A Board-Level Business Risk

Slides:



Advertisements
Similar presentations
State of Louisiana and Short’s Travel
Advertisements

Utah – Business Fraud Alert notifies business owners and registered agents when a change has been made to a business’
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Breaking Trust On The Internet
1 Payables Efficiency Through… Access Online PAYMENT PLUS.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
U.S. Bank Corporate Payment Systems Payment Plus.
U.S. Bank Payment Analytics Overview. Payment Fraud Trends 2 Reference: Association of Financial Professionals (AFP), 2011 Payments Fraud and Control.
Delivering significant, measurable reductions within Retail’s Greatest Area of Loss 18 th September 2014.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
© Affiliated Computer Services, Inc. (ACS) 2010 ACS Encryption.
Cyber Security Issues in South Korea and CSIRTs Cooperation September 17, 2014 Eunju Pak
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
INTRODUCTION  Soch Solutions has launched an innovative e-queue system for crowd management.  Using the online advance queue web application, visitors.
Reporting Phishing Incidents Heather Kimley June 13, 2012.
The impact of -borne threats Why companies should recognise and embrace the need for change.
Safe and Secure Internet Gambling Financial Model.
Provided as a service to Indiana students and families by ISM Education Loans, in partnership with the Indiana Commission for Higher Education and Indiana.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
USER MANUAL USER MANUAL 21 June TABLE OF CONTENTS System Description4 How It Works?5 PLUGIN Maxxbooking Plugin6-7 Hotel Info & Description8-9 Availability.
Next Generation of Online Banking and Bill Pay. 2 © 2010 – Proprietary & Confidential The Next Generation of Online Banking and Bill Pay is Here!
Rename ‘How to Order’ to Order Support. Order Support How to Order You may place an order with GeneCopoeia by doing one of the following: 1) Fax to
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
TAXCO BUSINESS SERVICES INC. Division of Des-Dawn Corporation BOOKKEEPING | PAYROLL | TAX FILING | TAX PLANNING | CONSULTING INTRODUCING TAXCO BILL PAY.
2 Concur Travel and Expense Training Speaker Name Here Space for client logo (remove this box with or without logo)
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Safe Computing Practices. What is behind a cyber attack? 1.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Important Information Provided by Information Technology Center
What do these numbers represent?
Digital Account Verification Services Through Encompass
DART Request Training for Korea Account Managers
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
how to prevent them from being successful
DART Request Training for New Zealand Distributors
Team 4 – Mack, Josh, Felicia, Kevin and Walter
DART Request Training For Asia Distributors
Automated Trip Approval
A Project on CYBER SECURITY
DART Request Training for Australia Distributors
Report Phishing Forward phishing s to
Joe, Larry, Josh, Susan, Mary, & Ken
MOT Testing Service Screenshots and Notes* AEDM
Cyber Threat Intelligence Sharing Standards-based Repository
Let’s take “Control” of Year-End
Report Phishing Forward phishing s to
( Compromise).
Anatomy of a Large Scale Attack
Secure Electronic Transactions (SET)
Wissam Maroun- CAMS Head Of Compliance- BBAC S.A.L
Strategic threat assessment
Information Protection
Spear Phishing Awareness
Checking Accounts, Debit Cards & Check Writing
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction to Symantec Security Service
Ski Clubs and E-Commerce
Citi Commercial Cards – Fraud Early Warning
HOW TO PLACE MY ORDER ?.
Information Protection
Anatomy of a Common Cyber Attack
Presentation transcript:

WEBINAR Security Automation September 21, 2017 SPONSORED BY:

A Board-Level Business Risk $100M $5.3B 2/3 150% Stolen By One Person Spoofing Trusted Business Partners Reported Losses to BEC Email Fraud Across 40,203 Victims Of All Impostor Emails Are Domain-spoofing Attacks YoY Increase Of Consumer Phishing Campaigns (Proofpoint research) (APWG) (United States Department of Justice) (FBI)

BL PA LT FW: Vendor payment, URGENT! Accounting changes, action rq’d Bryan Littlefair <bryan.littlefair@aviva.com> Friday, 30th June 2017 at 4.47 pm Thomas Stoddard BL FW: Vendor payment, URGENT! Thomas, please see below – I authorise this and we need it done by 5.30 today. Call Iain if you need details. Bryan Sent from my iPhone – please excuse brevity   Paul Auville <paul.auville@proofpoint.com> Monday, 19th June 2017 at 09.13 John Parry PA Accounting changes, action rq’d Hi John, We’re making some banking changes ahead of the Hong Kong project completion.Please update the account details for final payments: China Merchants Bank, H. O. Shenzhen (SWIFT CODE: CMBCCNBSXXX) Lufthansa Ticketing <ticketing@lufthansa.de> Monday, 19th June 2017 at 09.13 Bob Fisher LT Confirmation of itinerary, San Jose California 07/09/2017 It’s my pleasure to confirm your ticket purchase for flights to San Jose, California, on the 7th of September 2017. Please find attached full details including your credit card transaction record. Regards, The Lufthansa Team.   Customize this slide to show a logical pairing of individuals from the clients organization – one with authority to request a transfer and the other

State of Average Security Operations Core Processes (41%): Investigation, Escalation, Notification, Reporting Repetitive Processes (52%): Context/Intel Enrichment, Incident Confirmation (41%) Response Actions (11%) Based on a survey done by Ponemon Institute, most security teams spend majority of their times (>50%) in repetitive tasks such as getting contextual information about users, threats and assets. As a result, Proactive Processes (such as hunting) don’t get enough attention. A security automation platform can enable organizations to automate the boring repetitive tasks so that security analysts can focus on Core and Proactive processes. Proactive Processes (5%): Source: Ponemon Institute.

Security incident response is a slow, labor-intensive Addressing email security incidents can take hours or days as manual email clean-up can be a chore. Dealing with delivered email with malware, bad URLs, or credential phishes involves many steps, including: Connecting an email address to an internal identity Searching and finding selected malicious messages on the server Removing a malicious message out of a user’s inbox or other folders Identifying which malicious messages were forwarded and moving those to quarantine

Email Cleaning “Gotchas” Email cleanup for malicious messages is often a manual process that starts with an alert or complaint that a malicious email got through. Is the email only in the inbox or was it moved to another folder? Should you check other folders for copies of the message? Has the message been internally forwarded? If so to whom and how many copies? Is there an audit trail or record of all the actions taken?

Live Demonstration

Have questions? jyun@proofpoint.com