SlideShare a Scribd company logo
1 of 11
Phishing Education




BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM




    About: BrandProtect

■   Toronto based company, founded 2001
■   Award winning proprietary Technology
■   Certified by F.I.R.S.T.
      – Forum for Incident Response Security Teams

■   Microsoft partner
      – Phishing filter data provider for IE




    BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM



Identity Theft Attack Management Services


■   Rapid response service to deal with all forms of identity theft attacks
      – Phishing, Vishing, SMShing, Pharming and Malware
■   Best in class detection practices
      – Includes 24x7 response to abuse mail from customers
■   Support for employee education:
      – Incident response guidelines and simulated attack education
■   Support for customers
      – Browser plug-ins to protect against attacks from fraudulent websites
■   Secure Portal with enhanced functionality for workflow management
      – Case management, incident details, trending and reporting capability
■   Best practices from BrandProtect client and partner community
      – Access to threat alerts, insights and solution sharing with peers




    BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM




           SpearPhishing – A growing problem

■   > 15,000 corporate victims in 15 months
■   Victim Losses have
    exceeded $100,000

■ Recent         Victims
     – Salesforce.com
     – Critical infrastructure
       at large energy company




           BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM



Conventional Measures For Employee Education


•   Brown Bag Sessions

•   Security Posters

•   Email Blasts




    BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM




    A Better Way

Mock Phishing Exercises

■   Emulate real phishing attacks

■   Train subjects by example

■   Measure susceptibility



    BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM




           A better way

■ Web-based platform that facilitates the execution of mock
  phishing exercises and user awareness training
■ Easy Setup
■ Real Metrics*
■ Targeted Awareness Training


* We do NOT collect or store passwords. Only detect if they were entered




           BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM



Case Study: Measuring Improvement




BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM




         Targeted Awareness Training

    Employees found to be susceptible can immediately be
    redirected to:

•   Internal corporate training websites
•   Built-in educational message
•   Educational comic strip
•   Generic message non-indicative of the underlying activity




          BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM




    Common reasons for implementation

■ To make it part of annual security audit and training
■ To help employees to not get infected at work/home
■ To help employees explain phishing to customers
      – “Train the trainers”




    BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM




More Information




BDProtect Inc. 2009 CONFIDENTIAL

More Related Content

What's hot

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingTIKAJ
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-securityMarya Sholevar
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginnersSamvel Gevorgyan
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackMark Mair
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 

What's hot (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
How To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and TrainingHow To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and Training
 
51 phishing attacks
51 phishing attacks51 phishing attacks
51 phishing attacks
 
51 phishing attacks
51 phishing attacks51 phishing attacks
51 phishing attacks
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginners
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing Attack
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 

Viewers also liked

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
OW2 JOnAS Use CAse, OW2con11, Nov 24-25, Paris
OW2 JOnAS Use CAse, OW2con11, Nov 24-25, ParisOW2 JOnAS Use CAse, OW2con11, Nov 24-25, Paris
OW2 JOnAS Use CAse, OW2con11, Nov 24-25, ParisOW2
 
KASSI Open Source Research Project, OW2con11, Nov 24-25, Paris
KASSI Open Source Research Project, OW2con11, Nov 24-25, ParisKASSI Open Source Research Project, OW2con11, Nov 24-25, Paris
KASSI Open Source Research Project, OW2con11, Nov 24-25, ParisOW2
 
OW2con'14- erOCCI, a scalable, model-based REST API framework
OW2con'14- erOCCI, a scalable, model-based REST API frameworkOW2con'14- erOCCI, a scalable, model-based REST API framework
OW2con'14- erOCCI, a scalable, model-based REST API frameworkOW2
 
OW2con'14 - Keynote from Microsoft
OW2con'14 - Keynote from MicrosoftOW2con'14 - Keynote from Microsoft
OW2con'14 - Keynote from MicrosoftOW2
 
CLIF as a Service: Distributed performance testing in continuous integration...
CLIF as a Service:  Distributed performance testing in continuous integration...CLIF as a Service:  Distributed performance testing in continuous integration...
CLIF as a Service: Distributed performance testing in continuous integration...OW2
 
Mystery Salamanca
Mystery SalamancaMystery Salamanca
Mystery Salamancaalfcoltrane
 
LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora.
 LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora. LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora.
LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora.OW2
 
Open Source Innovation Factory, OW2con11, Nov 24-25, 2011, Paris
Open Source Innovation Factory, OW2con11, Nov 24-25, 2011, ParisOpen Source Innovation Factory, OW2con11, Nov 24-25, 2011, Paris
Open Source Innovation Factory, OW2con11, Nov 24-25, 2011, ParisOW2
 
カマコンバレー @YOKOHAMA Future Session 150421
カマコンバレー @YOKOHAMA Future Session 150421カマコンバレー @YOKOHAMA Future Session 150421
カマコンバレー @YOKOHAMA Future Session 150421Kanshin!, Inc.
 
Social media knockdown
Social media knockdownSocial media knockdown
Social media knockdowntellem
 
Chapter 1 presentation
Chapter 1 presentationChapter 1 presentation
Chapter 1 presentationdphil002
 
"Odpowiedzialne dziennikarstwo"
"Odpowiedzialne dziennikarstwo" "Odpowiedzialne dziennikarstwo"
"Odpowiedzialne dziennikarstwo" Ciszewski MSL
 

Viewers also liked (20)

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
OW2 JOnAS Use CAse, OW2con11, Nov 24-25, Paris
OW2 JOnAS Use CAse, OW2con11, Nov 24-25, ParisOW2 JOnAS Use CAse, OW2con11, Nov 24-25, Paris
OW2 JOnAS Use CAse, OW2con11, Nov 24-25, Paris
 
KASSI Open Source Research Project, OW2con11, Nov 24-25, Paris
KASSI Open Source Research Project, OW2con11, Nov 24-25, ParisKASSI Open Source Research Project, OW2con11, Nov 24-25, Paris
KASSI Open Source Research Project, OW2con11, Nov 24-25, Paris
 
OW2con'14- erOCCI, a scalable, model-based REST API framework
OW2con'14- erOCCI, a scalable, model-based REST API frameworkOW2con'14- erOCCI, a scalable, model-based REST API framework
OW2con'14- erOCCI, a scalable, model-based REST API framework
 
OW2con'14 - Keynote from Microsoft
OW2con'14 - Keynote from MicrosoftOW2con'14 - Keynote from Microsoft
OW2con'14 - Keynote from Microsoft
 
Life21
Life21Life21
Life21
 
Project Progress
Project ProgressProject Progress
Project Progress
 
CLIF as a Service: Distributed performance testing in continuous integration...
CLIF as a Service:  Distributed performance testing in continuous integration...CLIF as a Service:  Distributed performance testing in continuous integration...
CLIF as a Service: Distributed performance testing in continuous integration...
 
Mystery Salamanca
Mystery SalamancaMystery Salamanca
Mystery Salamanca
 
LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora.
 LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora. LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora.
LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora.
 
Ppt ch 16
Ppt ch 16Ppt ch 16
Ppt ch 16
 
Open Source Innovation Factory, OW2con11, Nov 24-25, 2011, Paris
Open Source Innovation Factory, OW2con11, Nov 24-25, 2011, ParisOpen Source Innovation Factory, OW2con11, Nov 24-25, 2011, Paris
Open Source Innovation Factory, OW2con11, Nov 24-25, 2011, Paris
 
カマコンバレー @YOKOHAMA Future Session 150421
カマコンバレー @YOKOHAMA Future Session 150421カマコンバレー @YOKOHAMA Future Session 150421
カマコンバレー @YOKOHAMA Future Session 150421
 
Chubby
ChubbyChubby
Chubby
 
7. Por qué leer a los clásicos
7. Por qué leer a los clásicos7. Por qué leer a los clásicos
7. Por qué leer a los clásicos
 
Social media knockdown
Social media knockdownSocial media knockdown
Social media knockdown
 
Por qué leer a los clásicos, de
Por qué leer a los clásicos, dePor qué leer a los clásicos, de
Por qué leer a los clásicos, de
 
Chapter 1 presentation
Chapter 1 presentationChapter 1 presentation
Chapter 1 presentation
 
We Were
We WereWe Were
We Were
 
"Odpowiedzialne dziennikarstwo"
"Odpowiedzialne dziennikarstwo" "Odpowiedzialne dziennikarstwo"
"Odpowiedzialne dziennikarstwo"
 

Similar to Phishing Education Mock Exercises

Brand Protect Services
Brand Protect ServicesBrand Protect Services
Brand Protect ServicesDavid Hughes
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsEnterprise Management Associates
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers Precisely
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Sal Abramo
 
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...Enterprise Management Associates
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Enterprise Management Associates
 
Customer Success and Security Technology
Customer Success and Security TechnologyCustomer Success and Security Technology
Customer Success and Security TechnologyGainsight
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000finance40
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber WarfareSwapnil Jagtap
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxKENNEDY GITHAIGA
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 

Similar to Phishing Education Mock Exercises (20)

Brand Protect Services
Brand Protect ServicesBrand Protect Services
Brand Protect Services
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
 
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
 
Securing the Digital Enterprise
Securing the Digital EnterpriseSecuring the Digital Enterprise
Securing the Digital Enterprise
 
Customer Success and Security Technology
Customer Success and Security TechnologyCustomer Success and Security Technology
Customer Success and Security Technology
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptx
 
Passwordless Authentication
Passwordless AuthenticationPasswordless Authentication
Passwordless Authentication
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 

Recently uploaded

VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFOrient Homes
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCRsoniya singh
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...lizamodels9
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherPerry Belcher
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiMalviyaNagarCallGirl
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756dollysharma2066
 

Recently uploaded (20)

VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
 

Phishing Education Mock Exercises

  • 2. The leader in internet reputation managementTM About: BrandProtect ■ Toronto based company, founded 2001 ■ Award winning proprietary Technology ■ Certified by F.I.R.S.T. – Forum for Incident Response Security Teams ■ Microsoft partner – Phishing filter data provider for IE BDProtect Inc. 2009 CONFIDENTIAL
  • 3. The leader in internet reputation managementTM Identity Theft Attack Management Services ■ Rapid response service to deal with all forms of identity theft attacks – Phishing, Vishing, SMShing, Pharming and Malware ■ Best in class detection practices – Includes 24x7 response to abuse mail from customers ■ Support for employee education: – Incident response guidelines and simulated attack education ■ Support for customers – Browser plug-ins to protect against attacks from fraudulent websites ■ Secure Portal with enhanced functionality for workflow management – Case management, incident details, trending and reporting capability ■ Best practices from BrandProtect client and partner community – Access to threat alerts, insights and solution sharing with peers BDProtect Inc. 2009 CONFIDENTIAL
  • 4. The leader in internet reputation managementTM SpearPhishing – A growing problem ■ > 15,000 corporate victims in 15 months ■ Victim Losses have exceeded $100,000 ■ Recent Victims – Salesforce.com – Critical infrastructure at large energy company BDProtect Inc. 2009 CONFIDENTIAL
  • 5. The leader in internet reputation managementTM Conventional Measures For Employee Education • Brown Bag Sessions • Security Posters • Email Blasts BDProtect Inc. 2009 CONFIDENTIAL
  • 6. The leader in internet reputation managementTM A Better Way Mock Phishing Exercises ■ Emulate real phishing attacks ■ Train subjects by example ■ Measure susceptibility BDProtect Inc. 2009 CONFIDENTIAL
  • 7. The leader in internet reputation managementTM A better way ■ Web-based platform that facilitates the execution of mock phishing exercises and user awareness training ■ Easy Setup ■ Real Metrics* ■ Targeted Awareness Training * We do NOT collect or store passwords. Only detect if they were entered BDProtect Inc. 2009 CONFIDENTIAL
  • 8. The leader in internet reputation managementTM Case Study: Measuring Improvement BDProtect Inc. 2009 CONFIDENTIAL
  • 9. The leader in internet reputation managementTM Targeted Awareness Training Employees found to be susceptible can immediately be redirected to: • Internal corporate training websites • Built-in educational message • Educational comic strip • Generic message non-indicative of the underlying activity BDProtect Inc. 2009 CONFIDENTIAL
  • 10. The leader in internet reputation managementTM Common reasons for implementation ■ To make it part of annual security audit and training ■ To help employees to not get infected at work/home ■ To help employees explain phishing to customers – “Train the trainers” BDProtect Inc. 2009 CONFIDENTIAL
  • 11. The leader in internet reputation managementTM More Information BDProtect Inc. 2009 CONFIDENTIAL