Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Mimecast BCI Event October 2017


Published on

Minecast BCI London Event 2017

Published in: Business
  • Be the first to comment

Mimecast BCI Event October 2017

  1. 1. The need for a cyber resilience strategy PETE BANHAM PRODUCT MANAGER
  2. 2. Verizon 2016 Data Breach Investigations Report (DBIR) 1 min:40 secs A phish: median time-to-first-click
  3. 3. Confidential | What those attacking look like
  4. 4. Confidential |
  5. 5. Confidential | Malicious Accidental Policy Violating
  6. 6. 91% of attacks started with a phishing email 55% increase in spear-phishing attacks 400% increase in ransomware attacks 1300% increase in impersonation attack losses EMAIL REMAINS THE #1 Attack Vector Source: 2017 Verizon Data Breach Investigation Report
  7. 7. Ransomware = $1B “Business” in 2016 for the Cybercriminals - FBI
  8. 8. You don’t even need to know how to code Source: - "Ransomware As A Service Being Offered For $39 On The Dark Net" 7/15/16
  9. 9. But if you do but you don’t know how to bypass sandboxes.. FUD (Fully Undetectable) crypting services to avoid detection
  10. 10. Business email compromise Impersonation Wire transfer fraud W-2/P60 fraud Who Says Attacks Need to Involve Malware? Losses over $5.3bn
  11. 11. Devastating impact on… • Business operations • Client service • Data loss or compromise • Financial loss • Reputation damage
  12. 12. Attacking the humans
  13. 13. “Hey strangers – please send me files”
  14. 14. ‘Click to view’ dupe
  15. 15. ‘New’ Office confusion
  16. 16. Your business needs a cyber resilience strategy ARCHIVING SECURITY CONTINUITY
  17. 17. • Prevent incidents • Recover and mitigate • Improve and analyze USERS | DATA | PRODUCTIVITY Human error PROTECT Malicious intent Technological failure
  18. 18. Secure Messaging Advanced Threat Security Cloud Archive DLP & Content Security Mime | OS API RBAC & Data Guardian Data Protection DLPAnti Malware Encryption Incident Management Data Management Search and Discovery Chain of Custody Secure Repository Access Control Large File Send Mailbox Continuity Archive Power Tools Search and Review Supporting GDPR Compliance
  19. 19. – Advanced Security – What is your current approach to advanced email-borne attacks? – Continuity – How do you keep the organization operating when critical systems, like email down? – Archive – Does your current approach provide business insights, compliance and end-user enablement? What about data recovery?
  20. 20. Thank You _petebanham