SlideShare a Scribd company logo
1 of 31
Download to read offline
1
2
COMPARTE Y DEBATE
#LatamDigital
L
D
3
CSO – SOCIAL IS A TOP 5 CONCERN
Cyber attack No. 4: Social media threats
“Our online world is a social world led by Facebook, Twitter, LinkedIn or their
country-popular counterparts. Social media threats usually arrive as a rogue
friend or application install request…Many of today’s worst hacks started
out as simple social media hacking. Don’t underestimate the potential.”
4
FORBES – DELOITTE COMPROMISED VIA
SOCIAL
“The lovely and disarming ‘Mia Ash’ is a fictional female created by the
highly-active hacker crew known as OilRig, which…
SecureWorks believes is sponsored by the Iranian regime. In July 2016,
Mia's puppeteers targeted a Deloitte cybersecurity employee,
engaging him through [Facebook] in conversations about his job.”
5
CISCO – SOCIAL IS #1 SOURCE OF MALWARE
“Facebook is now the #1 source of malware…Unsurprisingly, ‘social
media’ saw the largest jump from last year’s report on the list of top
24 concerns; social is now ranked #3 overall…Facebook malware
is just one example of this dangerous new confluence.”
6
BUSINESS.COM – DON’T FORGET TO SECURE
SOCIAL
“Businesses already know how important security and protection is in
today's digital world. However, they often leave out social media, not
realizing how porous [social media] can be when it comes to hacks and
breaches. There are several ways in which things can go wrong.”
7
SOCIAL & DIGITAL IS THE NEW RISK VECTOR
ATTACK SURFACE OVER TIME
PROTECTED
ELEMENTS
SECURITY
TECHNOLOGIES
THREATS
& RISKS
Laptops, PCs,
Devices
ENDPOINT
SECURITY
VIRUS
MALWARE
EMPLOYEES
NETWORK
SECURITY
HQ, Offices &
Datacenters
DATA EXFILTRATION
ACCOUNT
COMPROMISE
SYSTEM
COMPROMISE
BUSINESSES &
EMPLOYEES
EMAIL
SECURITY
Exchange,
Lotus, Google
PHISHING
CREDENTIAL THEFT
ACCOUNT
COMPROMISE
RANSOMWARE
BUSINESSES, EXECS
& EMPLOYEES
SOCIAL MEDIA &
DIGITAL SECURITY
Social Media
Mobile
Collaboration
Domains
SOCIAL PROFILING
VIRUS
MALWARE
RANSOMWARE
PHISHING
DATA EXFILTRATION
CREDENTIAL THEFT ACCOUNT COMPROMISE
PHYSICAL ATTACK
FRAUD/SCAMS
BUSINESSES, BRANDS, CUSTOMERS,
EMPLOYEES & EXECUTIVES
8
SOCIAL IS A MAJOR BUSINESS PLATFORM
60% buying decisions made on
perception of brand vs. product or service quality
40% Increase in performance for social
brands vs. S&P 500
22.4% of total enterprise marketing
budgets spent on social in next 4 years
89% of employees active on social
media for personal AND business purposes
Major Business Investment
Critical Customer Revenue &
Retention Platform
Exposure To Targeted Attack &
Data Loss
9
IMPACT OF SOCIAL, DIGITAL & COLLABORATION
83%
Global organization’s use social as
key business platform
22%
of total enterprise marketing budgets
spent on social in next 4 years
$1.2B
Annual targeted social phishing
cost to organizations
200 Million
Facebook Business Pages Alone!
<1%
Currently have protection
61% More
than all “.coms” in the world
97%
Collaboration users service
more clients
80%
Global orgs use enterprise
collaboration
28%
Employees use collaboration
to share data
<12%
Organization’s have visibility
into activity
10
11
12
TACTIC #1: ACCOUNT HIJACKING
New York Post
1.8 Facebook accounts hacked
every second; 600,000 every day
Harris Poll
2 in 3 social media users have had
their accounts hijacked
13
14
TACTIC #2: EMPLOYEE ATTACKS
Intel McAfee
Employees experience more
cybercrime on social media than
any other business platform,
including email and filesharing.
Wombat
Employees struggle with “using
social media safely” more than any
other online activity
Barracuda
92% of employees have
experienced cyberattacks on social
Norton
36% of employees accept
unsolicited friend requests; only
11% open unsolicited emails
15
16
17
18
19
TACTIC #4: FRAUDULENT ACCOUNTS
ZeroFOX
Instances of fraudulent accounts
increased 11x in the past 24
months
ZeroFOX
38% of brand impersonations drive
users to phishing pages
20
Kaspersky
7.57 million victims of social
phishing annually
CISCO
Facebook is the most common
delivery mechanism for malware;
the #1 way to breach the network
RSA
Global cost of social media
phishing is $1.2 billion
TACTIC #3: SOCIAL PHISHING/MALWARE
21
22
23
TACTIC #6: INFORMATION LEAKAGE
InfoWatch
Over 1,500 data leaks occur every
year and 72.8% from insiders
E&Y
The average cost per record lost is
$214, data breach is >$7M
24
25
TACTIC #8: FRAUD & SCAMS
Cybersource
Retailers lost $3.5 billion last year
to online fraud
ZeroFOX
Scams are posted 3x faster than
they are taken down. Money
flipping scams on Instagram alone
cost banks roughly $420 million
every year.
Coupon Information Center
400,770 fake coupons / year
26
IMMEDIATE RECOMMENDATIONS
1. Set up two-factor authentication for your accounts.
2. Be wary of messages and connection requests.
3. Do not post personal information on personal or professional
accounts.
4. Ensure your personal info needed to register a social media account
is hidden from everyone.
5. Use a strong, unique password and change regularly; use a
password manager to make this easy.
6. Ensure authenticity of social networks logins and links.
7. Keep your computer and browser up to date
8. Encourage friends, family, coworkers to take similar precautions on
social media
27
OUR VISION
To protect people and organizations from the risks
introduced by social communication & collaboration
platforms
[The ZeroFOX Platform is] "groundbreaking"... "game-changing"...
"one of the most revolutionary platforms that exists."
-- Forbes, R. L. Adams April 4, 2017
28
EMPLOYEE
PROTECTION
BUSINESS
PROTECTION
SECURITY
PLATFORM
EXECUTIVES
Adds Protection from impersonators, physical & travel
threats, credential theft, malicious links & more
END USERS
Adds Protection from credential theft, malicious links,
viruses, and abusive posts via monitoring, alerting & training
BRANDS
Protection from takeover, fake spoofing, fraud/scams,
counterfeit, violence, phishing, inappropriate use
ENTERPRISES
Protection for credential theft, insider threat & DLP, PII
leakage, compliance, physical security, & threat intel
SOCIAL MEDIA ACCOUNTS
Facebook, Twitter & LinkedIn Auto Content Moderation &
Protection from takeover, violence, phishing, scams
29
MACHINE LEARNING
Artificial Intelligence Classifiers
Zero Day Protection
FoxThreats
CUSTOM RULES &
POLICIES
SOCIAL MEDIA
- Open Networks
- Closed Networks
- Enterprise Networks
WEB / DEEP WEB
- TLD Registrations
- Bin & Dump Sites
- Breach Notifications
- Custom Sites
MOBILE STORES
END USER ACCOUNTS
- Open Social
- Closed Social
- Breach Notifications
API
AUTOMATED
REMEDIATION
SECURITY
INTEGRATION
MANAGED
SERVICES
Integrate threat data into
existing security tools,
empowering existing defense
against digital attacks
Automatically remove
malicious content and profiles
from the social networks
directly
Expert digital risk analysts
provide 24x7x365 coverage
…
…
…
…
…
…
30
WHAT ZEROFOX CAN PROTECT AGAINST
1 Phishing & Malware2
Account Fraud &
Takeover
3
Inappropriate Content4 5
Scams & Fraud
6
Compromised
Credentials & PII
Threats & Violence
31

More Related Content

What's hot

0926182320 Sophos[1]
0926182320 Sophos[1]0926182320 Sophos[1]
0926182320 Sophos[1]guest043f27
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpnadelamm2
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersKaseya
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017IBM Security
 
The most well known closed vulnerabilities
The most well known closed vulnerabilitiesThe most well known closed vulnerabilities
The most well known closed vulnerabilitiesRiyadh Khan
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2ianpoblete13
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsEntefy
 
How large is the cyber security skills gap?
How large is the cyber security skills gap?How large is the cyber security skills gap?
How large is the cyber security skills gap?Megan Thudium
 
Hackers don’t discriminate
Hackers don’t discriminateHackers don’t discriminate
Hackers don’t discriminateGFI Software
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security Mahima Anand Sharma
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking SectorSamvel Gevorgyan
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011subramanian K
 
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118AngelaHoltby
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문Jiransoft Korea
 
Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Andrew Manoske
 

What's hot (20)

0926182320 Sophos[1]
0926182320 Sophos[1]0926182320 Sophos[1]
0926182320 Sophos[1]
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
The most well known closed vulnerabilities
The most well known closed vulnerabilitiesThe most well known closed vulnerabilities
The most well known closed vulnerabilities
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threats
 
How large is the cyber security skills gap?
How large is the cyber security skills gap?How large is the cyber security skills gap?
How large is the cyber security skills gap?
 
Hackers don’t discriminate
Hackers don’t discriminateHackers don’t discriminate
Hackers don’t discriminate
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011
 
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
 
Security Firm Program - Corporate College
Security Firm Program - Corporate CollegeSecurity Firm Program - Corporate College
Security Firm Program - Corporate College
 
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytesnull Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문
 
Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)
 

Similar to Presentación - Protecting your Employess, Customers, and Investments in the Age Social Media - ZeroFOX - Evento Financiero 2018

The Social Takeover
The Social TakeoverThe Social Takeover
The Social TakeoverZeroFOX
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Impulse Digital
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkRichard Common
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityRow Murray
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Deepa Devadas
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To IgnoreGross, Mendelsohn & Associates
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFERMA
 
Social Media & Cybersecurity
Social Media & CybersecuritySocial Media & Cybersecurity
Social Media & CybersecurityYuda Saydun
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxNakhoudah
 

Similar to Presentación - Protecting your Employess, Customers, and Investments in the Age Social Media - ZeroFOX - Evento Financiero 2018 (20)

The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challenge
 
Social Media & Cybersecurity
Social Media & CybersecuritySocial Media & Cybersecurity
Social Media & Cybersecurity
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 

More from Interlat

GANADORES 10mos. Premios #LatamDigital 2023 by Interlat - Junio 23.pdf
GANADORES 10mos. Premios #LatamDigital 2023 by Interlat - Junio 23.pdfGANADORES 10mos. Premios #LatamDigital 2023 by Interlat - Junio 23.pdf
GANADORES 10mos. Premios #LatamDigital 2023 by Interlat - Junio 23.pdfInterlat
 
Finalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023.pdf
Finalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023.pdfFinalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023.pdf
Finalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023.pdfInterlat
 
Finalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023
Finalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023Finalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023
Finalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023Interlat
 
_#WebinarInterlat Quieres ser el #1 de Latinoamérica.pptx
_#WebinarInterlat Quieres ser el #1 de Latinoamérica.pptx_#WebinarInterlat Quieres ser el #1 de Latinoamérica.pptx
_#WebinarInterlat Quieres ser el #1 de Latinoamérica.pptxInterlat
 
¡Conoce nuestros 9 Pilares de los Premios #LatamDigital 2023 by Interlat
¡Conoce nuestros 9 Pilares de los Premios #LatamDigital 2023 by Interlat¡Conoce nuestros 9 Pilares de los Premios #LatamDigital 2023 by Interlat
¡Conoce nuestros 9 Pilares de los Premios #LatamDigital 2023 by InterlatInterlat
 
Palm Secure Innovación en Seguridad Digital con Fujitsu
Palm Secure Innovación en Seguridad Digital con FujitsuPalm Secure Innovación en Seguridad Digital con Fujitsu
Palm Secure Innovación en Seguridad Digital con FujitsuInterlat
 
#WebinarInterlat Por qué y cómo Postularse a_ Premios #Latamdigital2023.pdf
#WebinarInterlat Por qué y cómo Postularse a_ Premios #Latamdigital2023.pdf#WebinarInterlat Por qué y cómo Postularse a_ Premios #Latamdigital2023.pdf
#WebinarInterlat Por qué y cómo Postularse a_ Premios #Latamdigital2023.pdfInterlat
 
Automation Marketing: Guía para generar conversiones en piloto automático con...
Automation Marketing: Guía para generar conversiones en piloto automático con...Automation Marketing: Guía para generar conversiones en piloto automático con...
Automation Marketing: Guía para generar conversiones en piloto automático con...Interlat
 
Interlat - Servicio Generación Demanda Soluciones SaaS Enero 2023.pdf
Interlat - Servicio Generación Demanda Soluciones SaaS Enero 2023.pdfInterlat - Servicio Generación Demanda Soluciones SaaS Enero 2023.pdf
Interlat - Servicio Generación Demanda Soluciones SaaS Enero 2023.pdfInterlat
 
Inteligencia Artificial en las estrategias de Marketing con Iterable
Inteligencia Artificial en las estrategias de Marketing con IterableInteligencia Artificial en las estrategias de Marketing con Iterable
Inteligencia Artificial en las estrategias de Marketing con IterableInterlat
 
10 tips que mejorarán tu Experiencia en Zoom
10 tips que mejorarán tu Experiencia en Zoom10 tips que mejorarán tu Experiencia en Zoom
10 tips que mejorarán tu Experiencia en ZoomInterlat
 
Presentación noche de gala 9nos. premios #LatamDigital 2021 by Interlat
Presentación noche de gala 9nos. premios #LatamDigital 2021 by Interlat  Presentación noche de gala 9nos. premios #LatamDigital 2021 by Interlat
Presentación noche de gala 9nos. premios #LatamDigital 2021 by Interlat Interlat
 
Estos son los finalistas de los 9nos. Premios #LatamDigital 2021
Estos son los finalistas de los 9nos. Premios #LatamDigital 2021 Estos son los finalistas de los 9nos. Premios #LatamDigital 2021
Estos son los finalistas de los 9nos. Premios #LatamDigital 2021 Interlat
 
Estudio Digital sobre las Acciones de Social Media en la región latinoaméricana
Estudio Digital sobre las Acciones de Social Media en la región latinoaméricanaEstudio Digital sobre las Acciones de Social Media en la región latinoaméricana
Estudio Digital sobre las Acciones de Social Media en la región latinoaméricanaInterlat
 
Comunicado de Prensa de los Estudios Digitales de Interlat
Comunicado de Prensa de los Estudios Digitales de InterlatComunicado de Prensa de los Estudios Digitales de Interlat
Comunicado de Prensa de los Estudios Digitales de InterlatInterlat
 
Comunicado de Prensa de los 9nos. premios #LatamDigital 2021
Comunicado de Prensa de los 9nos. premios #LatamDigital 2021Comunicado de Prensa de los 9nos. premios #LatamDigital 2021
Comunicado de Prensa de los 9nos. premios #LatamDigital 2021Interlat
 
Caso Éxito: ¿Cómo la Corporación Autónoma Regional del Magdalena fortaleció s...
Caso Éxito: ¿Cómo la Corporación Autónoma Regional del Magdalena fortaleció s...Caso Éxito: ¿Cómo la Corporación Autónoma Regional del Magdalena fortaleció s...
Caso Éxito: ¿Cómo la Corporación Autónoma Regional del Magdalena fortaleció s...Interlat
 
Comunicado de prensa: Estudio sobre la Trascendencia del Marketing Digital en...
Comunicado de prensa: Estudio sobre la Trascendencia del Marketing Digital en...Comunicado de prensa: Estudio sobre la Trascendencia del Marketing Digital en...
Comunicado de prensa: Estudio sobre la Trascendencia del Marketing Digital en...Interlat
 
Estudio Digital La Trascendencia del Marketing Digital en Empresas de Latinoa...
Estudio Digital La Trascendencia del Marketing Digital en Empresas de Latinoa...Estudio Digital La Trascendencia del Marketing Digital en Empresas de Latinoa...
Estudio Digital La Trascendencia del Marketing Digital en Empresas de Latinoa...Interlat
 
Ebook: La Actualidad del Comercio Electrónico en Organizaciones de Latinoamérica
Ebook: La Actualidad del Comercio Electrónico en Organizaciones de LatinoaméricaEbook: La Actualidad del Comercio Electrónico en Organizaciones de Latinoamérica
Ebook: La Actualidad del Comercio Electrónico en Organizaciones de LatinoaméricaInterlat
 

More from Interlat (20)

GANADORES 10mos. Premios #LatamDigital 2023 by Interlat - Junio 23.pdf
GANADORES 10mos. Premios #LatamDigital 2023 by Interlat - Junio 23.pdfGANADORES 10mos. Premios #LatamDigital 2023 by Interlat - Junio 23.pdf
GANADORES 10mos. Premios #LatamDigital 2023 by Interlat - Junio 23.pdf
 
Finalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023.pdf
Finalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023.pdfFinalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023.pdf
Finalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023.pdf
 
Finalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023
Finalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023Finalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023
Finalistas 10mos. Premios #LatamDigital 2023 by Interlat - Abril 14 2023
 
_#WebinarInterlat Quieres ser el #1 de Latinoamérica.pptx
_#WebinarInterlat Quieres ser el #1 de Latinoamérica.pptx_#WebinarInterlat Quieres ser el #1 de Latinoamérica.pptx
_#WebinarInterlat Quieres ser el #1 de Latinoamérica.pptx
 
¡Conoce nuestros 9 Pilares de los Premios #LatamDigital 2023 by Interlat
¡Conoce nuestros 9 Pilares de los Premios #LatamDigital 2023 by Interlat¡Conoce nuestros 9 Pilares de los Premios #LatamDigital 2023 by Interlat
¡Conoce nuestros 9 Pilares de los Premios #LatamDigital 2023 by Interlat
 
Palm Secure Innovación en Seguridad Digital con Fujitsu
Palm Secure Innovación en Seguridad Digital con FujitsuPalm Secure Innovación en Seguridad Digital con Fujitsu
Palm Secure Innovación en Seguridad Digital con Fujitsu
 
#WebinarInterlat Por qué y cómo Postularse a_ Premios #Latamdigital2023.pdf
#WebinarInterlat Por qué y cómo Postularse a_ Premios #Latamdigital2023.pdf#WebinarInterlat Por qué y cómo Postularse a_ Premios #Latamdigital2023.pdf
#WebinarInterlat Por qué y cómo Postularse a_ Premios #Latamdigital2023.pdf
 
Automation Marketing: Guía para generar conversiones en piloto automático con...
Automation Marketing: Guía para generar conversiones en piloto automático con...Automation Marketing: Guía para generar conversiones en piloto automático con...
Automation Marketing: Guía para generar conversiones en piloto automático con...
 
Interlat - Servicio Generación Demanda Soluciones SaaS Enero 2023.pdf
Interlat - Servicio Generación Demanda Soluciones SaaS Enero 2023.pdfInterlat - Servicio Generación Demanda Soluciones SaaS Enero 2023.pdf
Interlat - Servicio Generación Demanda Soluciones SaaS Enero 2023.pdf
 
Inteligencia Artificial en las estrategias de Marketing con Iterable
Inteligencia Artificial en las estrategias de Marketing con IterableInteligencia Artificial en las estrategias de Marketing con Iterable
Inteligencia Artificial en las estrategias de Marketing con Iterable
 
10 tips que mejorarán tu Experiencia en Zoom
10 tips que mejorarán tu Experiencia en Zoom10 tips que mejorarán tu Experiencia en Zoom
10 tips que mejorarán tu Experiencia en Zoom
 
Presentación noche de gala 9nos. premios #LatamDigital 2021 by Interlat
Presentación noche de gala 9nos. premios #LatamDigital 2021 by Interlat  Presentación noche de gala 9nos. premios #LatamDigital 2021 by Interlat
Presentación noche de gala 9nos. premios #LatamDigital 2021 by Interlat
 
Estos son los finalistas de los 9nos. Premios #LatamDigital 2021
Estos son los finalistas de los 9nos. Premios #LatamDigital 2021 Estos son los finalistas de los 9nos. Premios #LatamDigital 2021
Estos son los finalistas de los 9nos. Premios #LatamDigital 2021
 
Estudio Digital sobre las Acciones de Social Media en la región latinoaméricana
Estudio Digital sobre las Acciones de Social Media en la región latinoaméricanaEstudio Digital sobre las Acciones de Social Media en la región latinoaméricana
Estudio Digital sobre las Acciones de Social Media en la región latinoaméricana
 
Comunicado de Prensa de los Estudios Digitales de Interlat
Comunicado de Prensa de los Estudios Digitales de InterlatComunicado de Prensa de los Estudios Digitales de Interlat
Comunicado de Prensa de los Estudios Digitales de Interlat
 
Comunicado de Prensa de los 9nos. premios #LatamDigital 2021
Comunicado de Prensa de los 9nos. premios #LatamDigital 2021Comunicado de Prensa de los 9nos. premios #LatamDigital 2021
Comunicado de Prensa de los 9nos. premios #LatamDigital 2021
 
Caso Éxito: ¿Cómo la Corporación Autónoma Regional del Magdalena fortaleció s...
Caso Éxito: ¿Cómo la Corporación Autónoma Regional del Magdalena fortaleció s...Caso Éxito: ¿Cómo la Corporación Autónoma Regional del Magdalena fortaleció s...
Caso Éxito: ¿Cómo la Corporación Autónoma Regional del Magdalena fortaleció s...
 
Comunicado de prensa: Estudio sobre la Trascendencia del Marketing Digital en...
Comunicado de prensa: Estudio sobre la Trascendencia del Marketing Digital en...Comunicado de prensa: Estudio sobre la Trascendencia del Marketing Digital en...
Comunicado de prensa: Estudio sobre la Trascendencia del Marketing Digital en...
 
Estudio Digital La Trascendencia del Marketing Digital en Empresas de Latinoa...
Estudio Digital La Trascendencia del Marketing Digital en Empresas de Latinoa...Estudio Digital La Trascendencia del Marketing Digital en Empresas de Latinoa...
Estudio Digital La Trascendencia del Marketing Digital en Empresas de Latinoa...
 
Ebook: La Actualidad del Comercio Electrónico en Organizaciones de Latinoamérica
Ebook: La Actualidad del Comercio Electrónico en Organizaciones de LatinoaméricaEbook: La Actualidad del Comercio Electrónico en Organizaciones de Latinoamérica
Ebook: La Actualidad del Comercio Electrónico en Organizaciones de Latinoamérica
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Presentación - Protecting your Employess, Customers, and Investments in the Age Social Media - ZeroFOX - Evento Financiero 2018

  • 1. 1
  • 3. 3 CSO – SOCIAL IS A TOP 5 CONCERN Cyber attack No. 4: Social media threats “Our online world is a social world led by Facebook, Twitter, LinkedIn or their country-popular counterparts. Social media threats usually arrive as a rogue friend or application install request…Many of today’s worst hacks started out as simple social media hacking. Don’t underestimate the potential.”
  • 4. 4 FORBES – DELOITTE COMPROMISED VIA SOCIAL “The lovely and disarming ‘Mia Ash’ is a fictional female created by the highly-active hacker crew known as OilRig, which… SecureWorks believes is sponsored by the Iranian regime. In July 2016, Mia's puppeteers targeted a Deloitte cybersecurity employee, engaging him through [Facebook] in conversations about his job.”
  • 5. 5 CISCO – SOCIAL IS #1 SOURCE OF MALWARE “Facebook is now the #1 source of malware…Unsurprisingly, ‘social media’ saw the largest jump from last year’s report on the list of top 24 concerns; social is now ranked #3 overall…Facebook malware is just one example of this dangerous new confluence.”
  • 6. 6 BUSINESS.COM – DON’T FORGET TO SECURE SOCIAL “Businesses already know how important security and protection is in today's digital world. However, they often leave out social media, not realizing how porous [social media] can be when it comes to hacks and breaches. There are several ways in which things can go wrong.”
  • 7. 7 SOCIAL & DIGITAL IS THE NEW RISK VECTOR ATTACK SURFACE OVER TIME PROTECTED ELEMENTS SECURITY TECHNOLOGIES THREATS & RISKS Laptops, PCs, Devices ENDPOINT SECURITY VIRUS MALWARE EMPLOYEES NETWORK SECURITY HQ, Offices & Datacenters DATA EXFILTRATION ACCOUNT COMPROMISE SYSTEM COMPROMISE BUSINESSES & EMPLOYEES EMAIL SECURITY Exchange, Lotus, Google PHISHING CREDENTIAL THEFT ACCOUNT COMPROMISE RANSOMWARE BUSINESSES, EXECS & EMPLOYEES SOCIAL MEDIA & DIGITAL SECURITY Social Media Mobile Collaboration Domains SOCIAL PROFILING VIRUS MALWARE RANSOMWARE PHISHING DATA EXFILTRATION CREDENTIAL THEFT ACCOUNT COMPROMISE PHYSICAL ATTACK FRAUD/SCAMS BUSINESSES, BRANDS, CUSTOMERS, EMPLOYEES & EXECUTIVES
  • 8. 8 SOCIAL IS A MAJOR BUSINESS PLATFORM 60% buying decisions made on perception of brand vs. product or service quality 40% Increase in performance for social brands vs. S&P 500 22.4% of total enterprise marketing budgets spent on social in next 4 years 89% of employees active on social media for personal AND business purposes Major Business Investment Critical Customer Revenue & Retention Platform Exposure To Targeted Attack & Data Loss
  • 9. 9 IMPACT OF SOCIAL, DIGITAL & COLLABORATION 83% Global organization’s use social as key business platform 22% of total enterprise marketing budgets spent on social in next 4 years $1.2B Annual targeted social phishing cost to organizations 200 Million Facebook Business Pages Alone! <1% Currently have protection 61% More than all “.coms” in the world 97% Collaboration users service more clients 80% Global orgs use enterprise collaboration 28% Employees use collaboration to share data <12% Organization’s have visibility into activity
  • 10. 10
  • 11. 11
  • 12. 12 TACTIC #1: ACCOUNT HIJACKING New York Post 1.8 Facebook accounts hacked every second; 600,000 every day Harris Poll 2 in 3 social media users have had their accounts hijacked
  • 13. 13
  • 14. 14 TACTIC #2: EMPLOYEE ATTACKS Intel McAfee Employees experience more cybercrime on social media than any other business platform, including email and filesharing. Wombat Employees struggle with “using social media safely” more than any other online activity Barracuda 92% of employees have experienced cyberattacks on social Norton 36% of employees accept unsolicited friend requests; only 11% open unsolicited emails
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. 18
  • 19. 19 TACTIC #4: FRAUDULENT ACCOUNTS ZeroFOX Instances of fraudulent accounts increased 11x in the past 24 months ZeroFOX 38% of brand impersonations drive users to phishing pages
  • 20. 20 Kaspersky 7.57 million victims of social phishing annually CISCO Facebook is the most common delivery mechanism for malware; the #1 way to breach the network RSA Global cost of social media phishing is $1.2 billion TACTIC #3: SOCIAL PHISHING/MALWARE
  • 21. 21
  • 22. 22
  • 23. 23 TACTIC #6: INFORMATION LEAKAGE InfoWatch Over 1,500 data leaks occur every year and 72.8% from insiders E&Y The average cost per record lost is $214, data breach is >$7M
  • 24. 24
  • 25. 25 TACTIC #8: FRAUD & SCAMS Cybersource Retailers lost $3.5 billion last year to online fraud ZeroFOX Scams are posted 3x faster than they are taken down. Money flipping scams on Instagram alone cost banks roughly $420 million every year. Coupon Information Center 400,770 fake coupons / year
  • 26. 26 IMMEDIATE RECOMMENDATIONS 1. Set up two-factor authentication for your accounts. 2. Be wary of messages and connection requests. 3. Do not post personal information on personal or professional accounts. 4. Ensure your personal info needed to register a social media account is hidden from everyone. 5. Use a strong, unique password and change regularly; use a password manager to make this easy. 6. Ensure authenticity of social networks logins and links. 7. Keep your computer and browser up to date 8. Encourage friends, family, coworkers to take similar precautions on social media
  • 27. 27 OUR VISION To protect people and organizations from the risks introduced by social communication & collaboration platforms [The ZeroFOX Platform is] "groundbreaking"... "game-changing"... "one of the most revolutionary platforms that exists." -- Forbes, R. L. Adams April 4, 2017
  • 28. 28 EMPLOYEE PROTECTION BUSINESS PROTECTION SECURITY PLATFORM EXECUTIVES Adds Protection from impersonators, physical & travel threats, credential theft, malicious links & more END USERS Adds Protection from credential theft, malicious links, viruses, and abusive posts via monitoring, alerting & training BRANDS Protection from takeover, fake spoofing, fraud/scams, counterfeit, violence, phishing, inappropriate use ENTERPRISES Protection for credential theft, insider threat & DLP, PII leakage, compliance, physical security, & threat intel SOCIAL MEDIA ACCOUNTS Facebook, Twitter & LinkedIn Auto Content Moderation & Protection from takeover, violence, phishing, scams
  • 29. 29 MACHINE LEARNING Artificial Intelligence Classifiers Zero Day Protection FoxThreats CUSTOM RULES & POLICIES SOCIAL MEDIA - Open Networks - Closed Networks - Enterprise Networks WEB / DEEP WEB - TLD Registrations - Bin & Dump Sites - Breach Notifications - Custom Sites MOBILE STORES END USER ACCOUNTS - Open Social - Closed Social - Breach Notifications API AUTOMATED REMEDIATION SECURITY INTEGRATION MANAGED SERVICES Integrate threat data into existing security tools, empowering existing defense against digital attacks Automatically remove malicious content and profiles from the social networks directly Expert digital risk analysts provide 24x7x365 coverage … … … … … …
  • 30. 30 WHAT ZEROFOX CAN PROTECT AGAINST 1 Phishing & Malware2 Account Fraud & Takeover 3 Inappropriate Content4 5 Scams & Fraud 6 Compromised Credentials & PII Threats & Violence
  • 31. 31