SlideShare a Scribd company logo
www.cyberguru.eu – contact@cyberguru.eu
Cyber Guru Phishing
*
Cyber Security Awareness
Automated platform for continuous individual anti-phishing
training
www.cyberguru.eu – contact@cyberguru.eu
Solution
OUR ANSWER IS CALLED CYBER
GURU
A LINE OF PRODUCTS DESIGNED
TO INCREASE THE SECURITY
PROFILE OF AN ORGANIZATION BY
TARGETING AWARENESS AND
USER BEHAVIOUR
CYBER GURU
AWARENESS
Advanced e-
Learning
platform
CYBER GURU
PHISHING
Phishing attack
simulation platform
CYBER GURU
ENTERPRISE
Comprehensive
synergistic
programme
Our Cyber Security Awareness
products constitute a unique market
proposition in the fight against
Cyber Crime by focusing on the
human factor
2
www.cyberguru.eu – contact@cyberguru.eu
The Phishing
Phenomenon
The PHISHING
phenomenon is continuously
growing both qualitatively and
quantitatively.
It is especially dangerous when tied
to the phenomenon of
SOCIALENGINEERING
© Clusit 2019 - Report on ICT Security in Italy
80% of data breaches are the
result of a phishing activity.
Verizon
88% of organizations reported
being targeted by a Phishing
attack in the past year.
KPMG
Phishing attacks cost an
average of one billion per
year.
Forbes
Distribution of attack techniques
3
www.cyberguru.eu – contact@cyberguru.eu
Ethical
Phishing
One of the most common
anti-phishing practices is called
Ethical Phishing
Traditional EP campaigns have
SIGNIFICANT LIMITATIONS
From a results point of view, it is objectively difficult to
interpret the results obtained from EP
From an objectives point of view, EP is oriented towards
providing only a "static" measure of phishing risks
From a management point of view, it has a significant
impact on the activities of Cyber Security teams
From a training point of view, actual training activities are
too infrequent
From a risk measurement point of view, EP puts too
much emphasis on Click Rate
4
www.cyberguru.eu – contact@cyberguru.eu
Objectives
TO TRANSFORM THE BEHAVIOUR
OF THE CORPORATE POPULATION
ADAPTING IT TO THE CURRENT
LEVEL OF RISK
TO TRAIN THE INDIVIDUAL'S
READINESS AND RESPONSIVENESS
TO PHISHING ATTACKS TO
DEVELOP GREATER RESILIENCE
To minimize the impact on Cyber Security teams
through automation.
To ensure training effectiveness through
personalization and customisation
To provide evidence of effectiveness through
accurate measurement of results, based on
advanced, easy to understand metrics
1
2
5
www.cyberguru.eu – contact@cyberguru.eu
Cyber Guru
Phishing
The only ANTI-PHISHING platform
that continuously trains individuals
to develop readiness and
responsiveness to attacks.
The only fully-automated platform
that can customize simulated
attacks based on a behavioural
profile
Attack simulations are personalised based on the
organization's needs and the behavioural profile of the individual
user
The system does not measure vulnerability but rather seeks to
reduce it through training that emphasizes readiness and
responsiveness
The system provides advanced metrics that allow you to
monitor ongoing improvement in the "cyber posture" of
employees.
The system is fully automated (using AI) to eliminate any
operational impact on the Cyber Security team
6
www.cyberguru.eu – contact@cyberguru.eu
Features
ON-GOING
TRAINING
1
Maintains the
"readiness" of
each employee,
developing their
ability to react to
attacks
DIVERSIFIED
SCENARIOS
2
Simulates
diverse attack
scenarios with
increasingly
sophisticated
deception based
on individual
employee
TRAINING
CONTENT
3
Links lead to
landing pages
with light
training content
adapted to the
attack
MACHINE
LEARNING
4
Modifies the
simulation
strategies through
a data-driven
ability to learn
SERVICE
5
As a service, the
platform minimizes
the impact on the
Cyber Security
team
EFFECTIVE
REPORTING
6
Reports the risk
map and the
overall
improvement
resulting from the
training strategy
7
www.cyberguru.eu – contact@cyberguru.eu
Process
FIRST
CAMPAIGN
1
The first
campaign sends
basic e-mails
with a distribution
model designed
to circumvent
word-of-mouth
advance notice.
AUTOMATIC
TRAINING
2
Users who fall for
phishing traps are
automatically
exposed to brief
educational
content
ANALYSIS OF
RESULTS
3
The system
analyses the
results of the first
campaign and
automatically
prepares (using
AI) the next
campaign
NEXT
CAMPAIGN
4
More complex e-
mails are sent to
the better-
prepared users,
while e-mails of
the same level
and context are
sent to users who
failed the first test
EFFECTIVE
TRAINING
5
Over time, users
are subjected to a
completely
personalized anti-
phishing
training course
EFFECTIVE
REPORTING
6
A sophisticated
dashboard
provides
complete
visibility of the
evolution of the
training plan (in
anonymous
format)
8
www.cyberguru.eu – contact@cyberguru.eu
Simulate > Train > Measure
SIMULATE TRAIN
MEASURE
9
www.cyberguru.eu – contact@cyberguru.eu
Adaptive
Process
The real strength of the platform lies
in the automation and adaptive
approach based on machine learning.
The templates used, the relevance,
the sending frequencies and the level
of difficulty are parameters that
enable the modification of the
simulations based on actual results,
to increase the effectiveness for each
individual.
10
8
Adaptive learning
Automated
delivery
engine
E-mails with a low
click level
are eliminated
Various types
of e-mail are
sent
Relevance is
defined based
on groups
New e-mails
are added to
the campaign
The sending
frequency is
dynamic
www.cyberguru.eu – contact@cyberguru.eu
CAMPAIGN
MONITORING
Reporting
The platform provides
broad, structured
reporting that guarantees
complete process visibility
11
www.cyberguru.eu – contact@cyberguru.eu
Reporting
12
www.cyberguru.eu – contact@cyberguru.eu
DETAILS ORGANISED
ACCORDING TO
CONFIGURATION
PARAMETERS
Reporting
13
www.cyberguru.eu – contact@cyberguru.eu
Reporting
14
www.cyberguru.eu – contact@cyberguru.eu
ANALYTICAL USER VIEW
(ANONYMISED) WITH
IDENTIFICATION OF "SERIAL
CLICKERS"
Reporting
15
www.cyberguru.eu – contact@cyberguru.eu
Reporting
16
www.cyberguru.eu – contact@cyberguru.eu
Reporting
RESILIENCE SERIAL
CLICKER
COMBINED METRICS TO
INDICATE THE LEVEL OF
RISK IN A RELIABLE WAY
17
www.cyberguru.eu – contact@cyberguru.eu
Reporting
18
www.cyberguru.eu – contact@cyberguru.eu
Reporting
SERIAL
CLICKER
19
www.cyberguru.eu – contact@cyberguru.eu
Reporting
RESILIENCE
1.6
10
12.8
20
www.cyberguru.eu – contact@cyberguru.eu
On-Boarding
USER LIST
1
WHITE-LISTING
2
MODEL
TECHNICAL TEST
3
The effectiveness
of the white-listing
phase is verified
APPROVAL
TEMPLATES AND
BRANDING
4
Approval of
suggested
templates for the
first campaign;
Customisation of
the landing page
templates
INTERNAL
COMMUNICATION
5
A strongly
recommended
activity to raise
awareness of the
programme
The targeted user
list is defined,
associating users
with
organizational
parameters
E-MAIL &
TRAINING
Configuration that
allows attacks to
overcome security
barriers
SENDING
TEST EMAILS
FIRST
CAMPAIGN
PROGRAMME
KICK-OFF
GO LIVE
6
Supported by the
Customer
Success Manager
FIRST
CAMPAIGN
LAUNCHED
AVERAGE TIME: 1 WEEK
21
www.cyberguru.eu – contact@cyberguru.eu
Why
Cyber Guru
Phishing
BECAUSE IT GOES BEYOND THE
LIMITATIONS OF TRADITIONAL
TRAINING AND ETHICAL PHISHING
• Because it uses continuous education and repetitive
training to improve readiness and individual
responsiveness
• Because it constantly adapts the training to the profile
of the individual and the organization
• Because it effectively develops the resilience of the
organization, demonstrated through timely reporting
• Because it is oriented towards risk reduction and not
simply risk measurement.
• Because, as a service, it minimizes the management
impact on the Cyber Security team
22
www.cyberguru.eu – contact@cyberguru.eu
*
Cyber Guru Phishing
Cyber Security Awareness
Automated platform for continuous individual anti-phishing
training

More Related Content

What's hot

Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
IBM Security
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection security
IBM Security
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
sukiennong.vn
 
Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021
TrustwaveHoldings
 
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
Monica Verma
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy Sector
FMA Summits
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
IBM Security
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
IBM Security
 
OSB170: What a CISO Wants
OSB170: What a CISO WantsOSB170: What a CISO Wants
OSB170: What a CISO Wants
Ivanti
 
Case Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicCase Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographic
IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
IBM Security
 
IBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security Keynote
IBM Events
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
IBM Security
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
IBM Security
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
IBM Security
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
IBM Security
 
How Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber RiskHow Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber Risk
EtQ, Inc.
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat Intelligence
Zimperium
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
IBM Security
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
IBM Security
 

What's hot (20)

Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection security
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021
 
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy Sector
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
OSB170: What a CISO Wants
OSB170: What a CISO WantsOSB170: What a CISO Wants
OSB170: What a CISO Wants
 
Case Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicCase Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographic
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
IBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security Keynote
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
 
How Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber RiskHow Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber Risk
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat Intelligence
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
 

Similar to Cyber Guru Phishing - en - v1

Cyber Guru Overview - en - v1
Cyber Guru Overview - en - v1Cyber Guru Overview - en - v1
Cyber Guru Overview - en - v1
Cyber Guru srl
 
Cyber Guru Overview - en v1
Cyber Guru Overview - en v1Cyber Guru Overview - en v1
Cyber Guru Overview - en v1
Gruppo Daman
 
D zone-cat-datasheet
D zone-cat-datasheetD zone-cat-datasheet
D zone-cat-datasheet
Lindsay Carreau
 
Symantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZSymantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZ
Grant Chapman
 
Cybersecurity - Needs and Barriers of SMEs
Cybersecurity - Needs and Barriers of SMEsCybersecurity - Needs and Barriers of SMEs
Cybersecurity - Needs and Barriers of SMEs
Cyber Watching
 
Cyber Threat Prediction using ML
Cyber Threat Prediction using MLCyber Threat Prediction using ML
Cyber Threat Prediction using ML
IRJET Journal
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
Carol Montgomery Adams
 
Keepnet Labs. Cybersecurity Awareness 5min. Presentation
Keepnet Labs. Cybersecurity Awareness 5min. PresentationKeepnet Labs. Cybersecurity Awareness 5min. Presentation
Keepnet Labs. Cybersecurity Awareness 5min. Presentation
Keepnet Labs.
 
ASPEN Brochure
ASPEN BrochureASPEN Brochure
ASPEN Brochure
Florin Hoinarescu
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
TEWMAGAZINE
 
Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ? Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ?
Positive Hack Days
 
Cyber Security Solutions in Europe
Cyber Security Solutions in Europe Cyber Security Solutions in Europe
Cyber Security Solutions in Europe
Securityium
 
Symantec Secure Email Service - KAZ
Symantec Secure Email Service - KAZSymantec Secure Email Service - KAZ
Symantec Secure Email Service - KAZ
Grant Chapman
 
EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...
ssuser2d55aa
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Sai Chandra Chittuluri
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
Swapnil Jagtap
 
Defensive Cybersecurity Approach for Organizations.pptx
Defensive Cybersecurity Approach for Organizations.pptxDefensive Cybersecurity Approach for Organizations.pptx
Defensive Cybersecurity Approach for Organizations.pptx
Infosectrain3
 
Certified Information Security Manager (CISM) - PPT.pdf
Certified Information Security Manager (CISM) - PPT.pdfCertified Information Security Manager (CISM) - PPT.pdf
Certified Information Security Manager (CISM) - PPT.pdf
Multisoft Virtual Acedamy
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
IBM Security
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
Prime Infoserv
 

Similar to Cyber Guru Phishing - en - v1 (20)

Cyber Guru Overview - en - v1
Cyber Guru Overview - en - v1Cyber Guru Overview - en - v1
Cyber Guru Overview - en - v1
 
Cyber Guru Overview - en v1
Cyber Guru Overview - en v1Cyber Guru Overview - en v1
Cyber Guru Overview - en v1
 
D zone-cat-datasheet
D zone-cat-datasheetD zone-cat-datasheet
D zone-cat-datasheet
 
Symantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZSymantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZ
 
Cybersecurity - Needs and Barriers of SMEs
Cybersecurity - Needs and Barriers of SMEsCybersecurity - Needs and Barriers of SMEs
Cybersecurity - Needs and Barriers of SMEs
 
Cyber Threat Prediction using ML
Cyber Threat Prediction using MLCyber Threat Prediction using ML
Cyber Threat Prediction using ML
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Keepnet Labs. Cybersecurity Awareness 5min. Presentation
Keepnet Labs. Cybersecurity Awareness 5min. PresentationKeepnet Labs. Cybersecurity Awareness 5min. Presentation
Keepnet Labs. Cybersecurity Awareness 5min. Presentation
 
ASPEN Brochure
ASPEN BrochureASPEN Brochure
ASPEN Brochure
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
 
Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ? Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ?
 
Cyber Security Solutions in Europe
Cyber Security Solutions in Europe Cyber Security Solutions in Europe
Cyber Security Solutions in Europe
 
Symantec Secure Email Service - KAZ
Symantec Secure Email Service - KAZSymantec Secure Email Service - KAZ
Symantec Secure Email Service - KAZ
 
EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Defensive Cybersecurity Approach for Organizations.pptx
Defensive Cybersecurity Approach for Organizations.pptxDefensive Cybersecurity Approach for Organizations.pptx
Defensive Cybersecurity Approach for Organizations.pptx
 
Certified Information Security Manager (CISM) - PPT.pdf
Certified Information Security Manager (CISM) - PPT.pdfCertified Information Security Manager (CISM) - PPT.pdf
Certified Information Security Manager (CISM) - PPT.pdf
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
 

More from Cyber Guru srl

Cyber Guru Phishing Brochure - it - v1
Cyber Guru Phishing Brochure - it - v1Cyber Guru Phishing Brochure - it - v1
Cyber Guru Phishing Brochure - it - v1
Cyber Guru srl
 
Cyber Guru Awareness Brochure - it - v1
Cyber Guru Awareness Brochure - it - v1Cyber Guru Awareness Brochure - it - v1
Cyber Guru Awareness Brochure - it - v1
Cyber Guru srl
 
Cyber Guru Brochure - it - v1
Cyber Guru Brochure - it - v1Cyber Guru Brochure - it - v1
Cyber Guru Brochure - it - v1
Cyber Guru srl
 
Cyber Guru Phishing - it - v1
Cyber Guru Phishing - it - v1Cyber Guru Phishing - it - v1
Cyber Guru Phishing - it - v1
Cyber Guru srl
 
Cyber Guru Awareness - en - v1
Cyber Guru Awareness - en - v1Cyber Guru Awareness - en - v1
Cyber Guru Awareness - en - v1
Cyber Guru srl
 
Cyber Guru Awareness - it - v1
Cyber Guru Awareness - it - v1Cyber Guru Awareness - it - v1
Cyber Guru Awareness - it - v1
Cyber Guru srl
 
Cyber Guru Overview - it - v1
Cyber Guru Overview - it - v1Cyber Guru Overview - it - v1
Cyber Guru Overview - it - v1
Cyber Guru srl
 

More from Cyber Guru srl (7)

Cyber Guru Phishing Brochure - it - v1
Cyber Guru Phishing Brochure - it - v1Cyber Guru Phishing Brochure - it - v1
Cyber Guru Phishing Brochure - it - v1
 
Cyber Guru Awareness Brochure - it - v1
Cyber Guru Awareness Brochure - it - v1Cyber Guru Awareness Brochure - it - v1
Cyber Guru Awareness Brochure - it - v1
 
Cyber Guru Brochure - it - v1
Cyber Guru Brochure - it - v1Cyber Guru Brochure - it - v1
Cyber Guru Brochure - it - v1
 
Cyber Guru Phishing - it - v1
Cyber Guru Phishing - it - v1Cyber Guru Phishing - it - v1
Cyber Guru Phishing - it - v1
 
Cyber Guru Awareness - en - v1
Cyber Guru Awareness - en - v1Cyber Guru Awareness - en - v1
Cyber Guru Awareness - en - v1
 
Cyber Guru Awareness - it - v1
Cyber Guru Awareness - it - v1Cyber Guru Awareness - it - v1
Cyber Guru Awareness - it - v1
 
Cyber Guru Overview - it - v1
Cyber Guru Overview - it - v1Cyber Guru Overview - it - v1
Cyber Guru Overview - it - v1
 

Recently uploaded

Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
shreyassri1208
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
sonukumargpnirsadhan
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 

Recently uploaded (20)

Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 

Cyber Guru Phishing - en - v1

  • 1. www.cyberguru.eu – contact@cyberguru.eu Cyber Guru Phishing * Cyber Security Awareness Automated platform for continuous individual anti-phishing training
  • 2. www.cyberguru.eu – contact@cyberguru.eu Solution OUR ANSWER IS CALLED CYBER GURU A LINE OF PRODUCTS DESIGNED TO INCREASE THE SECURITY PROFILE OF AN ORGANIZATION BY TARGETING AWARENESS AND USER BEHAVIOUR CYBER GURU AWARENESS Advanced e- Learning platform CYBER GURU PHISHING Phishing attack simulation platform CYBER GURU ENTERPRISE Comprehensive synergistic programme Our Cyber Security Awareness products constitute a unique market proposition in the fight against Cyber Crime by focusing on the human factor 2
  • 3. www.cyberguru.eu – contact@cyberguru.eu The Phishing Phenomenon The PHISHING phenomenon is continuously growing both qualitatively and quantitatively. It is especially dangerous when tied to the phenomenon of SOCIALENGINEERING © Clusit 2019 - Report on ICT Security in Italy 80% of data breaches are the result of a phishing activity. Verizon 88% of organizations reported being targeted by a Phishing attack in the past year. KPMG Phishing attacks cost an average of one billion per year. Forbes Distribution of attack techniques 3
  • 4. www.cyberguru.eu – contact@cyberguru.eu Ethical Phishing One of the most common anti-phishing practices is called Ethical Phishing Traditional EP campaigns have SIGNIFICANT LIMITATIONS From a results point of view, it is objectively difficult to interpret the results obtained from EP From an objectives point of view, EP is oriented towards providing only a "static" measure of phishing risks From a management point of view, it has a significant impact on the activities of Cyber Security teams From a training point of view, actual training activities are too infrequent From a risk measurement point of view, EP puts too much emphasis on Click Rate 4
  • 5. www.cyberguru.eu – contact@cyberguru.eu Objectives TO TRANSFORM THE BEHAVIOUR OF THE CORPORATE POPULATION ADAPTING IT TO THE CURRENT LEVEL OF RISK TO TRAIN THE INDIVIDUAL'S READINESS AND RESPONSIVENESS TO PHISHING ATTACKS TO DEVELOP GREATER RESILIENCE To minimize the impact on Cyber Security teams through automation. To ensure training effectiveness through personalization and customisation To provide evidence of effectiveness through accurate measurement of results, based on advanced, easy to understand metrics 1 2 5
  • 6. www.cyberguru.eu – contact@cyberguru.eu Cyber Guru Phishing The only ANTI-PHISHING platform that continuously trains individuals to develop readiness and responsiveness to attacks. The only fully-automated platform that can customize simulated attacks based on a behavioural profile Attack simulations are personalised based on the organization's needs and the behavioural profile of the individual user The system does not measure vulnerability but rather seeks to reduce it through training that emphasizes readiness and responsiveness The system provides advanced metrics that allow you to monitor ongoing improvement in the "cyber posture" of employees. The system is fully automated (using AI) to eliminate any operational impact on the Cyber Security team 6
  • 7. www.cyberguru.eu – contact@cyberguru.eu Features ON-GOING TRAINING 1 Maintains the "readiness" of each employee, developing their ability to react to attacks DIVERSIFIED SCENARIOS 2 Simulates diverse attack scenarios with increasingly sophisticated deception based on individual employee TRAINING CONTENT 3 Links lead to landing pages with light training content adapted to the attack MACHINE LEARNING 4 Modifies the simulation strategies through a data-driven ability to learn SERVICE 5 As a service, the platform minimizes the impact on the Cyber Security team EFFECTIVE REPORTING 6 Reports the risk map and the overall improvement resulting from the training strategy 7
  • 8. www.cyberguru.eu – contact@cyberguru.eu Process FIRST CAMPAIGN 1 The first campaign sends basic e-mails with a distribution model designed to circumvent word-of-mouth advance notice. AUTOMATIC TRAINING 2 Users who fall for phishing traps are automatically exposed to brief educational content ANALYSIS OF RESULTS 3 The system analyses the results of the first campaign and automatically prepares (using AI) the next campaign NEXT CAMPAIGN 4 More complex e- mails are sent to the better- prepared users, while e-mails of the same level and context are sent to users who failed the first test EFFECTIVE TRAINING 5 Over time, users are subjected to a completely personalized anti- phishing training course EFFECTIVE REPORTING 6 A sophisticated dashboard provides complete visibility of the evolution of the training plan (in anonymous format) 8
  • 9. www.cyberguru.eu – contact@cyberguru.eu Simulate > Train > Measure SIMULATE TRAIN MEASURE 9
  • 10. www.cyberguru.eu – contact@cyberguru.eu Adaptive Process The real strength of the platform lies in the automation and adaptive approach based on machine learning. The templates used, the relevance, the sending frequencies and the level of difficulty are parameters that enable the modification of the simulations based on actual results, to increase the effectiveness for each individual. 10 8 Adaptive learning Automated delivery engine E-mails with a low click level are eliminated Various types of e-mail are sent Relevance is defined based on groups New e-mails are added to the campaign The sending frequency is dynamic
  • 11. www.cyberguru.eu – contact@cyberguru.eu CAMPAIGN MONITORING Reporting The platform provides broad, structured reporting that guarantees complete process visibility 11
  • 13. www.cyberguru.eu – contact@cyberguru.eu DETAILS ORGANISED ACCORDING TO CONFIGURATION PARAMETERS Reporting 13
  • 15. www.cyberguru.eu – contact@cyberguru.eu ANALYTICAL USER VIEW (ANONYMISED) WITH IDENTIFICATION OF "SERIAL CLICKERS" Reporting 15
  • 17. www.cyberguru.eu – contact@cyberguru.eu Reporting RESILIENCE SERIAL CLICKER COMBINED METRICS TO INDICATE THE LEVEL OF RISK IN A RELIABLE WAY 17
  • 21. www.cyberguru.eu – contact@cyberguru.eu On-Boarding USER LIST 1 WHITE-LISTING 2 MODEL TECHNICAL TEST 3 The effectiveness of the white-listing phase is verified APPROVAL TEMPLATES AND BRANDING 4 Approval of suggested templates for the first campaign; Customisation of the landing page templates INTERNAL COMMUNICATION 5 A strongly recommended activity to raise awareness of the programme The targeted user list is defined, associating users with organizational parameters E-MAIL & TRAINING Configuration that allows attacks to overcome security barriers SENDING TEST EMAILS FIRST CAMPAIGN PROGRAMME KICK-OFF GO LIVE 6 Supported by the Customer Success Manager FIRST CAMPAIGN LAUNCHED AVERAGE TIME: 1 WEEK 21
  • 22. www.cyberguru.eu – contact@cyberguru.eu Why Cyber Guru Phishing BECAUSE IT GOES BEYOND THE LIMITATIONS OF TRADITIONAL TRAINING AND ETHICAL PHISHING • Because it uses continuous education and repetitive training to improve readiness and individual responsiveness • Because it constantly adapts the training to the profile of the individual and the organization • Because it effectively develops the resilience of the organization, demonstrated through timely reporting • Because it is oriented towards risk reduction and not simply risk measurement. • Because, as a service, it minimizes the management impact on the Cyber Security team 22
  • 23. www.cyberguru.eu – contact@cyberguru.eu * Cyber Guru Phishing Cyber Security Awareness Automated platform for continuous individual anti-phishing training