View
34
Download
4
Category
Preview:
Citation preview
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Email Security Growing in threats, quickening in pace
Erez Haimowicz
Enablement and Security
Mimecast
11-10-17
NTXISSA.orgNTXISSA.orgNTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Email: The Ultimate App
With demanding business and user requirements
24 X 7 Email Availability
ContinuousMission-critical Mobile
.2
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Cyber Resilience
The technology that provides the best possible multi-layered
protection
MULTILAYERED SECURITY
A solution that allows you to continue to work while the issue
is resolved
CONTINUITY
The knowledge that no matter what, you can get back to the
last known good state
REMEDIATION
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Countdown to a breach
Verizon 2016 Data Breach Investigations Report (DBIR)
100 Seconds average time-to-first-click
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
91% of all incidents start with a phish
Wired
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
You can no longer stand in front of your board and say that you wont have an attack.
As we all know, its now a case of when.
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
What those attacking look like
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Your company
is at risk if
you.. You have certain letters in your domain name You accept resumes on your website
You have a team of people in finance
You have a profile
Your life is deemed interesting enough to be on
Your company is at RISK if you
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Do You Have a Page Like This On Your Website?
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Real life examples with email
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Imagine being able to stop EVERY malicious file
We all know the risks
Trust your users not to click?
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Who Says Attacks Need to Involve Malware?
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Compromised AccountsStolen User Credentials
Utilize Corp Web mail to spread attack internally or externally to partners/customers
Careless UsersSending sensitive data internally such as projects and PII
Oops, sent it to the wrong Michael
Malicious InsidersPurposely distributing malware or malicious URLs
Internal threats!
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Flawed - The technology23% open the phish & click
Confidetial |
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
To run an attack
You dont even need to know how to code
Source: Forbes.com - "Ransomware As A Service Being Offered For
$39 On The Dark Net" 7/15/16
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
AND to bypass sandboxes.
FUD (Fully Undetectable) Crypting Services to avoid AV detection
AND to bypass sandboxes
FUD (Fully Undetectable) Crypting Services to avoid AV Detection
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Confidential |
At Risk - The human firewall11% open the phish & run the attachment
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
HEY STRANGERS - Please send me files
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Click to View Dupe
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
You cant fix stupid
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Whatever we do, theyre still around and getting creative
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Your business
needs a cyber resilience strategy
ARCHIVING
SECURITY
CONTINUITY
NTXISSA.orgNTXISSA.org
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
29
Thank you
NTXISSA.orgNTXISSA.org
Recommended