Download presentation
Presentation is loading. Please wait.
Published byRosanna Dalton Modified over 9 years ago
1
The impact of email-borne threats Why companies should recognise and embrace the need for change.
2
Phishing Attacks per Year Source: RSA (2014)
3
Phishing Campaigns per Year Source: APWG (2013)
4
Reality Check Source: APWG (2013) Change in measurement methodology 300% increase
5
Phishing sites reported to association or vendor Phishing sites reported to other bodies Phishing sites not reportedPhishing emails sentOther email-borne threats The Thin End of the Wedge
7
Why is Accurate Measurement Important? “To measure is to know… If you cannot measure it, you cannot improve it.” Lord Kelvin
8
New measurement Upstream ISPs Getting Upstream for Accurate Measurement Current measurementDownstream vendors Data filters Fuller picture
9
Upstream insights
10
Full Spectrum of Email Threats Active Emailing Domains Non-Sending Domains Defensively Registered Domains
11
Full Spectrum of Email Threats Unaffiliated Domain Threats Direct Domain Threats Look-a-like Domains Subdomains of Another Domain Different Brands’ Domains Unaffiliated Domains Generic Domains Active Emailing Domains Non-Sending Domains Defensively Registered Domains
12
3D Vision 3 dimensions of email threats: Nature of threat Size of attack Efficacy Combinations determine impact All data points available upstream Nature of threat Size of attack Efficacy
13
1 st Dimension: Nature of Threat Phishing (Direct Domain Threat) 419 (Unaffiliated Domain Threat)
14
1 st Dimension: Nature of Threat Malware (Direct or Unaffiliated Domain Threat?) Malware (Direct Domain Threat)
15
1 st Dimension: Nature of Threat Credit score spam (Direct Domain Threat) Pharma spam (Unaffiliated Domain Threat)
16
Different scams will concern different departments Prioritise based on impact to organisation Different threats have different remedies 1 st Dimension: Why Differentiate?
17
2 nd Dimension: Attack Size Getting upstream enables us to see how many emails were sent in a given attack
18
Quantify risks Prioritise risks Justify the right investments Measure ROI 2 nd Dimension: Why Measure Attack Size?
19
3 rd Dimension: Efficacy Users decide what is good and what is bad, but don’t always get it right… ISPs decide what is good and what is bad, but don’t always get it right… Phishing Legitimate Phishing
20
3 rd Dimension: Efficacy Lots of inbox noise on a daily basis What happens today will affect what happens tomorrow
21
Quantify impact Prioritise risks Justify the right investments Measure ROI 3 rd Dimension: Why Measure Efficacy?
22
The Benefits of 3D Vision Upstream data enables accurate risk assessment Downstream metrics are inadequate: No visibility into size of attack No visibility into efficacy Upstream data enables us to see true impact Nature of threat Size of attack Efficacy
23
Fraud losses Call centre support Remediation: Site shutdown Reset accounts Credential recovery Investigation & reporting Malware secondary losses Negative publicity Impact of Attack: Security Perspective
24
Impact of Attack: Reduced ROI of Email Program Attack start Attack end 90% average 58% low 32% drop
25
The pay-off
26
Addressing email-borne threats
34
Traditional Approach to Phishing Prevention Impact Time Phishing Email Campaign Deployed Phish Site Takedown Phish Site Detected @
35
Phishing Prevention With Return Path Impact Time Phishing Email Campaign Deployed Phish Site Detected Phish Site Takedown @ Advanced Detection: Provides enhanced visibility into emerging threats. Proactive Blocking: Drives down the negative impact of phishing. Data Integration: Real-time URI data feeds facilitate faster takedown of malicious sites.
36
What can you do …
37
Build partnership plan between Security and Marketing Gain visibility into full spectrum of email threats Leverage latest technologies to: Develop a holistic view of detection Proactively block fraudulent messages Increase the ROI on existing solutions 3-Step Plan to Effectively Manage Risk
38
Conclusions …
39
Old metrics are inadequate and incomplete New technologies offer “3D vision” It is not just a security concern … it must be enterprise-wide New technologies: Reduce fraud Improve performance of email programs Conclusions
40
Ken Takahashi General Manager, Anti-Phishing Solutions Return Path ken.takahashi@returnpath.com www.returnpath.com/security +61 2 8188 8700 Thank you
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.