I2Coalition: How To Build Relationships And Save Money With Better Abuse Reporting Moderator: Michele Neylon CEO, Blacknight.

Slides:



Advertisements
Similar presentations
ICANN SSAC, Cairo Nov 2008 Page 1 Summary of Fast Flux Dave Piscitello ICANN SSAC.
Advertisements

A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Managed Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory.
SESSION ID: #RSAC Chaz Lever Characterizing Malicious Traffic on Cellular Networks A Retrospective MBS-W01 Researcher Damballa,
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Norman SecureSurf Protect your users when surfing the Internet.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Botnets By: Brandon Sherman. What is a Botnet? Botnet is a term referring to a network of multiple computers being affected by software robots. These.
Office of Campus Information Security Incident Response Briefing Jeffrey Savoy, CISSP.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Firewall Management, Intrusion Detection, Intrusion Prevention and Security Information Management AC475 Team Project Kathleen Jackowski Elizabeth Kearney-Lang.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
CU – Boulder Security Incidents Jon Giltner. Our Challenge.
Registry Internet Safety Group
Hosters vs. Malware: Best Practices Domain Registrar – Hosting Provider.
.ORG, The Public Interest Registry. 2 Proprietary & Confidential What is Domain Security? Domain security is: 1) Responsibility. Any TLD should have a.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Margie Milam, Senior Director 27 March 2014 Privacy/Proxy Accreditation Survey Results.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
How Hosting, Cloud, Managed, and Colo Service Providers Use Inbound to Differentiate and Grow Revenue Joshua Feinberg Vice President and Co-Founder SP.
Re-writing the Playbook for DDoS Mitigation Strategies
Paul D. Engels What SMBs Want : Research Reveals Buying Habits of SMBs and What it Means to Your Service Business.
Increasing Cloud Adoption Through Cloud Services Brokerage (CSB) Brent Brightwell Senior VP Products and Strategy DoubleHorn.
Your Lack Of Visibility And Control Is Hurting Your Business Kyle York Chief Strategy Officer,
OFFICE 365 APP BUILDER PROFILE: Druva
Protect your Digital Enterprise
With Office 365, Collaborative Solution by Qorus Streamlines Document Assembly and Enhances Productivity for Any Business-Critical Documents OFFICE 365.
KasPer Pro HRMS with Self Service Brings a Fully Featured Human Resources Management Solution to the Office 365/SharePoint Online Environment OFFICE 365.
Under the Shadow of sunshine
WorkDiff Mobile, Scenario-Based Collaboration Solution WorkDiff Allows Users to Work Differently While Using Familiar Functions of Microsoft Office 365.
ESign365 Add-In Gives Enterprises and Their Users the Power to Seamlessly Edit and Send Documents for e-Signature Within Office 365 OFFICE 365 APP BUILDER.
Office 365 is cloud-based productivity, hosted by Microsoft.
StreetSmart Mobile Workforce App Incorporates Microsoft Office 365 Outlook Add-In for Improved Field Worker Scheduling and Streamlined Invoicing OFFICE.
Barracuda Web Filtering Service
46elks Add-In for Microsoft Office 365 Excel Makes it Easy to Add SMS and Voice to Any Website or App – Just Install, Select Numbers, and Hit Send OFFICE.
Officeatwork 365 Document Designer Allows Organizations to Design Brand- and Legal- Compliant Templates and Documents Globally OFFICE 365 APP BUILDER PROFILE:
in All Office 365 Apps for Enterprise Companies
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
That Saves Money and Preserves Opportunities
Want to know how to Fix AT&T Error Code 475?
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Contextual Intelligence Platform Delivers Rich, Interactive Add-Ins to Microsoft Office and Brings Users Efficiency, Quick Access to Valuable Data MICROSOFT.
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
AKAMAI INTELLIGENT PLATFORM™
Office 365 Integration Enables WebUntis Users to Sign in Using Office 365 Account Information and to Export WebUntis Timetables Directly to Outlook OFFICE.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
Agolo Summarization Platform Integrates with Microsoft OneDrive to Relate Enterprise Cloud Documents with Real-Time News Summaries OFFICE 365 APP BUILDER.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Secure once, run anywhere Simplify your security with Sophos
Protect Your Ecommerce Site From Hacking and Fraud
Fixing the Internet: Think Locally, Impact Globally
The Domain Abuse Activity Reporting System (DAAR)
Using Software Restriction Policies
Cybersecurity Simplified: Phishing
Presentation transcript:

i2Coalition: How To Build Relationships And Save Money With Better Abuse Reporting Moderator: Michele Neylon CEO, Blacknight

THE GLOBAL EVENT FOR THE CLOUD AND SERVICE PROVIDER ECOSYSTEM No Pitch Presentation Policy Please help us produce more relevant content in the future by rating this session using our event app! Each presenter signs a speaker agreement certifying that their presentation will be educational and not a sales pitch. Attendees have a right to report speakers not adhering to the policy.

THE GLOBAL EVENT FOR THE CLOUD AND SERVICE PROVIDER ECOSYSTEM How To Build Relationships And Save Money With Better Abuse Reporting Michele Neylon CEO Blacknight Internet Solutions Ltd Alan O'Reilly Customer Service Manager Blacknight Drew Bagley Director of Operations Secure Domain Jay Sudowski CEO Handy Networks

THE GLOBAL EVENT FOR THE CLOUD AND SERVICE PROVIDER ECOSYSTEM What is abuse? Abuse is a violation of terms of service - Categories include: SPAM, phishing, botnet command and control, malware hosting - Intellectual property infringement - Other illegal content in the jurisdiction of the hosting company

THE GLOBAL EVENT FOR THE CLOUD AND SERVICE PROVIDER ECOSYSTEM How does abuse affect you? Customer service - Customers are usually the victims - Responding to complaints, diagnosing problems Technology costs - Increased infrastructure costs (i.e. firewalls) Legal costs - Time spent responding to legal requests - Money spent involved in litigation

THE GLOBAL EVENT FOR THE CLOUD AND SERVICE PROVIDER ECOSYSTEM How does abuse affect you? Reputational costs - Blocked IP addresses - Reliability and security questioned by customers - Known for suspicious activity to law enforcement

THE GLOBAL EVENT FOR THE CLOUD AND SERVICE PROVIDER ECOSYSTEM Cost-saving solutions Proactive anti-abuse - Detect compromised servers and malicious activity before a complaint Better abuse reporting - Get the right information to the right people - Alert customers and mitigate compromise quickly - Screen out frivolous or misdirected complaints

THE GLOBAL EVENT FOR THE CLOUD AND SERVICE PROVIDER ECOSYSTEM Abuse reporting Need for actionable information routed to the right person - IP address - Domain name (if relevant) - Example URL - address (if relevant) - Category of abuse (important to distinguish intellectual property violations from other complaints) - Relevant dates - Harm (if any) - Law/policy violated - Contact information of complainant

THE GLOBAL EVENT FOR THE CLOUD AND SERVICE PROVIDER ECOSYSTEM Abuse reporting Standardize fields across industry - Automated routing between hosting companies, registries, registrars - Actionable information readily available when needed to share with law enforcement, cybersecurity teams, etc.

THE GLOBAL EVENT FOR THE CLOUD AND SERVICE PROVIDER ECOSYSTEM Abuse reporting Save money through cost avoidance!!! - Reduce resources spent on frivolous complaints - More efficiently handle valid complaints - Reduce litigation costs - Preserve reputation - Protect customers - Prevent IP addresses from being blacklisted - Prevent missed opportunities

THE GLOBAL EVENT FOR THE CLOUD AND SERVICE PROVIDER ECOSYSTEM Anti-abuse resources Secure Domain Foundation – FREE anti-abuse API ShadowServer Google Safe Browsing APWG

THE GLOBAL EVENT FOR THE CLOUD AND SERVICE PROVIDER ECOSYSTEM Questions? Michele Neylon CEO Blacknight Internet Solutions Ltd Alan O'Reilly Customer Service Manager Blacknight Drew Bagley Director of Operations Secure Domain Jay Sudowski CEO Handy Networks