Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC

Return Path
Return PathReturn Path
Using Return Path Data to Protect Your Brand
Security Breakout Session
Brandon Dingae, Director, Sales Enablement
Email Fraud Trends
& Impact
Email Delivers Business Value…
Increases
Customer Loyalty
Boosts
Revenue
Reduces
Operating Costs
…But Its Impact Is Being Eroded
5 out of 6 big
companies
are targeted with
phishing attacks
Phishing costs brands
worldwide $4.5 billion
each year
RSA identifies
a phishing attack
every minute
Email fraud has
up to a 45%
conversion rate
Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm
$4.5 B 1 MIN 5/6 45%
Phishing Leads To – Revenue Losses
• Reduced trust in brand:
• Subscribers don’t know what to trust
• Reduced effectiveness of email
• ISPs don’t know what to trust
Customers are 42% less likely to
interact with a brand after being
phished or spoofed.
Phishing Leads To – Unwanted Media Attention
“If you boil the jobs down of IT security
professionals, they are ultimately tasked with
protecting the brand… If you have a breach,
research suggests that 60% of your customers will
think about moving and 30% actually do.”
Bryan Littlefair
Global Chief Information Security Officer
Aviva
Phishing Leads To – Remediation Costs
Fraud Losses Malware Infection Investigation Remediation
Can You Spot a
Spoof?
Anatomy Of A
Phishing Email
to: You <you@yourdomain.com>
from: Phishing Company <phishingcompany@spoof.com>
subject: Unauthorized login attempt
Dear Customer,
We have recieved noticed that you have recently
attempted to login to your account from an unauthorized
device.
As a saftey measure, please visit the link below to
update your login details now:
http://www.phishingemail.com/updatedetails.asp
Once you have updated your details your account will
be secure from further unauthorized login attempts.
Thanks,
The Phishing Team
1 attachment
Making an email
look legitimate by
spoofing the
company name in
the “Display Name”
field.
Tricking email
servers into
delivering the email
to the inbox by
spoofing the
“envelope from”
address hidden in
the technical header
of the email.
Including logos,
company terms,
and urgent
language in the
body of the email.
Making an email
appear to come
from a brand by
using a legitimate
company domain, or
a domain that looks
like it in the “from”
field.
Creating convincing
subject lines to drive
recipients to open
the message.
Including links to
malicious websites
that prompt users to
give up
credentials
Including
attachments
containing malicious
content.
From: service@paypal.com <paypal@service.com>
From: PayPal <paypal@e.paypal.co.uk>
The Power of the
Right Data
Knowledge Is Your Best Defense
• We know there is no silver bullet.
• But defense starts with understanding.
• Data is the key to that understanding.
Breadth, Depth, and Speed
Contactually Molto ParibusGetAirHelp
Message Finder UnsubscriberOrganizer
EMAIL THREAT
DATA
· Consumer inbox data
· Email delivery data
· Authentication results
· Message level data
· SPAM trap & complaints data
EMAIL THREAT
INTELLIGENCE
· Domain-spoofing alerts
· Brand-spoofing intelligence
· Suspicious activity map
· Fraudcaster URL feed
· Sender Score: IP reputation
Email Fraud: Primary Attack Vectors
Domain Spoofing
(from domains owned by the brand)
Brand Spoofing
(from domains outside the brand’s control)
phish@company.com company@phish.com
30% of Attacks Spoof Domains You Own
30% Domain
Spoofing
• Active Emailing Domains
• Non-Sending Domains
• Defensively-Registered
Domains
70% Brand
Spoofing
• Cousin Domains
• Display Name Spoofing
• Subject Line Spoofing
• Email Account Spoofing
Source: Return Path / APWG White Paper, 2014
Unite Against
Email Fraud
Tips for defending your customers, your brand, and
your bottom line.
Leading Companies Fighting Email Fraud
DMARC (Domain-based Message Authentication Reporting &
Conformance):
• Technical specification created to help reduce the potential for email-
based abuse (www.dmarc.org)
• Prevents domain-based spoofing by blocking fraudulent activity
appearing to come from domains under your control
• Provides threat reporting mechanism (aggregate and forensic data)
#1: Authenticate Your Email
“Simply put, the DMARC standard works.
In a blended approach to fight email fraud, DMARC
represents the cornerstone of technical controls
that commercial senders can implement today to
rebuild trust and retake the email channel for
legitimate brands and consumers.”
Edward Tucker
Head of Cyber Security
Her Majesty’s Revenue & Customs
• Addressing the 70% of email attacks that spoof your brand using
domains your company does not own requires email threat
intelligence.
• Get visibility into all types of email threats targeting you today.
#2: Leverage Email Threat Intelligence
• The reality is, some attacks are always going to get through.
• The more prepared your customers are, the better.
• Create an educational website
• Include anti-fraud language within your legitimate email
• In the event of an attack, warn your customers immediately
#3: Educate Your Customers
• Engage with Brand Protection teams to make the business case.
• Create a sense of urgency.
• Communicate the risks that result from not taking action:
• Email fraud destroys brand reputation and erodes customer loyalty
• Email fraud thwarts email marketing effectiveness
• Email fraud negatively impacts revenue
#4: Raise Awareness with Top Executives
Learn More
www.returnpath.com/StopEmailFraud
Twitter: @StopEmailFraud
New: Download the Email Threat
Intelligence report at
bit.ly/EmailThreatIntel
1 of 25

Recommended

Using Return Path Data to Protect Your Brand: Security Breakout Session - San... by
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Return Path
252 views26 slides
Using Return Path Data to Protect Your Brand: Security Breakout Session - London by
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonUsing Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonReturn Path
308 views27 slides
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA by
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAUsing Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAReturn Path
300 views26 slides
Marketing Cloud - Partner Office Hour (August 18, 2015) by
Marketing Cloud - Partner Office Hour (August 18, 2015)Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)Salesforce Partners
666 views48 slides
Cyber security by
Cyber securityCyber security
Cyber securityJoseMerda1
4 views3 slides
How I Will Phish You by
How I Will Phish You How I Will Phish You
How I Will Phish You Dawn Yankeelov
375 views32 slides

More Related Content

What's hot

NASA Cyber Security Webinar: Phishing Detection Strategies by
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesPaubox, Inc.
527 views46 slides
Email: still the favourite route of attack by
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attackClaranet UK
500 views18 slides
Email phishing and countermeasures by
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
4.6K views43 slides
Phishing Technology by
Phishing TechnologyPhishing Technology
Phishing TechnologyAvishekMondal15
227 views16 slides
Stemming the Fall of Email Deliverability by
Stemming the Fall of Email DeliverabilityStemming the Fall of Email Deliverability
Stemming the Fall of Email DeliverabilityReturn Path
149 views54 slides
Phishing ppt by
Phishing pptPhishing ppt
Phishing pptshindept123
1.4K views18 slides

What's hot(20)

NASA Cyber Security Webinar: Phishing Detection Strategies by Paubox, Inc.
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection Strategies
Paubox, Inc.527 views
Email: still the favourite route of attack by Claranet UK
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
Claranet UK500 views
Email phishing and countermeasures by Jorge Sebastiao
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
Jorge Sebastiao4.6K views
Stemming the Fall of Email Deliverability by Return Path
Stemming the Fall of Email DeliverabilityStemming the Fall of Email Deliverability
Stemming the Fall of Email Deliverability
Return Path149 views
Phishing awareness by PhishingBox
Phishing awarenessPhishing awareness
Phishing awareness
PhishingBox59.6K views
Fire eye spearphishing by Zeno Idzerda
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
Zeno Idzerda1.1K views
Phishing by Sagar Rai
PhishingPhishing
Phishing
Sagar Rai3.4K views
Phishing - A modern web attack by Karthik
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
Karthik2.4K views
The Hidden Metrics of Email Deliverability Webinar by Return Path
The Hidden Metrics of Email Deliverability WebinarThe Hidden Metrics of Email Deliverability Webinar
The Hidden Metrics of Email Deliverability Webinar
Return Path1.1K views
Phishing attack seminar presentation by AniketPandit18
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
AniketPandit182.1K views
Phishing Scams: 8 Helpful Tips to Keep You Safe by CheapSSLsecurity
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity765 views
P H I S H I N G by bensonoo
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo26.9K views
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen by CMR WORLD TECH
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
CMR WORLD TECH159 views
Symantec & WSJ PRESENTS "MALWARE on Main Street" ... by MZERMA Amine
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
MZERMA Amine717 views
Phishing detection & protection scheme by Mussavir Shaikh
Phishing detection & protection schemePhishing detection & protection scheme
Phishing detection & protection scheme
Mussavir Shaikh2.2K views
Anti phishing presentation by BokangMalunga
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
BokangMalunga331 views

Viewers also liked

MWSU Evaluations 2011 by
MWSU Evaluations 2011MWSU Evaluations 2011
MWSU Evaluations 2011Dr. Elizabeth Hendrix
216 views20 slides
Who's Who Among Students in American Universities & Colleges 19 by
Who's Who Among Students in American Universities & Colleges 19Who's Who Among Students in American Universities & Colleges 19
Who's Who Among Students in American Universities & Colleges 19Dr. Elizabeth Hendrix
160 views1 slide
Omkar Santosh Rane by
Omkar Santosh RaneOmkar Santosh Rane
Omkar Santosh Raneomkar rane
124 views1 slide
Rafa 2 by
Rafa 2Rafa 2
Rafa 2brandon jimenez
103 views2 slides
Ryan Law retail CV 2 21.03.16 by
Ryan Law retail CV 2 21.03.16Ryan Law retail CV 2 21.03.16
Ryan Law retail CV 2 21.03.16Ryan Law
89 views2 slides
What is IT Service Management? by
What is IT Service Management?What is IT Service Management?
What is IT Service Management?Phoenix TS
319 views14 slides

Similar to Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC

Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi... by
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Return Path
240 views28 slides
How Cybercriminals Cheat Email Authentication by
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationReturn Path
489 views33 slides
7 top tips to protect your business from BEC [infographic] By Stellarise by
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By StellariseElena Tatarenkova
201 views1 slide
A guide to email spoofing by
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
166 views9 slides
2010 Spam Filtered World Fv by
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
540 views69 slides
Protect your domain with DMARC by
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARCContactlab
820 views50 slides

Similar to Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC(20)

Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi... by Return Path
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Return Path240 views
How Cybercriminals Cheat Email Authentication by Return Path
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email Authentication
Return Path489 views
7 top tips to protect your business from BEC [infographic] By Stellarise by Elena Tatarenkova
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise
Elena Tatarenkova201 views
A guide to email spoofing by MattChapman50
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
MattChapman50166 views
2010 Spam Filtered World Fv by cactussky
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
cactussky540 views
Protect your domain with DMARC by Contactlab
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
Contactlab820 views
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao... by Return Path
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Return Path412 views
Dmarc is your savior by TIKAJ
Dmarc is your saviorDmarc is your savior
Dmarc is your savior
TIKAJ51 views
Phishing: Analysis and Countermeasures by IRJET Journal
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
IRJET Journal5 views
Infographic: How to Prevent Email Fraud with DMARC by Return Path
Infographic: How to Prevent Email Fraud with DMARCInfographic: How to Prevent Email Fraud with DMARC
Infographic: How to Prevent Email Fraud with DMARC
Return Path777 views
How DMARC can assist in the prevention of malicious email attacks.docx by AariyaRathi
How DMARC can assist in the prevention of malicious email attacks.docxHow DMARC can assist in the prevention of malicious email attacks.docx
How DMARC can assist in the prevention of malicious email attacks.docx
AariyaRathi67 views
Neuailes Global Technologies Pvt Ltd by Shankar Suman
Neuailes Global Technologies Pvt LtdNeuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt Ltd
Shankar Suman28 views
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing... by WhoisXML API
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
WhoisXML API77 views

More from Return Path

Understanding Gmail Deliverability by
Understanding Gmail DeliverabilityUnderstanding Gmail Deliverability
Understanding Gmail DeliverabilityReturn Path
974 views13 slides
Green Eggs & Spam by
Green Eggs & SpamGreen Eggs & Spam
Green Eggs & SpamReturn Path
382 views24 slides
Return Path World Tour Keynote - San Francisco by
Return Path World Tour Keynote - San FranciscoReturn Path World Tour Keynote - San Francisco
Return Path World Tour Keynote - San FranciscoReturn Path
185 views57 slides
Return Path World Tour Keynote - New York by
Return Path World Tour Keynote - New YorkReturn Path World Tour Keynote - New York
Return Path World Tour Keynote - New YorkReturn Path
209 views58 slides
Return Path World Tour Keynote - Sao Paulo by
Return Path World Tour Keynote - Sao PauloReturn Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sao PauloReturn Path
247 views70 slides
Return Path World Tour Keynote - Sydney by
Return Path World Tour Keynote - SydneyReturn Path World Tour Keynote - Sydney
Return Path World Tour Keynote - SydneyReturn Path
140 views29 slides

More from Return Path(20)

Understanding Gmail Deliverability by Return Path
Understanding Gmail DeliverabilityUnderstanding Gmail Deliverability
Understanding Gmail Deliverability
Return Path974 views
Green Eggs & Spam by Return Path
Green Eggs & SpamGreen Eggs & Spam
Green Eggs & Spam
Return Path382 views
Return Path World Tour Keynote - San Francisco by Return Path
Return Path World Tour Keynote - San FranciscoReturn Path World Tour Keynote - San Francisco
Return Path World Tour Keynote - San Francisco
Return Path185 views
Return Path World Tour Keynote - New York by Return Path
Return Path World Tour Keynote - New YorkReturn Path World Tour Keynote - New York
Return Path World Tour Keynote - New York
Return Path209 views
Return Path World Tour Keynote - Sao Paulo by Return Path
Return Path World Tour Keynote - Sao PauloReturn Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sao Paulo
Return Path247 views
Return Path World Tour Keynote - Sydney by Return Path
Return Path World Tour Keynote - SydneyReturn Path World Tour Keynote - Sydney
Return Path World Tour Keynote - Sydney
Return Path140 views
Return Path World Tour Keynote - Paris by Return Path
Return Path World Tour Keynote - ParisReturn Path World Tour Keynote - Paris
Return Path World Tour Keynote - Paris
Return Path212 views
World Tour Keynote Presentation - London by Return Path
World Tour Keynote Presentation - LondonWorld Tour Keynote Presentation - London
World Tour Keynote Presentation - London
Return Path187 views
Return Path Academy on 7 September 2016 by Return Path
Return Path Academy on 7 September 2016Return Path Academy on 7 September 2016
Return Path Academy on 7 September 2016
Return Path196 views
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It. by Return Path
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Return Path385 views
How to keep_your_lists_clean_and_improve_deliverability by Return Path
How to keep_your_lists_clean_and_improve_deliverabilityHow to keep_your_lists_clean_and_improve_deliverability
How to keep_your_lists_clean_and_improve_deliverability
Return Path187 views
CASL One Year Later by Return Path
CASL One Year Later CASL One Year Later
CASL One Year Later
Return Path908 views
Email Optimization Suite Product Overview by Return Path
Email Optimization Suite Product OverviewEmail Optimization Suite Product Overview
Email Optimization Suite Product Overview
Return Path380 views
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran... by Return Path
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Return Path264 views
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by Return Path
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path311 views
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA by Return Path
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LALittle Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Return Path267 views
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by Return Path
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path198 views
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC by Return Path
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYCLittle Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Return Path225 views
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by Return Path
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path281 views
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses... by Return Path
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path211 views

Recently uploaded

CRM stick or twist.pptx by
CRM stick or twist.pptxCRM stick or twist.pptx
CRM stick or twist.pptxinfo828217
11 views16 slides
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf by
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf10urkyr34
7 views259 slides
SUPER STORE SQL PROJECT.pptx by
SUPER STORE SQL PROJECT.pptxSUPER STORE SQL PROJECT.pptx
SUPER STORE SQL PROJECT.pptxkhan888620
13 views16 slides
OPPOTUS - Malaysians on Malaysia 3Q2023.pdf by
OPPOTUS - Malaysians on Malaysia 3Q2023.pdfOPPOTUS - Malaysians on Malaysia 3Q2023.pdf
OPPOTUS - Malaysians on Malaysia 3Q2023.pdfOppotus
30 views19 slides
OECD-Persol Holdings Workshop on Advancing Employee Well-being in Business an... by
OECD-Persol Holdings Workshop on Advancing Employee Well-being in Business an...OECD-Persol Holdings Workshop on Advancing Employee Well-being in Business an...
OECD-Persol Holdings Workshop on Advancing Employee Well-being in Business an...StatsCommunications
7 views26 slides
Report on OSINT by
Report on OSINTReport on OSINT
Report on OSINTAyonDebnathCertified
5 views15 slides

Recently uploaded(20)

CRM stick or twist.pptx by info828217
CRM stick or twist.pptxCRM stick or twist.pptx
CRM stick or twist.pptx
info82821711 views
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf by 10urkyr34
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf
10urkyr347 views
SUPER STORE SQL PROJECT.pptx by khan888620
SUPER STORE SQL PROJECT.pptxSUPER STORE SQL PROJECT.pptx
SUPER STORE SQL PROJECT.pptx
khan88862013 views
OPPOTUS - Malaysians on Malaysia 3Q2023.pdf by Oppotus
OPPOTUS - Malaysians on Malaysia 3Q2023.pdfOPPOTUS - Malaysians on Malaysia 3Q2023.pdf
OPPOTUS - Malaysians on Malaysia 3Q2023.pdf
Oppotus30 views
OECD-Persol Holdings Workshop on Advancing Employee Well-being in Business an... by StatsCommunications
OECD-Persol Holdings Workshop on Advancing Employee Well-being in Business an...OECD-Persol Holdings Workshop on Advancing Employee Well-being in Business an...
OECD-Persol Holdings Workshop on Advancing Employee Well-being in Business an...
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx by DataScienceConferenc1
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx
Ukraine Infographic_22NOV2023_v2.pdf by AnastosiyaGurin
Ukraine Infographic_22NOV2023_v2.pdfUkraine Infographic_22NOV2023_v2.pdf
Ukraine Infographic_22NOV2023_v2.pdf
AnastosiyaGurin1.4K views
Listed Instruments Survey 2022.pptx by secretariat4
Listed Instruments Survey  2022.pptxListed Instruments Survey  2022.pptx
Listed Instruments Survey 2022.pptx
secretariat493 views
4_4_WP_4_06_ND_Model.pptx by d6fmc6kwd4
4_4_WP_4_06_ND_Model.pptx4_4_WP_4_06_ND_Model.pptx
4_4_WP_4_06_ND_Model.pptx
d6fmc6kwd47 views
PRIVACY AWRE PERSONAL DATA STORAGE by antony420421
PRIVACY AWRE PERSONAL DATA STORAGEPRIVACY AWRE PERSONAL DATA STORAGE
PRIVACY AWRE PERSONAL DATA STORAGE
antony4204217 views
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init... by DataScienceConferenc1
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...
Customer Data Cleansing Project.pptx by Nat O
Customer Data Cleansing Project.pptxCustomer Data Cleansing Project.pptx
Customer Data Cleansing Project.pptx
Nat O6 views
[DSC Europe 23] Matteo Molteni - Implementing a Robust CI Workflow with dbt f... by DataScienceConferenc1
[DSC Europe 23] Matteo Molteni - Implementing a Robust CI Workflow with dbt f...[DSC Europe 23] Matteo Molteni - Implementing a Robust CI Workflow with dbt f...
[DSC Europe 23] Matteo Molteni - Implementing a Robust CI Workflow with dbt f...
Data Journeys Hard Talk workshop final.pptx by info828217
Data Journeys Hard Talk workshop final.pptxData Journeys Hard Talk workshop final.pptx
Data Journeys Hard Talk workshop final.pptx
info82821711 views
[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx by DataScienceConferenc1
[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx
[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx

Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC

  • 1. Using Return Path Data to Protect Your Brand Security Breakout Session Brandon Dingae, Director, Sales Enablement
  • 3. Email Delivers Business Value… Increases Customer Loyalty Boosts Revenue Reduces Operating Costs
  • 4. …But Its Impact Is Being Eroded 5 out of 6 big companies are targeted with phishing attacks Phishing costs brands worldwide $4.5 billion each year RSA identifies a phishing attack every minute Email fraud has up to a 45% conversion rate Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm $4.5 B 1 MIN 5/6 45%
  • 5. Phishing Leads To – Revenue Losses • Reduced trust in brand: • Subscribers don’t know what to trust • Reduced effectiveness of email • ISPs don’t know what to trust Customers are 42% less likely to interact with a brand after being phished or spoofed.
  • 6. Phishing Leads To – Unwanted Media Attention
  • 7. “If you boil the jobs down of IT security professionals, they are ultimately tasked with protecting the brand… If you have a breach, research suggests that 60% of your customers will think about moving and 30% actually do.” Bryan Littlefair Global Chief Information Security Officer Aviva
  • 8. Phishing Leads To – Remediation Costs Fraud Losses Malware Infection Investigation Remediation
  • 9. Can You Spot a Spoof?
  • 10. Anatomy Of A Phishing Email to: You <you@yourdomain.com> from: Phishing Company <phishingcompany@spoof.com> subject: Unauthorized login attempt Dear Customer, We have recieved noticed that you have recently attempted to login to your account from an unauthorized device. As a saftey measure, please visit the link below to update your login details now: http://www.phishingemail.com/updatedetails.asp Once you have updated your details your account will be secure from further unauthorized login attempts. Thanks, The Phishing Team 1 attachment Making an email look legitimate by spoofing the company name in the “Display Name” field. Tricking email servers into delivering the email to the inbox by spoofing the “envelope from” address hidden in the technical header of the email. Including logos, company terms, and urgent language in the body of the email. Making an email appear to come from a brand by using a legitimate company domain, or a domain that looks like it in the “from” field. Creating convincing subject lines to drive recipients to open the message. Including links to malicious websites that prompt users to give up credentials Including attachments containing malicious content.
  • 11. From: service@paypal.com <paypal@service.com> From: PayPal <paypal@e.paypal.co.uk>
  • 12. The Power of the Right Data
  • 13. Knowledge Is Your Best Defense • We know there is no silver bullet. • But defense starts with understanding. • Data is the key to that understanding.
  • 14. Breadth, Depth, and Speed Contactually Molto ParibusGetAirHelp Message Finder UnsubscriberOrganizer
  • 15. EMAIL THREAT DATA · Consumer inbox data · Email delivery data · Authentication results · Message level data · SPAM trap & complaints data EMAIL THREAT INTELLIGENCE · Domain-spoofing alerts · Brand-spoofing intelligence · Suspicious activity map · Fraudcaster URL feed · Sender Score: IP reputation
  • 16. Email Fraud: Primary Attack Vectors Domain Spoofing (from domains owned by the brand) Brand Spoofing (from domains outside the brand’s control) phish@company.com company@phish.com
  • 17. 30% of Attacks Spoof Domains You Own 30% Domain Spoofing • Active Emailing Domains • Non-Sending Domains • Defensively-Registered Domains 70% Brand Spoofing • Cousin Domains • Display Name Spoofing • Subject Line Spoofing • Email Account Spoofing Source: Return Path / APWG White Paper, 2014
  • 18. Unite Against Email Fraud Tips for defending your customers, your brand, and your bottom line.
  • 20. DMARC (Domain-based Message Authentication Reporting & Conformance): • Technical specification created to help reduce the potential for email- based abuse (www.dmarc.org) • Prevents domain-based spoofing by blocking fraudulent activity appearing to come from domains under your control • Provides threat reporting mechanism (aggregate and forensic data) #1: Authenticate Your Email
  • 21. “Simply put, the DMARC standard works. In a blended approach to fight email fraud, DMARC represents the cornerstone of technical controls that commercial senders can implement today to rebuild trust and retake the email channel for legitimate brands and consumers.” Edward Tucker Head of Cyber Security Her Majesty’s Revenue & Customs
  • 22. • Addressing the 70% of email attacks that spoof your brand using domains your company does not own requires email threat intelligence. • Get visibility into all types of email threats targeting you today. #2: Leverage Email Threat Intelligence
  • 23. • The reality is, some attacks are always going to get through. • The more prepared your customers are, the better. • Create an educational website • Include anti-fraud language within your legitimate email • In the event of an attack, warn your customers immediately #3: Educate Your Customers
  • 24. • Engage with Brand Protection teams to make the business case. • Create a sense of urgency. • Communicate the risks that result from not taking action: • Email fraud destroys brand reputation and erodes customer loyalty • Email fraud thwarts email marketing effectiveness • Email fraud negatively impacts revenue #4: Raise Awareness with Top Executives
  • 25. Learn More www.returnpath.com/StopEmailFraud Twitter: @StopEmailFraud New: Download the Email Threat Intelligence report at bit.ly/EmailThreatIntel