Using Return Path Data to Protect Your Brand: Security Breakout Session - Chicago

Return Path
Return PathReturn Path
#RPWT
Little Data, Big Decisions:
The Path to Data Enlightenment Keynote
3:30 - 4:00
Using Return Path Data to Promote Your Brand:
Marketing/Research Breakout Session
4:45 - 5:30
Tami Forman, Vice President of Corporate
Marketing & Communications, Return Path
Speakers:
Casey Swanton, Director Response
Consulting, Return Path
Brandon Dingae, Director, Sales
Enablement, Return Path
4:00 - 4:45
Real Data, Real Results:
Customer Showcase & Panel Discussion
4:45 - 5:30
Using Return Path Data to Protect Your Brand:
Security Breakout Session
5:30
Networking and cocktails
Please join us as we wrap up the day!
Using Return Path Data to Protect Your Brand
Security Breakout Session
Brandon Dingae, Director, Sales Enablement
Agenda
• Email fraud trends and impact
• The power of data: email threat intelligence
• The Return Path Data Cloud
• Tactics used by cybercriminals today
• Unite against email fraud: tips for defending your customers, brand, and
bottom line
• Questions
Email Fraud Trends
& Impact
Email Delivers Business Value…
Increases
Customer Loyalty
Boosts
Revenue
Reduces
Operating Costs
…But Its Impact Is Being Eroded
5 out of 6 big
companies
are targeted with
phishing attacks
Phishing costs brands
worldwide $4.5 billion
each year
RSA identifies
a phishing attack
every minute
Email fraud has
up to a 45%
conversion rate
Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm
$4.5 B 1 MIN 5/6 45%
Phishing Leads To – Revenue Losses
• Reduced trust in brand:
• Subscribers don’t know what to trust
• Reduced effectiveness of email
• ISPs don’t know what to trust
Customers are 42% less likely to
interact with a brand after being
phished or spoofed.
Phishing Leads To – Unwanted Media Attention
“If you boil the jobs down of IT security
professionals, they are ultimately tasked with
protecting the brand… If you have a breach,
research suggests that 60% of your customers will
think about moving and 30% actually do.”
Bryan Littlefair
Global Chief Information Security Officer
Aviva
Phishing Leads To – Remediation Costs
Fraud Losses Malware Infection Investigation Remediation
Can You Spot a
Spoof?
Anatomy Of A
Phishing Email
to: You <you@yourdomain.com>
from: Phishing Company <phishingcompany@spoof.com>
subject: Unauthorized login attempt
Dear Customer,
We have recieved noticed that you have recently
attempted to login to your account from an unauthorized
device.
As a saftey measure, please visit the link below to
update your login details now:
http://www.phishingemail.com/updatedetails.asp
Once you have updated your details your account will
be secure from further unauthorized login attempts.
Thanks,
The Phishing Team
1 attachment
Making an email
look legitimate by
spoofing the
company name in
the “Display Name”
field.
Tricking email
servers into
delivering the email
to the inbox by
spoofing the
“envelope from”
address hidden in
the technical header
of the email.
Including logos,
company terms,
and urgent
language in the
body of the email.
Making an email
appear to come
from a brand by
using a legitimate
company domain, or
a domain that looks
like it in the “from”
field.
Creating convincing
subject lines to drive
recipients to open
the message.
Including links to
malicious websites
that prompt users to
give up
credentials
Including
attachments
containing malicious
content.
From: service@paypal.com <paypal@service.com>
From: PayPal <paypal@e.paypal.co.uk>
The Power of the
Right Data
Knowledge Is Your Best Defense
• We know there is no silver bullet.
• But defense starts with understanding.
• Data is the key to that understanding.
Breadth, Depth, and Speed
Contactually Molto ParibusGetAirHelp
Message Finder UnsubscriberOrganizer
EMAIL THREAT
DATA
· Consumer inbox data
· Email delivery data
· Authentication results
· Message level data
· SPAM trap & complaints data
EMAIL THREAT
INTELLIGENCE
· Domain-spoofing alerts
· Brand-spoofing intelligence
· Suspicious activity map
· Fraudcaster URL feed
· Sender Score: IP reputation
Email Fraud: Primary Attack Vectors
Domain Spoofing
(from domains owned by the brand)
Brand Spoofing
(from domains outside the brand’s control)
phish@company.com company@phish.com
30% of Attacks Spoof Domains You Own
30% Domain
Spoofing
• Active Emailing Domains
• Non-Sending Domains
• Defensively-Registered
Domains
70% Brand
Spoofing
• Cousin Domains
• Display Name Spoofing
• Subject Line Spoofing
• Email Account Spoofing
Source: Return Path / APWG White Paper, 2014
Unite Against
Email Fraud
Tips for defending your customers, your brand, and
your bottom line.
Leading Companies Fighting Email Fraud
DMARC (Domain-based Message Authentication Reporting &
Conformance):
• Technical specification created to help reduce the potential for email-
based abuse (www.dmarc.org)
• Prevents domain-based spoofing by blocking fraudulent activity
appearing to come from domains under your control
• Provides threat reporting mechanism (aggregate and forensic data)
#1: Authenticate Your Email
“Simply put, the DMARC standard works.
In a blended approach to fight email fraud, DMARC
represents the cornerstone of technical controls
that commercial senders can implement today to
rebuild trust and retake the email channel for
legitimate brands and consumers.”
Edward Tucker
Head of Cyber Security
Her Majesty’s Revenue & Customs
• Addressing the 70% of email attacks that spoof your brand using
domains your company does not own requires email threat
intelligence.
• Get visibility into all types of email threats targeting you today.
#2: Leverage Email Threat Intelligence
• The reality is, some attacks are always going to get through.
• The more prepared your customers are, the better.
• Create an educational website
• Include anti-fraud language within your legitimate email
• In the event of an attack, warn your customers immediately
#3: Educate Your Customers
• Engage with Brand Protection teams to make the business case.
• Create a sense of urgency.
• Communicate the risks that result from not taking action:
• Email fraud destroys brand reputation and erodes customer loyalty
• Email fraud thwarts email marketing effectiveness
• Email fraud negatively impacts revenue
#4: Raise Awareness with Top Executives
Learn More
www.returnpath.com/StopEmailFraud
Twitter: @StopEmailFraud
New: Download the Email Threat
Intelligence report at
bit.ly/EmailThreatIntel
Sydney • London • São Paulo • Chicago • New York • San Francisco • Los Angeles • Paris
Fill out the survey to
be entered into the
running to win a prize.
1 of 28

Recommended

Using Return Path Data to Protect Your Brand: Security Breakout Session - London by
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonUsing Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonReturn Path
308 views27 slides
Using Return Path Data to Protect Your Brand: Security Breakout Session - San... by
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Return Path
252 views26 slides
Email marketing 101 by
Email marketing 101Email marketing 101
Email marketing 101Rethink Marketing
1.4K views36 slides
8 ways to improve email deliverability rates by
8 ways to improve email deliverability rates8 ways to improve email deliverability rates
8 ways to improve email deliverability ratesLocke Truong
80 views12 slides
Maximise Email Deliverability by
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email DeliverabilityGetResponse
1.8K views14 slides
Email Marketing and MailChimp by
Email Marketing and MailChimpEmail Marketing and MailChimp
Email Marketing and MailChimpMickey Mellen
1.9K views60 slides

More Related Content

What's hot

Clearout use cases by
Clearout use casesClearout use cases
Clearout use casesAjit Raj
15 views4 slides
Email Validation for Improved Deliverability and Marketing Results by
Email Validation for Improved Deliverability and Marketing ResultsEmail Validation for Improved Deliverability and Marketing Results
Email Validation for Improved Deliverability and Marketing ResultsScott Valentine, MBA, CSPO
1.7K views7 slides
Stay Out of Spam Folder by
Stay Out of Spam FolderStay Out of Spam Folder
Stay Out of Spam FolderMyStockAlarm
288 views7 slides
Email Deliverability: The What, Why & How by
Email Deliverability: The What, Why & HowEmail Deliverability: The What, Why & How
Email Deliverability: The What, Why & HowYes Lifecycle Marketing
953 views31 slides
B2B Email Deliverability Whitepaper by
B2B Email Deliverability WhitepaperB2B Email Deliverability Whitepaper
B2B Email Deliverability WhitepaperB2B Email Experts
358 views16 slides
How to get your emails delivered into the inbox by
How to get your emails delivered into the inboxHow to get your emails delivered into the inbox
How to get your emails delivered into the inboxRed C
508 views22 slides

What's hot(17)

Clearout use cases by Ajit Raj
Clearout use casesClearout use cases
Clearout use cases
Ajit Raj15 views
Stay Out of Spam Folder by MyStockAlarm
Stay Out of Spam FolderStay Out of Spam Folder
Stay Out of Spam Folder
MyStockAlarm288 views
How to get your emails delivered into the inbox by Red C
How to get your emails delivered into the inboxHow to get your emails delivered into the inbox
How to get your emails delivered into the inbox
Red C508 views
20 rules for successful cold emailing by Olga Protska
20 rules for successful cold emailing20 rules for successful cold emailing
20 rules for successful cold emailing
Olga Protska21 views
Email Delivery Optimization Techniques from Email Marketing Solutions Provide... by Manjunatha Kg
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Manjunatha Kg1.6K views
Email Marketing: Expand Your Reach, Grow Your Business by Mark J. Feldman
Email Marketing: Expand Your Reach, Grow Your BusinessEmail Marketing: Expand Your Reach, Grow Your Business
Email Marketing: Expand Your Reach, Grow Your Business
Mark J. Feldman1.7K views
Email Marketing Automation Quick Facts - LeadPro247 by Paddu Govindaraj
Email Marketing Automation Quick Facts - LeadPro247Email Marketing Automation Quick Facts - LeadPro247
Email Marketing Automation Quick Facts - LeadPro247
Paddu Govindaraj301 views
Email Marketing Tips and Tricks by Mark J. Feldman
Email Marketing Tips and TricksEmail Marketing Tips and Tricks
Email Marketing Tips and Tricks
Mark J. Feldman33.1K views
EMarketing Techniques Conference_Emailmarketingessentials May2008 by Corporate College
EMarketing Techniques Conference_Emailmarketingessentials May2008EMarketing Techniques Conference_Emailmarketingessentials May2008
EMarketing Techniques Conference_Emailmarketingessentials May2008
Corporate College792 views
Data Vision E Contact by Shwebbm
Data Vision E ContactData Vision E Contact
Data Vision E Contact
Shwebbm408 views
Mailchimp Introduction by Jerry Hickman
Mailchimp IntroductionMailchimp Introduction
Mailchimp Introduction
Jerry Hickman4.7K views

Viewers also liked

How to Maximize the Value of Your Email Program by
How to Maximize the Value of Your Email ProgramHow to Maximize the Value of Your Email Program
How to Maximize the Value of Your Email ProgramReturn Path
317 views44 slides
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA by
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LALittle Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LAReturn Path
267 views20 slides
World Tour Keynote Presentation - London by
World Tour Keynote Presentation - LondonWorld Tour Keynote Presentation - London
World Tour Keynote Presentation - LondonReturn Path
187 views23 slides
Renaissance Art by
Renaissance ArtRenaissance Art
Renaissance ArtRobin Burke
1.1K views19 slides
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Return Path
211 views43 slides
World War II by
World War IIWorld War II
World War IIRobin Burke
305 views11 slides

Viewers also liked(14)

How to Maximize the Value of Your Email Program by Return Path
How to Maximize the Value of Your Email ProgramHow to Maximize the Value of Your Email Program
How to Maximize the Value of Your Email Program
Return Path317 views
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA by Return Path
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LALittle Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Return Path267 views
World Tour Keynote Presentation - London by Return Path
World Tour Keynote Presentation - LondonWorld Tour Keynote Presentation - London
World Tour Keynote Presentation - London
Return Path187 views
Renaissance Art by Robin Burke
Renaissance ArtRenaissance Art
Renaissance Art
Robin Burke1.1K views
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by Return Path
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path211 views
Infographic: How to Prevent Email Fraud with DMARC by Return Path
Infographic: How to Prevent Email Fraud with DMARCInfographic: How to Prevent Email Fraud with DMARC
Infographic: How to Prevent Email Fraud with DMARC
Return Path777 views
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC by Return Path
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Return Path216 views
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by Return Path
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path311 views
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - London by Return Path
 Little Data, Big Decisions: The Path to Data Enlightenment Keynote - London Little Data, Big Decisions: The Path to Data Enlightenment Keynote - London
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - London
Return Path198 views
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA by Return Path
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAUsing Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
Return Path300 views
How Cybercriminals Cheat Email Authentication by Return Path
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email Authentication
Return Path489 views
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by Return Path
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path471 views

Similar to Using Return Path Data to Protect Your Brand: Security Breakout Session - Chicago

Marketing Cloud - Partner Office Hour (August 18, 2015) by
Marketing Cloud - Partner Office Hour (August 18, 2015)Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)Salesforce Partners
666 views48 slides
2010 Spam Filtered World Fv by
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
540 views69 slides
7 top tips to protect your business from BEC [infographic] By Stellarise by
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By StellariseElena Tatarenkova
201 views1 slide
Protect your domain with DMARC by
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARCContactlab
820 views50 slides
Email: still the favourite route of attack by
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attackClaranet UK
500 views18 slides
eDM Strategy by
eDM Strategy eDM Strategy
eDM Strategy Preetha
10K views23 slides

Similar to Using Return Path Data to Protect Your Brand: Security Breakout Session - Chicago(20)

Marketing Cloud - Partner Office Hour (August 18, 2015) by Salesforce Partners
Marketing Cloud - Partner Office Hour (August 18, 2015)Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)
2010 Spam Filtered World Fv by cactussky
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
cactussky540 views
7 top tips to protect your business from BEC [infographic] By Stellarise by Elena Tatarenkova
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise
Elena Tatarenkova201 views
Protect your domain with DMARC by Contactlab
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
Contactlab820 views
Email: still the favourite route of attack by Claranet UK
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
Claranet UK500 views
eDM Strategy by Preetha
eDM Strategy eDM Strategy
eDM Strategy
Preetha 10K views
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing... by WhoisXML API
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
WhoisXML API77 views
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao... by Return Path
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Return Path412 views
M B F009 Patel 091907 by Dreamforce07
M B F009  Patel 091907M B F009  Patel 091907
M B F009 Patel 091907
Dreamforce07375 views
Overcoming the 3 Challenges to Optimizing Your Email Program by LiveIntent
Overcoming the 3 Challenges to Optimizing Your Email ProgramOvercoming the 3 Challenges to Optimizing Your Email Program
Overcoming the 3 Challenges to Optimizing Your Email Program
LiveIntent1.3K views
Open It, Read It, Buy It Email Marketing with the AppExchange by dreamforce2006
Open It, Read It, Buy It Email Marketing with the AppExchangeOpen It, Read It, Buy It Email Marketing with the AppExchange
Open It, Read It, Buy It Email Marketing with the AppExchange
dreamforce20061.3K views
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by Return Path
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path342 views

More from Return Path

Understanding Gmail Deliverability by
Understanding Gmail DeliverabilityUnderstanding Gmail Deliverability
Understanding Gmail DeliverabilityReturn Path
974 views13 slides
Green Eggs & Spam by
Green Eggs & SpamGreen Eggs & Spam
Green Eggs & SpamReturn Path
382 views24 slides
Return Path World Tour Keynote - San Francisco by
Return Path World Tour Keynote - San FranciscoReturn Path World Tour Keynote - San Francisco
Return Path World Tour Keynote - San FranciscoReturn Path
185 views57 slides
Return Path World Tour Keynote - New York by
Return Path World Tour Keynote - New YorkReturn Path World Tour Keynote - New York
Return Path World Tour Keynote - New YorkReturn Path
209 views58 slides
Return Path World Tour Keynote - Sao Paulo by
Return Path World Tour Keynote - Sao PauloReturn Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sao PauloReturn Path
247 views70 slides
Return Path World Tour Keynote - Sydney by
Return Path World Tour Keynote - SydneyReturn Path World Tour Keynote - Sydney
Return Path World Tour Keynote - SydneyReturn Path
140 views29 slides

More from Return Path(20)

Understanding Gmail Deliverability by Return Path
Understanding Gmail DeliverabilityUnderstanding Gmail Deliverability
Understanding Gmail Deliverability
Return Path974 views
Green Eggs & Spam by Return Path
Green Eggs & SpamGreen Eggs & Spam
Green Eggs & Spam
Return Path382 views
Return Path World Tour Keynote - San Francisco by Return Path
Return Path World Tour Keynote - San FranciscoReturn Path World Tour Keynote - San Francisco
Return Path World Tour Keynote - San Francisco
Return Path185 views
Return Path World Tour Keynote - New York by Return Path
Return Path World Tour Keynote - New YorkReturn Path World Tour Keynote - New York
Return Path World Tour Keynote - New York
Return Path209 views
Return Path World Tour Keynote - Sao Paulo by Return Path
Return Path World Tour Keynote - Sao PauloReturn Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sao Paulo
Return Path247 views
Return Path World Tour Keynote - Sydney by Return Path
Return Path World Tour Keynote - SydneyReturn Path World Tour Keynote - Sydney
Return Path World Tour Keynote - Sydney
Return Path140 views
Return Path World Tour Keynote - Paris by Return Path
Return Path World Tour Keynote - ParisReturn Path World Tour Keynote - Paris
Return Path World Tour Keynote - Paris
Return Path212 views
Stemming the Fall of Email Deliverability by Return Path
Stemming the Fall of Email DeliverabilityStemming the Fall of Email Deliverability
Stemming the Fall of Email Deliverability
Return Path149 views
Return Path Academy on 7 September 2016 by Return Path
Return Path Academy on 7 September 2016Return Path Academy on 7 September 2016
Return Path Academy on 7 September 2016
Return Path196 views
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It. by Return Path
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Return Path385 views
How to keep_your_lists_clean_and_improve_deliverability by Return Path
How to keep_your_lists_clean_and_improve_deliverabilityHow to keep_your_lists_clean_and_improve_deliverability
How to keep_your_lists_clean_and_improve_deliverability
Return Path187 views
The Hidden Metrics of Email Deliverability Webinar by Return Path
The Hidden Metrics of Email Deliverability WebinarThe Hidden Metrics of Email Deliverability Webinar
The Hidden Metrics of Email Deliverability Webinar
Return Path1.1K views
CASL One Year Later by Return Path
CASL One Year Later CASL One Year Later
CASL One Year Later
Return Path908 views
Email Optimization Suite Product Overview by Return Path
Email Optimization Suite Product OverviewEmail Optimization Suite Product Overview
Email Optimization Suite Product Overview
Return Path380 views
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran... by Return Path
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Return Path264 views
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by Return Path
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path198 views
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC by Return Path
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYCLittle Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Return Path225 views
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by Return Path
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path281 views
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago by Return Path
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - ChicagoLittle Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Return Path225 views
Increase Open Rates by Sending at the Best Time by Return Path
Increase Open Rates by Sending at the Best TimeIncrease Open Rates by Sending at the Best Time
Increase Open Rates by Sending at the Best Time
Return Path994 views

Recently uploaded

Ukraine Infographic_22NOV2023_v2.pdf by
Ukraine Infographic_22NOV2023_v2.pdfUkraine Infographic_22NOV2023_v2.pdf
Ukraine Infographic_22NOV2023_v2.pdfAnastosiyaGurin
1.4K views3 slides
Data Journeys Hard Talk workshop final.pptx by
Data Journeys Hard Talk workshop final.pptxData Journeys Hard Talk workshop final.pptx
Data Journeys Hard Talk workshop final.pptxinfo828217
10 views18 slides
[DSC Europe 23] Zsolt Feleki - Machine Translation should we trust it.pptx by
[DSC Europe 23] Zsolt Feleki - Machine Translation should we trust it.pptx[DSC Europe 23] Zsolt Feleki - Machine Translation should we trust it.pptx
[DSC Europe 23] Zsolt Feleki - Machine Translation should we trust it.pptxDataScienceConferenc1
5 views12 slides
Data about the sector workshop by
Data about the sector workshopData about the sector workshop
Data about the sector workshopinfo828217
12 views27 slides
RIO GRANDE SUPPLY COMPANY INC, JAYSON.docx by
RIO GRANDE SUPPLY COMPANY INC, JAYSON.docxRIO GRANDE SUPPLY COMPANY INC, JAYSON.docx
RIO GRANDE SUPPLY COMPANY INC, JAYSON.docxJaysonGarabilesEspej
6 views3 slides
Cross-network in Google Analytics 4.pdf by
Cross-network in Google Analytics 4.pdfCross-network in Google Analytics 4.pdf
Cross-network in Google Analytics 4.pdfGA4 Tutorials
6 views7 slides

Recently uploaded(20)

Ukraine Infographic_22NOV2023_v2.pdf by AnastosiyaGurin
Ukraine Infographic_22NOV2023_v2.pdfUkraine Infographic_22NOV2023_v2.pdf
Ukraine Infographic_22NOV2023_v2.pdf
AnastosiyaGurin1.4K views
Data Journeys Hard Talk workshop final.pptx by info828217
Data Journeys Hard Talk workshop final.pptxData Journeys Hard Talk workshop final.pptx
Data Journeys Hard Talk workshop final.pptx
info82821710 views
[DSC Europe 23] Zsolt Feleki - Machine Translation should we trust it.pptx by DataScienceConferenc1
[DSC Europe 23] Zsolt Feleki - Machine Translation should we trust it.pptx[DSC Europe 23] Zsolt Feleki - Machine Translation should we trust it.pptx
[DSC Europe 23] Zsolt Feleki - Machine Translation should we trust it.pptx
Data about the sector workshop by info828217
Data about the sector workshopData about the sector workshop
Data about the sector workshop
info82821712 views
Cross-network in Google Analytics 4.pdf by GA4 Tutorials
Cross-network in Google Analytics 4.pdfCross-network in Google Analytics 4.pdf
Cross-network in Google Analytics 4.pdf
GA4 Tutorials6 views
[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation by DataScienceConferenc1
[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation
[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation
Advanced_Recommendation_Systems_Presentation.pptx by neeharikasingh29
Advanced_Recommendation_Systems_Presentation.pptxAdvanced_Recommendation_Systems_Presentation.pptx
Advanced_Recommendation_Systems_Presentation.pptx
[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M... by DataScienceConferenc1
[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M...[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M...
[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M...
UNEP FI CRS Climate Risk Results.pptx by pekka28
UNEP FI CRS Climate Risk Results.pptxUNEP FI CRS Climate Risk Results.pptx
UNEP FI CRS Climate Risk Results.pptx
pekka2811 views
Survey on Factuality in LLM's.pptx by NeethaSherra1
Survey on Factuality in LLM's.pptxSurvey on Factuality in LLM's.pptx
Survey on Factuality in LLM's.pptx
NeethaSherra16 views
CRM stick or twist workshop by info828217
CRM stick or twist workshopCRM stick or twist workshop
CRM stick or twist workshop
info8282179 views
Organic Shopping in Google Analytics 4.pdf by GA4 Tutorials
Organic Shopping in Google Analytics 4.pdfOrganic Shopping in Google Analytics 4.pdf
Organic Shopping in Google Analytics 4.pdf
GA4 Tutorials14 views
Short Story Assignment by Kelly Nguyen by kellynguyen01
Short Story Assignment by Kelly NguyenShort Story Assignment by Kelly Nguyen
Short Story Assignment by Kelly Nguyen
kellynguyen0119 views
Chapter 3b- Process Communication (1) (1)(1) (1).pptx by ayeshabaig2004
Chapter 3b- Process Communication (1) (1)(1) (1).pptxChapter 3b- Process Communication (1) (1)(1) (1).pptx
Chapter 3b- Process Communication (1) (1)(1) (1).pptx
ayeshabaig20046 views
CRM stick or twist.pptx by info828217
CRM stick or twist.pptxCRM stick or twist.pptx
CRM stick or twist.pptx
info82821710 views
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx by DataScienceConferenc1
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx

Using Return Path Data to Protect Your Brand: Security Breakout Session - Chicago

  • 1. #RPWT Little Data, Big Decisions: The Path to Data Enlightenment Keynote 3:30 - 4:00 Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Session 4:45 - 5:30 Tami Forman, Vice President of Corporate Marketing & Communications, Return Path Speakers: Casey Swanton, Director Response Consulting, Return Path Brandon Dingae, Director, Sales Enablement, Return Path 4:00 - 4:45 Real Data, Real Results: Customer Showcase & Panel Discussion 4:45 - 5:30 Using Return Path Data to Protect Your Brand: Security Breakout Session 5:30 Networking and cocktails Please join us as we wrap up the day!
  • 2. Using Return Path Data to Protect Your Brand Security Breakout Session Brandon Dingae, Director, Sales Enablement
  • 3. Agenda • Email fraud trends and impact • The power of data: email threat intelligence • The Return Path Data Cloud • Tactics used by cybercriminals today • Unite against email fraud: tips for defending your customers, brand, and bottom line • Questions
  • 5. Email Delivers Business Value… Increases Customer Loyalty Boosts Revenue Reduces Operating Costs
  • 6. …But Its Impact Is Being Eroded 5 out of 6 big companies are targeted with phishing attacks Phishing costs brands worldwide $4.5 billion each year RSA identifies a phishing attack every minute Email fraud has up to a 45% conversion rate Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm $4.5 B 1 MIN 5/6 45%
  • 7. Phishing Leads To – Revenue Losses • Reduced trust in brand: • Subscribers don’t know what to trust • Reduced effectiveness of email • ISPs don’t know what to trust Customers are 42% less likely to interact with a brand after being phished or spoofed.
  • 8. Phishing Leads To – Unwanted Media Attention
  • 9. “If you boil the jobs down of IT security professionals, they are ultimately tasked with protecting the brand… If you have a breach, research suggests that 60% of your customers will think about moving and 30% actually do.” Bryan Littlefair Global Chief Information Security Officer Aviva
  • 10. Phishing Leads To – Remediation Costs Fraud Losses Malware Infection Investigation Remediation
  • 11. Can You Spot a Spoof?
  • 12. Anatomy Of A Phishing Email to: You <you@yourdomain.com> from: Phishing Company <phishingcompany@spoof.com> subject: Unauthorized login attempt Dear Customer, We have recieved noticed that you have recently attempted to login to your account from an unauthorized device. As a saftey measure, please visit the link below to update your login details now: http://www.phishingemail.com/updatedetails.asp Once you have updated your details your account will be secure from further unauthorized login attempts. Thanks, The Phishing Team 1 attachment Making an email look legitimate by spoofing the company name in the “Display Name” field. Tricking email servers into delivering the email to the inbox by spoofing the “envelope from” address hidden in the technical header of the email. Including logos, company terms, and urgent language in the body of the email. Making an email appear to come from a brand by using a legitimate company domain, or a domain that looks like it in the “from” field. Creating convincing subject lines to drive recipients to open the message. Including links to malicious websites that prompt users to give up credentials Including attachments containing malicious content.
  • 13. From: service@paypal.com <paypal@service.com> From: PayPal <paypal@e.paypal.co.uk>
  • 14. The Power of the Right Data
  • 15. Knowledge Is Your Best Defense • We know there is no silver bullet. • But defense starts with understanding. • Data is the key to that understanding.
  • 16. Breadth, Depth, and Speed Contactually Molto ParibusGetAirHelp Message Finder UnsubscriberOrganizer
  • 17. EMAIL THREAT DATA · Consumer inbox data · Email delivery data · Authentication results · Message level data · SPAM trap & complaints data EMAIL THREAT INTELLIGENCE · Domain-spoofing alerts · Brand-spoofing intelligence · Suspicious activity map · Fraudcaster URL feed · Sender Score: IP reputation
  • 18. Email Fraud: Primary Attack Vectors Domain Spoofing (from domains owned by the brand) Brand Spoofing (from domains outside the brand’s control) phish@company.com company@phish.com
  • 19. 30% of Attacks Spoof Domains You Own 30% Domain Spoofing • Active Emailing Domains • Non-Sending Domains • Defensively-Registered Domains 70% Brand Spoofing • Cousin Domains • Display Name Spoofing • Subject Line Spoofing • Email Account Spoofing Source: Return Path / APWG White Paper, 2014
  • 20. Unite Against Email Fraud Tips for defending your customers, your brand, and your bottom line.
  • 22. DMARC (Domain-based Message Authentication Reporting & Conformance): • Technical specification created to help reduce the potential for email- based abuse (www.dmarc.org) • Prevents domain-based spoofing by blocking fraudulent activity appearing to come from domains under your control • Provides threat reporting mechanism (aggregate and forensic data) #1: Authenticate Your Email
  • 23. “Simply put, the DMARC standard works. In a blended approach to fight email fraud, DMARC represents the cornerstone of technical controls that commercial senders can implement today to rebuild trust and retake the email channel for legitimate brands and consumers.” Edward Tucker Head of Cyber Security Her Majesty’s Revenue & Customs
  • 24. • Addressing the 70% of email attacks that spoof your brand using domains your company does not own requires email threat intelligence. • Get visibility into all types of email threats targeting you today. #2: Leverage Email Threat Intelligence
  • 25. • The reality is, some attacks are always going to get through. • The more prepared your customers are, the better. • Create an educational website • Include anti-fraud language within your legitimate email • In the event of an attack, warn your customers immediately #3: Educate Your Customers
  • 26. • Engage with Brand Protection teams to make the business case. • Create a sense of urgency. • Communicate the risks that result from not taking action: • Email fraud destroys brand reputation and erodes customer loyalty • Email fraud thwarts email marketing effectiveness • Email fraud negatively impacts revenue #4: Raise Awareness with Top Executives
  • 27. Learn More www.returnpath.com/StopEmailFraud Twitter: @StopEmailFraud New: Download the Email Threat Intelligence report at bit.ly/EmailThreatIntel
  • 28. Sydney • London • São Paulo • Chicago • New York • San Francisco • Los Angeles • Paris Fill out the survey to be entered into the running to win a prize.

Editor's Notes

  1. CHICAGO
  2. Value to businesses Email is a very valuable marketing medium for businesses for all of the above reasons (low cost, effectiveness, scale, format), but it’s also effective for fraudsters for the same reasons.
  3. Every day, beyond your control, cybercriminals send emails that spoof your brand, targeting your customers, partners, and suppliers with malicious content. Email Fraud continues to grow (50% YOY growth in volume of email attacks based on APWG data) and, in spite of the recent shutdowns of larger botnets, phishing shows no sign yet of abating, with more than 400 brands are phished each month (Anti-Phishing Working Group) Two biggest trends: an increase in the volume of attacks and an increase in the sophistication.
  4. #3 – Phishing is Impacting Revenue. Email fraud has a dramatic impact on the trust your customers have in your brand. It also reduce the effectiveness of email that is legitimate. A great data point from Cloudmark here: customers are 42% less likely to interact with a brand after being phished or spoofed. So, we all recognise that it’s an old problem and most of us know that it hurts our business. And yet many companies we speak to still struggle to justify investment in solutions, leaving their brands and their customers vulnerable. I believe that’s because, in the first place, measuring the impact is difficult: tying fraud losses and expenses back to specific activities is difficult and quantifying the value of brand integrity has always proved elusive. Okay, so let’s talk now about solving the problem. Prior to working at Return Path, I worked in the brand & fraud protection industry for 10 years. And, during those 10 years, I watched the evolution and growth of the problem space and observed the stagnation of innovation.
  5. Phishing is on old problem, and it’s not going away so lets look at the way it is impacting businesses today. #1 – Phishing is Making Headlines and Is Destroying Reputations Some of the most respected brands out there are making the headlines: Amazon, Home Depot, Booking.com and more recently US health insurer giant Anthem.
  6. Here is a great quote from Aviva’s CISO Bryan Littlefair on why it is the CISO’s responsibility to protect the brand, in collaboration with Marketing.
  7. #2 – Phishing Is Losing Companies Millions in hard costs Fraud losses Malware infection (secondary damages/losses) Investigation Remediation
  8. If you have to explain to marketing... graphic to use security and tech. See that as aware when comes to email look at points they can hit on in order to break through. Not just Friendly From, different ways to use email. What highlighting here. Fits with email advantages email slide... 97% of people globally cannot correctly identify a sophisticated phishing email. And there is a plethora of ways fraudsters can spoof your identity…
  9. Can you spot the spoof? (chances are you can) Now.. Are you confident YOUR CUSTOMERS can? The simple answer is NO. So this is why it is critical that you use the right data to shine the light on all the types of email threats that are targeting your brand today.
  10. Show of hands if you think that the majority of the email threats against your brand spoof domains under your control? In other words, what percentage of attacks come from a legitimate hsbc.com domain?
  11. So what are we saying: well at risk of sounding obvious, knowledge is your best defense.
  12. With such a complex threat landscape, you need breadth, depth and speed when it comes to email threat intelligence, and this is what we mean by it: data from mailbox providers, data from security vendors, and data from consumer inboxes to give you a complete pictures of all the threats spoofing your domains (under your control) and your brand (outside your control).
  13. Powered by the Return Path Data Cloud, our proprietary email threat intelligence empowers you to identify threats beyond DMARC — so you can respond to the 70% of email attacks spoofing your brand from domains that you do not control. We use over 100 data feeds from more than 70 providers to detect, classify and analyze data relating to over 6 billion emails every day. Now imagine having this data available to your teams so you can detect, block and respond to email threats in real time. Respond to the 70% of email attacks spoofing your brand from domains that you do not own. DMARC is a great first step, but it’s not a complete solution, protecting your brand from only 30% of email threats. Powered by the Return Path Data Cloud, our proprietary email threat intelligence empowers you to identify threats beyond DMARC. We use over 100 data feeds from more than 70 mailbox and security providers to detect, classify and analyze data relating to over 5.5 billion emails every day. With Email Threat Intelligence, you can: Get insight into email threats, coming from domains that your company does not own (e.g. cousin domains, display name spoofing, subject line spoofing). View redacted message-level samples of fraudulent emails targeting your brand. Identify phishing URLs embedded in fraudulent emails and inform your takedown vendor(s). Integrate intelligence into your existing systems through a RESTful API. Manage all Email Governance and Email Threat Intelligence alerts from a single portal.
  14. Fraudsters will target your brand in two ways: by spoofing your domains, or by spoofing your brand in other ways. Both attack vectors are critical and you need visibility into all attacks, which is why it is important to have access to the RIGHT data.
  15. We ran some primary research in sept 2014, looking at 18 billion suspicious emails, targeting 11 banks in the UK and the US. And what did we discover? 30% of the attacks came from an email address from a domain that was owned by the bank that leaves 70% that were spoofed in some other ways like display name spoofing. This is REALLY relevant to our solution because we seek to address both: the 30% and the 70%. We analysed 40 of the top global brands for a period of 2 months (july/August 2015) and looked at fraudulent emails coming from the 70% we covered here. These are some of the tactics we were able to uncover thanks to email threat data: 1. Snowshoeing is still rife and monitoring IP reputations needs to be part of a multi-faceted email fraud protection strategy 2. Fraudsters do not go to the trouble of rotating elements of their subject lines, preferring a more template-based approach. Access to message-level data from email threat intelligence sources should help you prioritize your efforts around attack mitigation. 3. The most frequently spoofed Header From field is the Display Name, for which there is currently no authentication mechanism. Visibility into Display Name spoofing is critical in identifying and responding to phishing attacks leveraging your brand.
  16. It’s time to unite against email fraud… And here are some of the leading brands out there at the forefront of this initiative (next slide)
  17. Security understands the risks, but Marketing and Sales executives must be shown how this affects the real bottom line. This impacts revenue, market share and partnership opportunities, to name a few. Reduced effectiveness: Once they have been harmed by something tied to your brand, customers are afraid to open anything that comes from you. All of the work you put into crafting an effective message is wasted, if they refuse to open it. This can be especially bad for seasonal promotions. The bad guys know you’ll be sending out special promotions, so they’ll send their own versions to trick people. Word gets out about a scam and people won’t open your promotional notes during the key perioe. This also skews your metrics, because you don’t get a good sample of “regular” customer reactions to a campaign. Customers now have a bad feeling tied to your brand. Even if their head accepted the explanation that something was really not from you, their gut has a twinge when they see your brand. When they’re shopping next time, that will impact their mindset. Maybe they’ll try another brand. (Google, Orbitz, Kayak searches) It's not just lower revenue. There are hidden added costs of dealing with reversing fraudulent purchases, resetting customer accounts, resolving customer issues. Also - It's not just about business. You don't want anyone using the power of your brand to trick people.