Using Return Path Data to Protect Your Brand: Security Breakout Session - London

Return Path
Return PathReturn Path
#RPWT
Little Data, Big Decisions:
The Path to Data Enlightenment Keynote
3:45 - 4:15
Using Return Path Data to Promote Your Brand:
Marketing/Research Breakout Session
5:00 - 5:45
Scott Roth, Chief Marketing
Officer, Return Path
Speakers:
Guy Hanson, Sr. Director,
Professional Services,
Return Path
Rob Holmes, General Manager,
Email Fraud Protection,
Return Path
4:15- 4:45
Real Data, Real Results:
Customer Showcase & Panel Discussion
5:00 - 5:45
Using Return Path Data to Protect Your Brand:
Security Breakout Session
5:45 - 7:00
Networking and cocktails
Please join us as we wrap up the day!
Opening Remarks
Guest Speaker
3:00 - 3:45
Sara Murray, Entrepreneur &
Founder of confused.com &
Buddi
4:45 – 5:00
Coffee break
Using Return Path Data to Protect Your Brand
Security Breakout Session
Rob Holmes, General Manager, Email Fraud Protection
Agenda
• Email fraud trends and impact
• The power of data: email threat intelligence
• The Return Path Data Cloud
• Tactics used by cybercriminals today
• Unite against email fraud: tips for defending your customers, brand, and
bottom line
• Questions
Email Fraud Trends
& Impact
Email Delivers Business Value…
Increases
Customer Loyalty
Boosts
Revenue
Reduces
Operating Costs
…But Its Impact Is Being Eroded
5 out of 6 big
companies
are targeted with
phishing attacks
Phishing costs brands
worldwide $4.5 billion
each year
RSA identifies
a phishing attack
every minute
Email fraud has
up to a 45%
conversion rate
Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm
$4.5 B 1 MIN 5/6 45%
Phishing Leads To – Revenue Losses
• Reduced effectiveness of email
• ISPs don’t know what to trust
• Reduced trust in brand:
• Subscribers don’t know what to trust
Customers are 42% less likely to
interact with a brand after being
phished or spoofed.
Phishing Leads To – Unwanted Media Attention
“If you boil the jobs down of IT security
professionals, they are ultimately tasked with
protecting the brand… If you have a breach,
research suggests that 60% of your customers will
think about moving and 30% actually do.”
Bryan Littlefair
Global Chief Information Security Officer
Aviva
InvestigationRemediation
Phishing Leads To – Remediation Costs
Fraud Losses Malware Infection
Can You Spot a
Spoof?
Anatomy Of A
Phishing Email
to: You <you@yourdomain.com>
from: Phishing Company <phishingcompany@spoof.com>
subject: Unauthorized login attempt
Dear Customer,
We have recieved noticed that you have recently
attempted to login to your account from an unauthorized
device.
As a saftey measure, please visit the link below to
update your login details now:
http://www.phishingemail.com/updatedetails.asp
Once you have updated your details your account will
be secure from further unauthorized login attempts.
Thanks,
The Phishing Team
1 attachment
Making an email
look legitimate by
spoofing the
company name in
the “Display Name”
field.
Tricking email
servers into
delivering the email
to the inbox by
spoofing the
“envelope from”
address hidden in
the technical header
of the email.
Including logos,
company terms,
and urgent
language in the
body of the email.
Making an email
appear to come
from a brand by
using a legitimate
company domain, or
a domain that looks
like it in the “from”
field.
Creating convincing
subject lines to drive
recipients to open
the message.
Including links to
malicious websites
that prompt users to
give up
credentials
Including
attachments
containing malicious
content.
From: service@paypal.com <paypal@service.com>
From: PayPal <paypal@e.paypal.co.uk>
The Power of the
Right Data
Knowledge Is Your Best Defense
• We know there is no silver bullet.
• But defense starts with understanding.
• Data is the key to that understanding.
Breadth, Depth, and Speed
Contactually Molto ParibusGetAirHelp
Message Finder UnsubscriberOrganizer
EMAIL THREAT
DATA
· Consumer inbox data
· Email delivery data
· Authentication results
· Message level data
· SPAM trap & complaints data
EMAIL THREAT
INTELLIGENCE
· Domain-spoofing alerts
· Brand-spoofing intelligence
· Suspicious activity map
· Fraudcaster URL feed
· Sender Score: IP reputation
Email Fraud: Primary Attack Vectors
Domain Spoofing
(from domains owned by the brand)
Brand Spoofing
(from domains outside the brand’s control)
phish@company.com company@phish.com
30% of Attacks Spoof Domains You Own
30% Domain
Spoofing
• Active Emailing Domains
• Non-Sending Domains
• Defensively-Registered
Domains
70% Brand
Spoofing
• Cousin Domains
• Display Name Spoofing
• Subject Line Spoofing
• Email Account Spoofing
Source: Return Path / APWG White Paper, 2014
Unite Against
Email Fraud
Tips for defending your customers, your brand, and
your bottom line.
DMARC (Domain-based Message Authentication Reporting &
Conformance):
• Technical specification created to help reduce the potential for email-
based abuse (www.dmarc.org)
• Prevents domain-based spoofing by blocking fraudulent activity
appearing to come from domains under your control
• Provides threat reporting mechanism (aggregate and forensic data)
#1: Authenticate Your Email
“Simply put, the DMARC standard works.
In a blended approach to fight email fraud, DMARC
represents the cornerstone of technical controls
that commercial senders can implement today to
rebuild trust and retake the email channel for
legitimate brands and consumers.”
Edward Tucker
Head of Cyber Security
Her Majesty’s Revenue & Customs
• Addressing the 70% of email attacks that spoof your brand using
domains your company does not own requires email threat
intelligence.
• Get visibility into all types of email threats targeting you today.
#2: Leverage Email Threat Intelligence
Return Path’s Solution
Legitimate
Email
Malicious
Email
marketing@
company.com
marketing@
c0mpany.com
company
@phish.com
phish@
company.com
DMARC
Rejected
Provider
Network
Return Path
Data Cloud Email Threat
Intelligence
Email
Governance
Company Security
Operations Center
Takedown
Vendor
Consumer
Inbox
• The reality is, some attacks are always going to get through.
• The more prepared your customers are, the better.
• Create an educational website
• Include anti-fraud language within your legitimate email
• In the event of an attack, warn your customers immediately
#3: Educate Your Customers
• Engage with Brand Protection teams to make the business case.
• Create a sense of urgency.
• Communicate the risks that result from not taking action:
• Email fraud destroys brand reputation and erodes customer loyalty
• Email fraud thwarts email marketing effectiveness
• Email fraud negatively impacts revenue
#4: Raise Awareness with Top Executives
Learn More
www.returnpath.com/StopEmailFraud
Twitter: @StopEmailFraud
New: Download the Email Threat
Intelligence report at
bit.ly/EmailThreatIntel
1 of 27

Recommended

Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi... by
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Return Path
240 views28 slides
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC by
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCReturn Path
216 views25 slides
Using Return Path Data to Protect Your Brand: Security Breakout Session - San... by
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Return Path
252 views26 slides
2010 Spam Filtered World Fv by
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
540 views69 slides
Email marketing 101 by
Email marketing 101Email marketing 101
Email marketing 101Rethink Marketing
1.4K views36 slides
Email Marketing and MailChimp by
Email Marketing and MailChimpEmail Marketing and MailChimp
Email Marketing and MailChimpMickey Mellen
1.9K views60 slides

More Related Content

What's hot

Using Return Path Data to Protect Your Brand: Security Breakout Session - LA by
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAUsing Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAReturn Path
300 views26 slides
Email & Real Estate by
Email & Real EstateEmail & Real Estate
Email & Real Estatedavidsmerdon
568 views49 slides
8 ways to improve email deliverability rates by
8 ways to improve email deliverability rates8 ways to improve email deliverability rates
8 ways to improve email deliverability ratesLocke Truong
83 views12 slides
Marketing Cloud - Partner Office Hour (August 18, 2015) by
Marketing Cloud - Partner Office Hour (August 18, 2015)Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)Salesforce Partners
666 views48 slides
How to get your emails delivered into the inbox by
How to get your emails delivered into the inboxHow to get your emails delivered into the inbox
How to get your emails delivered into the inboxRed C
508 views22 slides
M B F009 Patel 091907 by
M B F009  Patel 091907M B F009  Patel 091907
M B F009 Patel 091907Dreamforce07
375 views33 slides

What's hot(20)

Using Return Path Data to Protect Your Brand: Security Breakout Session - LA by Return Path
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAUsing Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
Return Path300 views
8 ways to improve email deliverability rates by Locke Truong
8 ways to improve email deliverability rates8 ways to improve email deliverability rates
8 ways to improve email deliverability rates
Locke Truong83 views
Marketing Cloud - Partner Office Hour (August 18, 2015) by Salesforce Partners
Marketing Cloud - Partner Office Hour (August 18, 2015)Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)
How to get your emails delivered into the inbox by Red C
How to get your emails delivered into the inboxHow to get your emails delivered into the inbox
How to get your emails delivered into the inbox
Red C508 views
M B F009 Patel 091907 by Dreamforce07
M B F009  Patel 091907M B F009  Patel 091907
M B F009 Patel 091907
Dreamforce07375 views
Maximise Email Deliverability by GetResponse
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email Deliverability
GetResponse1.8K views
Clearout use cases by Ajit Raj
Clearout use casesClearout use cases
Clearout use cases
Ajit Raj15 views
Email Marketing: Expand Your Reach, Grow Your Business by Mark J. Feldman
Email Marketing: Expand Your Reach, Grow Your BusinessEmail Marketing: Expand Your Reach, Grow Your Business
Email Marketing: Expand Your Reach, Grow Your Business
Mark J. Feldman1.7K views
Stay Out of Spam Folder by MyStockAlarm
Stay Out of Spam FolderStay Out of Spam Folder
Stay Out of Spam Folder
MyStockAlarm288 views
Ad sale deck story by LiveIntent
Ad sale deck   storyAd sale deck   story
Ad sale deck story
LiveIntent847 views
Email Marketing Automation Quick Facts - LeadPro247 by Paddu Govindaraj
Email Marketing Automation Quick Facts - LeadPro247Email Marketing Automation Quick Facts - LeadPro247
Email Marketing Automation Quick Facts - LeadPro247
Paddu Govindaraj301 views
Mail chimp Integration with AEM by Jatin Gupta
Mail chimp Integration with AEMMail chimp Integration with AEM
Mail chimp Integration with AEM
Jatin Gupta1.1K views
Mailchimp Introduction by Jerry Hickman
Mailchimp IntroductionMailchimp Introduction
Mailchimp Introduction
Jerry Hickman4.7K views
B2C Deliverability in 2018: A Hitchhiker's Guide by Matthew Albert
B2C Deliverability in 2018: A Hitchhiker's GuideB2C Deliverability in 2018: A Hitchhiker's Guide
B2C Deliverability in 2018: A Hitchhiker's Guide
Matthew Albert442 views

Viewers also liked

Sahana_Reddy_CV by
Sahana_Reddy_CVSahana_Reddy_CV
Sahana_Reddy_CVSahana Reddy
209 views3 slides
September2016 by
September2016September2016
September2016Colleen Reynolds
173 views7 slides
Buenos dias by
Buenos diasBuenos dias
Buenos diasjuan20141
36 views1 slide
Economic report-2014-2015 by
Economic report-2014-2015Economic report-2014-2015
Economic report-2014-2015Siti Hajar Razali
136 views16 slides
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Return Path
198 views41 slides
Atoms & molecules by
Atoms & moleculesAtoms & molecules
Atoms & moleculesyogesh sharma
526 views41 slides

Viewers also liked(8)

Buenos dias by juan20141
Buenos diasBuenos dias
Buenos dias
juan2014136 views
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by Return Path
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path198 views
Metabolisme,fotosintesis n kemosintesis by saut_siadari
Metabolisme,fotosintesis n kemosintesisMetabolisme,fotosintesis n kemosintesis
Metabolisme,fotosintesis n kemosintesis
saut_siadari9.2K views
Monitoring Containers at New Relic by Sean Kane by Docker, Inc.
Monitoring Containers at New Relic by Sean Kane Monitoring Containers at New Relic by Sean Kane
Monitoring Containers at New Relic by Sean Kane
Docker, Inc.1.1K views

Similar to Using Return Path Data to Protect Your Brand: Security Breakout Session - London

How Cybercriminals Cheat Email Authentication by
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationReturn Path
489 views33 slides
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao... by
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...Return Path
412 views41 slides
Protect your domain with DMARC by
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARCContactlab
820 views50 slides
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Return Path
342 views43 slides
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing... by
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...WhoisXML API
77 views42 slides
7 top tips to protect your business from BEC [infographic] By Stellarise by
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By StellariseElena Tatarenkova
201 views1 slide

Similar to Using Return Path Data to Protect Your Brand: Security Breakout Session - London(20)

How Cybercriminals Cheat Email Authentication by Return Path
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email Authentication
Return Path489 views
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao... by Return Path
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Return Path412 views
Protect your domain with DMARC by Contactlab
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
Contactlab820 views
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by Return Path
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path342 views
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing... by WhoisXML API
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
WhoisXML API77 views
7 top tips to protect your business from BEC [infographic] By Stellarise by Elena Tatarenkova
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise
Elena Tatarenkova201 views
Overcoming the 3 Challenges to Optimizing Your Email Program by LiveIntent
Overcoming the 3 Challenges to Optimizing Your Email ProgramOvercoming the 3 Challenges to Optimizing Your Email Program
Overcoming the 3 Challenges to Optimizing Your Email Program
LiveIntent1.3K views
Email: still the favourite route of attack by Claranet UK
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
Claranet UK500 views
eDM Strategy by Preetha
eDM Strategy eDM Strategy
eDM Strategy
Preetha 10K views
A guide to email spoofing by MattChapman50
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
MattChapman50166 views
Open It, Read It, Buy It Email Marketing with the AppExchange by dreamforce2006
Open It, Read It, Buy It Email Marketing with the AppExchangeOpen It, Read It, Buy It Email Marketing with the AppExchange
Open It, Read It, Buy It Email Marketing with the AppExchange
dreamforce20061.3K views
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago by Return Path
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - ChicagoLittle Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Return Path225 views

More from Return Path

Understanding Gmail Deliverability by
Understanding Gmail DeliverabilityUnderstanding Gmail Deliverability
Understanding Gmail DeliverabilityReturn Path
974 views13 slides
Green Eggs & Spam by
Green Eggs & SpamGreen Eggs & Spam
Green Eggs & SpamReturn Path
382 views24 slides
Return Path World Tour Keynote - San Francisco by
Return Path World Tour Keynote - San FranciscoReturn Path World Tour Keynote - San Francisco
Return Path World Tour Keynote - San FranciscoReturn Path
185 views57 slides
Return Path World Tour Keynote - New York by
Return Path World Tour Keynote - New YorkReturn Path World Tour Keynote - New York
Return Path World Tour Keynote - New YorkReturn Path
209 views58 slides
Return Path World Tour Keynote - Sao Paulo by
Return Path World Tour Keynote - Sao PauloReturn Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sao PauloReturn Path
247 views70 slides
Return Path World Tour Keynote - Sydney by
Return Path World Tour Keynote - SydneyReturn Path World Tour Keynote - Sydney
Return Path World Tour Keynote - SydneyReturn Path
140 views29 slides

More from Return Path(20)

Understanding Gmail Deliverability by Return Path
Understanding Gmail DeliverabilityUnderstanding Gmail Deliverability
Understanding Gmail Deliverability
Return Path974 views
Green Eggs & Spam by Return Path
Green Eggs & SpamGreen Eggs & Spam
Green Eggs & Spam
Return Path382 views
Return Path World Tour Keynote - San Francisco by Return Path
Return Path World Tour Keynote - San FranciscoReturn Path World Tour Keynote - San Francisco
Return Path World Tour Keynote - San Francisco
Return Path185 views
Return Path World Tour Keynote - New York by Return Path
Return Path World Tour Keynote - New YorkReturn Path World Tour Keynote - New York
Return Path World Tour Keynote - New York
Return Path209 views
Return Path World Tour Keynote - Sao Paulo by Return Path
Return Path World Tour Keynote - Sao PauloReturn Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sao Paulo
Return Path247 views
Return Path World Tour Keynote - Sydney by Return Path
Return Path World Tour Keynote - SydneyReturn Path World Tour Keynote - Sydney
Return Path World Tour Keynote - Sydney
Return Path140 views
Return Path World Tour Keynote - Paris by Return Path
Return Path World Tour Keynote - ParisReturn Path World Tour Keynote - Paris
Return Path World Tour Keynote - Paris
Return Path212 views
World Tour Keynote Presentation - London by Return Path
World Tour Keynote Presentation - LondonWorld Tour Keynote Presentation - London
World Tour Keynote Presentation - London
Return Path187 views
Stemming the Fall of Email Deliverability by Return Path
Stemming the Fall of Email DeliverabilityStemming the Fall of Email Deliverability
Stemming the Fall of Email Deliverability
Return Path149 views
Return Path Academy on 7 September 2016 by Return Path
Return Path Academy on 7 September 2016Return Path Academy on 7 September 2016
Return Path Academy on 7 September 2016
Return Path196 views
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It. by Return Path
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Return Path385 views
How to keep_your_lists_clean_and_improve_deliverability by Return Path
How to keep_your_lists_clean_and_improve_deliverabilityHow to keep_your_lists_clean_and_improve_deliverability
How to keep_your_lists_clean_and_improve_deliverability
Return Path187 views
The Hidden Metrics of Email Deliverability Webinar by Return Path
The Hidden Metrics of Email Deliverability WebinarThe Hidden Metrics of Email Deliverability Webinar
The Hidden Metrics of Email Deliverability Webinar
Return Path1.1K views
CASL One Year Later by Return Path
CASL One Year Later CASL One Year Later
CASL One Year Later
Return Path908 views
Email Optimization Suite Product Overview by Return Path
Email Optimization Suite Product OverviewEmail Optimization Suite Product Overview
Email Optimization Suite Product Overview
Return Path380 views
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran... by Return Path
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Return Path264 views
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by Return Path
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path311 views
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA by Return Path
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LALittle Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Return Path267 views
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC by Return Path
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYCLittle Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Return Path225 views
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by Return Path
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path281 views

Recently uploaded

Inawsidom - Data Journey by
Inawsidom - Data JourneyInawsidom - Data Journey
Inawsidom - Data JourneyPhilipBasford
8 views38 slides
Product Research sample.pdf by
Product Research sample.pdfProduct Research sample.pdf
Product Research sample.pdfAllenSingson
33 views29 slides
4_4_WP_4_06_ND_Model.pptx by
4_4_WP_4_06_ND_Model.pptx4_4_WP_4_06_ND_Model.pptx
4_4_WP_4_06_ND_Model.pptxd6fmc6kwd4
7 views13 slides
Best Home Security Systems.pptx by
Best Home Security Systems.pptxBest Home Security Systems.pptx
Best Home Security Systems.pptxmogalang
9 views16 slides
[DSC Europe 23] Danijela Horak - The Innovator’s Dilemma: to Build or Not to ... by
[DSC Europe 23] Danijela Horak - The Innovator’s Dilemma: to Build or Not to ...[DSC Europe 23] Danijela Horak - The Innovator’s Dilemma: to Build or Not to ...
[DSC Europe 23] Danijela Horak - The Innovator’s Dilemma: to Build or Not to ...DataScienceConferenc1
5 views19 slides
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init... by
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...DataScienceConferenc1
5 views18 slides

Recently uploaded(20)

Product Research sample.pdf by AllenSingson
Product Research sample.pdfProduct Research sample.pdf
Product Research sample.pdf
AllenSingson33 views
4_4_WP_4_06_ND_Model.pptx by d6fmc6kwd4
4_4_WP_4_06_ND_Model.pptx4_4_WP_4_06_ND_Model.pptx
4_4_WP_4_06_ND_Model.pptx
d6fmc6kwd47 views
Best Home Security Systems.pptx by mogalang
Best Home Security Systems.pptxBest Home Security Systems.pptx
Best Home Security Systems.pptx
mogalang9 views
[DSC Europe 23] Danijela Horak - The Innovator’s Dilemma: to Build or Not to ... by DataScienceConferenc1
[DSC Europe 23] Danijela Horak - The Innovator’s Dilemma: to Build or Not to ...[DSC Europe 23] Danijela Horak - The Innovator’s Dilemma: to Build or Not to ...
[DSC Europe 23] Danijela Horak - The Innovator’s Dilemma: to Build or Not to ...
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init... by DataScienceConferenc1
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...
Data about the sector workshop by info828217
Data about the sector workshopData about the sector workshop
Data about the sector workshop
info82821729 views
Listed Instruments Survey 2022.pptx by secretariat4
Listed Instruments Survey  2022.pptxListed Instruments Survey  2022.pptx
Listed Instruments Survey 2022.pptx
secretariat493 views
[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx by DataScienceConferenc1
[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx
[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx
Shreyas hospital statistics.pdf by samithavinal
Shreyas hospital statistics.pdfShreyas hospital statistics.pdf
Shreyas hospital statistics.pdf
samithavinal5 views
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx by DataScienceConferenc1
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx
DGST Methodology Presentation.pdf by maddierlegum
DGST Methodology Presentation.pdfDGST Methodology Presentation.pdf
DGST Methodology Presentation.pdf
maddierlegum7 views
Data Journeys Hard Talk workshop final.pptx by info828217
Data Journeys Hard Talk workshop final.pptxData Journeys Hard Talk workshop final.pptx
Data Journeys Hard Talk workshop final.pptx
info82821711 views
[DSC Europe 23] Luca Morena - From Psychohistory to Curious Machines by DataScienceConferenc1
[DSC Europe 23] Luca Morena - From Psychohistory to Curious Machines[DSC Europe 23] Luca Morena - From Psychohistory to Curious Machines
[DSC Europe 23] Luca Morena - From Psychohistory to Curious Machines
[DSC Europe 23] Matteo Molteni - Implementing a Robust CI Workflow with dbt f... by DataScienceConferenc1
[DSC Europe 23] Matteo Molteni - Implementing a Robust CI Workflow with dbt f...[DSC Europe 23] Matteo Molteni - Implementing a Robust CI Workflow with dbt f...
[DSC Europe 23] Matteo Molteni - Implementing a Robust CI Workflow with dbt f...

Using Return Path Data to Protect Your Brand: Security Breakout Session - London

  • 1. #RPWT Little Data, Big Decisions: The Path to Data Enlightenment Keynote 3:45 - 4:15 Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Session 5:00 - 5:45 Scott Roth, Chief Marketing Officer, Return Path Speakers: Guy Hanson, Sr. Director, Professional Services, Return Path Rob Holmes, General Manager, Email Fraud Protection, Return Path 4:15- 4:45 Real Data, Real Results: Customer Showcase & Panel Discussion 5:00 - 5:45 Using Return Path Data to Protect Your Brand: Security Breakout Session 5:45 - 7:00 Networking and cocktails Please join us as we wrap up the day! Opening Remarks Guest Speaker 3:00 - 3:45 Sara Murray, Entrepreneur & Founder of confused.com & Buddi 4:45 – 5:00 Coffee break
  • 2. Using Return Path Data to Protect Your Brand Security Breakout Session Rob Holmes, General Manager, Email Fraud Protection
  • 3. Agenda • Email fraud trends and impact • The power of data: email threat intelligence • The Return Path Data Cloud • Tactics used by cybercriminals today • Unite against email fraud: tips for defending your customers, brand, and bottom line • Questions
  • 5. Email Delivers Business Value… Increases Customer Loyalty Boosts Revenue Reduces Operating Costs
  • 6. …But Its Impact Is Being Eroded 5 out of 6 big companies are targeted with phishing attacks Phishing costs brands worldwide $4.5 billion each year RSA identifies a phishing attack every minute Email fraud has up to a 45% conversion rate Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm $4.5 B 1 MIN 5/6 45%
  • 7. Phishing Leads To – Revenue Losses • Reduced effectiveness of email • ISPs don’t know what to trust • Reduced trust in brand: • Subscribers don’t know what to trust Customers are 42% less likely to interact with a brand after being phished or spoofed.
  • 8. Phishing Leads To – Unwanted Media Attention
  • 9. “If you boil the jobs down of IT security professionals, they are ultimately tasked with protecting the brand… If you have a breach, research suggests that 60% of your customers will think about moving and 30% actually do.” Bryan Littlefair Global Chief Information Security Officer Aviva
  • 10. InvestigationRemediation Phishing Leads To – Remediation Costs Fraud Losses Malware Infection
  • 11. Can You Spot a Spoof?
  • 12. Anatomy Of A Phishing Email to: You <you@yourdomain.com> from: Phishing Company <phishingcompany@spoof.com> subject: Unauthorized login attempt Dear Customer, We have recieved noticed that you have recently attempted to login to your account from an unauthorized device. As a saftey measure, please visit the link below to update your login details now: http://www.phishingemail.com/updatedetails.asp Once you have updated your details your account will be secure from further unauthorized login attempts. Thanks, The Phishing Team 1 attachment Making an email look legitimate by spoofing the company name in the “Display Name” field. Tricking email servers into delivering the email to the inbox by spoofing the “envelope from” address hidden in the technical header of the email. Including logos, company terms, and urgent language in the body of the email. Making an email appear to come from a brand by using a legitimate company domain, or a domain that looks like it in the “from” field. Creating convincing subject lines to drive recipients to open the message. Including links to malicious websites that prompt users to give up credentials Including attachments containing malicious content.
  • 13. From: service@paypal.com <paypal@service.com> From: PayPal <paypal@e.paypal.co.uk>
  • 14. The Power of the Right Data
  • 15. Knowledge Is Your Best Defense • We know there is no silver bullet. • But defense starts with understanding. • Data is the key to that understanding.
  • 16. Breadth, Depth, and Speed Contactually Molto ParibusGetAirHelp Message Finder UnsubscriberOrganizer
  • 17. EMAIL THREAT DATA · Consumer inbox data · Email delivery data · Authentication results · Message level data · SPAM trap & complaints data EMAIL THREAT INTELLIGENCE · Domain-spoofing alerts · Brand-spoofing intelligence · Suspicious activity map · Fraudcaster URL feed · Sender Score: IP reputation
  • 18. Email Fraud: Primary Attack Vectors Domain Spoofing (from domains owned by the brand) Brand Spoofing (from domains outside the brand’s control) phish@company.com company@phish.com
  • 19. 30% of Attacks Spoof Domains You Own 30% Domain Spoofing • Active Emailing Domains • Non-Sending Domains • Defensively-Registered Domains 70% Brand Spoofing • Cousin Domains • Display Name Spoofing • Subject Line Spoofing • Email Account Spoofing Source: Return Path / APWG White Paper, 2014
  • 20. Unite Against Email Fraud Tips for defending your customers, your brand, and your bottom line.
  • 21. DMARC (Domain-based Message Authentication Reporting & Conformance): • Technical specification created to help reduce the potential for email- based abuse (www.dmarc.org) • Prevents domain-based spoofing by blocking fraudulent activity appearing to come from domains under your control • Provides threat reporting mechanism (aggregate and forensic data) #1: Authenticate Your Email
  • 22. “Simply put, the DMARC standard works. In a blended approach to fight email fraud, DMARC represents the cornerstone of technical controls that commercial senders can implement today to rebuild trust and retake the email channel for legitimate brands and consumers.” Edward Tucker Head of Cyber Security Her Majesty’s Revenue & Customs
  • 23. • Addressing the 70% of email attacks that spoof your brand using domains your company does not own requires email threat intelligence. • Get visibility into all types of email threats targeting you today. #2: Leverage Email Threat Intelligence
  • 24. Return Path’s Solution Legitimate Email Malicious Email marketing@ company.com marketing@ c0mpany.com company @phish.com phish@ company.com DMARC Rejected Provider Network Return Path Data Cloud Email Threat Intelligence Email Governance Company Security Operations Center Takedown Vendor Consumer Inbox
  • 25. • The reality is, some attacks are always going to get through. • The more prepared your customers are, the better. • Create an educational website • Include anti-fraud language within your legitimate email • In the event of an attack, warn your customers immediately #3: Educate Your Customers
  • 26. • Engage with Brand Protection teams to make the business case. • Create a sense of urgency. • Communicate the risks that result from not taking action: • Email fraud destroys brand reputation and erodes customer loyalty • Email fraud thwarts email marketing effectiveness • Email fraud negatively impacts revenue #4: Raise Awareness with Top Executives
  • 27. Learn More www.returnpath.com/StopEmailFraud Twitter: @StopEmailFraud New: Download the Email Threat Intelligence report at bit.ly/EmailThreatIntel

Editor's Notes

  1. LONDON
  2. Value to businesses Email is a very valuable marketing medium for businesses for all of the above reasons (low cost, effectiveness, scale, format), but it’s also effective for fraudsters for the same reasons.
  3. Every day, beyond your control, cybercriminals send emails that spoof your brand, targeting your customers, partners, and suppliers with malicious content. Email Fraud continues to grow (50% YOY growth in volume of email attacks based on APWG data) and, in spite of the recent shutdowns of larger botnets, phishing shows no sign yet of abating, with more than 400 brands are phished each month (Anti-Phishing Working Group) Two biggest trends: an increase in the volume of attacks and an increase in the sophistication.
  4. #3 – Phishing is Impacting Revenue. Email fraud has a dramatic impact on the trust your customers have in your brand. It also reduce the effectiveness of email that is legitimate. A great data point from Cloudmark here: customers are 42% less likely to interact with a brand after being phished or spoofed. So, we all recognise that it’s an old problem and most of us know that it hurts our business. And yet many companies we speak to still struggle to justify investment in solutions, leaving their brands and their customers vulnerable. I believe that’s because, in the first place, measuring the impact is difficult: tying fraud losses and expenses back to specific activities is difficult and quantifying the value of brand integrity has always proved elusive. Okay, so let’s talk now about solving the problem. Prior to working at Return Path, I worked in the brand & fraud protection industry for 10 years. And, during those 10 years, I watched the evolution and growth of the problem space and observed the stagnation of innovation.
  5. Phishing is on old problem, and it’s not going away so lets look at the way it is impacting businesses today. #1 – Phishing is Making Headlines and Is Destroying Reputations Some of the most respected brands out there are making the headlines: Amazon, Home Depot, Booking.com and more recently US health insurer giant Anthem.
  6. Here is a great quote from Aviva’s CISO Bryan Littlefair on why it is the CISO’s responsibility to protect the brand, in collaboration with Marketing.
  7. #2 – Phishing Is Losing Companies Millions in hard costs Fraud losses Malware infection (secondary damages/losses) Investigation Remediation
  8. If you have to explain to marketing... graphic to use security and tech. See that as aware when comes to email look at points they can hit on in order to break through. Not just Friendly From, different ways to use email. What highlighting here. Fits with email advantages email slide... 97% of people globally cannot correctly identify a sophisticated phishing email. And there is a plethora of ways fraudsters can spoof your identity…
  9. Can you spot the spoof? (chances are you can) Now.. Are you confident YOUR CUSTOMERS can? The simple answer is NO. So this is why it is critical that you use the right data to shine the light on all the types of email threats that are targeting your brand today.
  10. Show of hands if you think that the majority of the email threats against your brand spoof domains under your control? In other words, what percentage of attacks come from a legitimate hsbc.com domain?
  11. So what are we saying: well at risk of sounding obvious, knowledge is your best defense.
  12. With such a complex threat landscape, you need breadth, depth and speed when it comes to email threat intelligence, and this is what we mean by it: data from mailbox providers, data from security vendors, and data from consumer inboxes to give you a complete pictures of all the threats spoofing your domains (under your control) and your brand (outside your control).
  13. Powered by the Return Path Data Cloud, our proprietary email threat intelligence empowers you to identify threats beyond DMARC — so you can respond to the 70% of email attacks spoofing your brand from domains that you do not control. We use over 100 data feeds from more than 70 providers to detect, classify and analyze data relating to over 6 billion emails every day. Now imagine having this data available to your teams so you can detect, block and respond to email threats in real time. Respond to the 70% of email attacks spoofing your brand from domains that you do not own. DMARC is a great first step, but it’s not a complete solution, protecting your brand from only 30% of email threats. Powered by the Return Path Data Cloud, our proprietary email threat intelligence empowers you to identify threats beyond DMARC. We use over 100 data feeds from more than 70 mailbox and security providers to detect, classify and analyze data relating to over 5.5 billion emails every day. With Email Threat Intelligence, you can: Get insight into email threats, coming from domains that your company does not own (e.g. cousin domains, display name spoofing, subject line spoofing). View redacted message-level samples of fraudulent emails targeting your brand. Identify phishing URLs embedded in fraudulent emails and inform your takedown vendor(s). Integrate intelligence into your existing systems through a RESTful API. Manage all Email Governance and Email Threat Intelligence alerts from a single portal.
  14. Fraudsters will target your brand in two ways: by spoofing your domains, or by spoofing your brand in other ways. Both attack vectors are critical and you need visibility into all attacks, which is why it is important to have access to the RIGHT data.
  15. We ran some primary research in sept 2014, looking at 18 billion suspicious emails, targeting 11 banks in the UK and the US. And what did we discover? 30% of the attacks came from an email address from a domain that was owned by the bank that leaves 70% that were spoofed in some other ways like display name spoofing. This is REALLY relevant to our solution because we seek to address both: the 30% and the 70%. We analysed 40 of the top global brands for a period of 2 months (july/August 2015) and looked at fraudulent emails coming from the 70% we covered here. These are some of the tactics we were able to uncover thanks to email threat data: 1. Snowshoeing is still rife and monitoring IP reputations needs to be part of a multi-faceted email fraud protection strategy 2. Fraudsters do not go to the trouble of rotating elements of their subject lines, preferring a more template-based approach. Access to message-level data from email threat intelligence sources should help you prioritize your efforts around attack mitigation. 3. The most frequently spoofed Header From field is the Display Name, for which there is currently no authentication mechanism. Visibility into Display Name spoofing is critical in identifying and responding to phishing attacks leveraging your brand.
  16. It’s time to unite against email fraud… And here are some of the leading brands out there at the forefront of this initiative (next slide)
  17. Security understands the risks, but Marketing and Sales executives must be shown how this affects the real bottom line. This impacts revenue, market share and partnership opportunities, to name a few. Reduced effectiveness: Once they have been harmed by something tied to your brand, customers are afraid to open anything that comes from you. All of the work you put into crafting an effective message is wasted, if they refuse to open it. This can be especially bad for seasonal promotions. The bad guys know you’ll be sending out special promotions, so they’ll send their own versions to trick people. Word gets out about a scam and people won’t open your promotional notes during the key perioe. This also skews your metrics, because you don’t get a good sample of “regular” customer reactions to a campaign. Customers now have a bad feeling tied to your brand. Even if their head accepted the explanation that something was really not from you, their gut has a twinge when they see your brand. When they’re shopping next time, that will impact their mindset. Maybe they’ll try another brand. (Google, Orbitz, Kayak searches) It's not just lower revenue. There are hidden added costs of dealing with reversing fraudulent purchases, resetting customer accounts, resolving customer issues. Also - It's not just about business. You don't want anyone using the power of your brand to trick people.
  18. Update based on each location.