email fraud has up to a 45%
conversion rate
Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm
$4.5 B 1 MIN 5/6 45%
Phishing Leads To – Revenue Losses • Reduced effectiveness of email
• ISPs don’t know what to trust
• Reduced trust in brand: • Subscribers don’t know what to trust
Customers are 42% less likely to interact with a brand after being phished or spoofed.
“If you boil the jobs down of IT security professionals, they are ultimately tasked with protecting the brand… If you have a breach, research suggests that 60% of your customers will think about moving and 30% actually do.”
Bryan Littlefair Global Chief Information Security Officer
Aviva
Anatomy Of A Phishing Email
to: You <[email protected]>
from: Phishing Company <[email protected]>
subject: Unauthorized login attempt
Dear Customer, We have recieved noticed that you have recently attempted to login to your account from an unauthorized device. As a saftey measure, please visit the link below to update your login details now: http://www.phishingemail.com/updatedetails.asp Once you have updated your details your account will be secure from further unauthorized login attempts. Thanks, The Phishing Team
1 attachment
Making an email look legitimate by
spoofing the company name in
the “Display Name” field.
Tricking email servers into
delivering the email to the inbox by spoofing the
“envelope from” address hidden in
the technical header of the email.
Including logos, company terms,
and urgent language in the
body of the email.
Making an email appear to come from a brand by
using a legitimate company domain, or a domain that looks like it in the “from”
field.
Creating convincing subject lines to drive
recipients to open the message.
Including links to malicious websites
that prompt users to give up
credentials
Including attachments
containing malicious content.
From: [email protected] <[email protected]> From: PayPal <[email protected]>
Knowledge Is Your Best Defense
• We know there is no silver bullet.
• But defense starts with understanding.
• Data is the key to that understanding.
Breadth, Depth, and Speed
Contactually Molto Paribus GetAirHelp
Message Finder Unsubscriber Organizer
EMAIL THREAT DATA · Consumer inbox data · Email delivery data · Authentication results · Message level data · SPAM trap & complaints data
EMAIL THREAT INTELLIGENCE
· Domain-spoofing alerts
· Brand-spoofing intelligence
· Suspicious activity map
· Fraudcaster URL feed
· Sender Score: IP reputation
Email Fraud: Primary Attack Vectors
Domain Spoofing (from domains owned by the brand)
Brand Spoofing (from domains outside the brand’s control)
30% of Attacks Spoof Domains You Own
30% Domain Spoofing • Active Emailing Domains • Non-Sending Domains • Defensively-Registered
Domains
70% Brand Spoofing • Cousin Domains • Display Name Spoofing • Subject Line Spoofing • Email Account Spoofing
Source: Return Path / APWG White Paper, 2014
DMARC (Domain-based Message Authentication Reporting & Conformance):
• Technical specification created to help reduce the potential for email-based abuse (www.dmarc.org)
• Prevents domain-based spoofing by blocking fraudulent activity appearing to come from domains under your control
• Provides threat reporting mechanism (aggregate and forensic data)
#1: Authenticate Your Email
“Simply put, the DMARC standard works. In a blended approach to fight email fraud, DMARC represents the cornerstone of technical controls that commercial senders can implement today to rebuild trust and retake the email channel for legitimate brands and consumers.”
Edward Tucker Head of Cyber Security
Her Majesty’s Revenue & Customs
• Addressing the 70% of email attacks that spoof your brand using domains your company does not own requires email threat intelligence.
• Get visibility into all types of email threats targeting you today.
#2: Leverage Email Threat Intelligence
Return Path’s Solution
Legitimate Email
Malicious Email
marketing@ company.com
marketing@ c0mpany.com
company @phish.com
phish@ company.com DMARC
Rejected
Provider Network
Return Path Data Cloud Email Threat
Intelligence
Email Governance
Company Security Operations Center
Takedown Vendor
Consumer Inbox
• The reality is, some attacks are always going to get through. • The more prepared your customers are, the better.
• Create an educational website • Include anti-fraud language within your legitimate email • In the event of an attack, warn your customers immediately
#3: Educate Your Customers
• Engage with Brand Protection teams to make the business case.
• Create a sense of urgency.
• Communicate the risks that result from not taking action: • Email fraud destroys brand reputation and erodes customer loyalty • Email fraud thwarts email marketing effectiveness • Email fraud negatively impacts revenue
#4: Raise Awareness with Top Executives