SlideShare a Scribd company logo
Inman Connect: Securing Real Estate
Transactions through Threat Intelligence
Thomas Kinsella
Senior Manager, Cyber Intelligence & Investigations
2
2,260 confirmed data breaches in 2016
2.2 Billion compromised records
The forecasted average loss for a breach of 1,000 records is between $52,000 and $87,000
Customers, especially businesses, are using security as a discriminator
The Real Estate Industry is a target!
Why Are You Here? Why Am I Here?
Real Estate?
4
5
The Switch!
6
Future Business Email Compromise (BEC) Ecosystem
BEC
Infrastructure
Phishing
Interception
Mule
Management
Money
Transfer
Malware
Mule Pickups
Exchange (e.g. BTC)
Laundering
Escrow Services
WFH Recruitment
Communication
Cashout Services
Target Email List
Send Phish
Check Phished Creds
Detect Transactions
Phishing Pages
New Domains
Hacked Websites
Bulletproof Hosts
Create Inbox Rules
Design Invoices
Communicate w/
Buyers & Sellers
Design Exploit Kit
Coding Injections
Crypting Services
AV Checking
Threat Intelligence
8
Key Actions!
10
Key Actions!
This Week:
Network – Leverage industry knowledge to find out what companies are doing about this issue
This Quarter:
Educate – Train staff to detect and report phishing and social engineering attempts
Use Strong Authentication – Utilize 2-Factor Authentication, Password Managers; monitor for
corporate emails in third-party data breaches
This Year:
Create Threat Intelligence – Create a program to receive (and share) known Indicators of
Compromise (IOCs)
Hunt – Begin actively searching for known tactics, techniques and procedures in your environment
Questions
Thank you

More Related Content

What's hot

State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan Simic
State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan SimicState of Bitcoin Security - Inside Bitcoins April 2014 - Bojan Simic
State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan SimicBojan Simic
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!
Wavecrest Computing
 
How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?
David Hunt
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and dataAnthonywheeler
 
AI And Cyber-security Threats
AI And Cyber-security ThreatsAI And Cyber-security Threats
AI And Cyber-security Threats
Spotle.ai
 
Cyber Vulnerabilities of Biometrics - OWASP 2015
Cyber Vulnerabilities of Biometrics - OWASP 2015Cyber Vulnerabilities of Biometrics - OWASP 2015
Cyber Vulnerabilities of Biometrics - OWASP 2015
Bojan Simic
 
CyberDen 2020
CyberDen 2020CyberDen 2020
CyberDen 2020
Fahad Al-Hasan
 
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 ConferenceEffective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Paubox, Inc.
 
Ey managing-real-estate-cybersecurity
Ey managing-real-estate-cybersecurityEy managing-real-estate-cybersecurity
Ey managing-real-estate-cybersecurity
crazyivan389
 
Designing Trustable Products: Microinteractions Matter for Secure UX
Designing Trustable Products: Microinteractions Matter for Secure UXDesigning Trustable Products: Microinteractions Matter for Secure UX
Designing Trustable Products: Microinteractions Matter for Secure UX
Ame Elliott
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
TIKAJ
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017
PhishingBox
 
The Case for a Turnkey Approach to Fraud Operations
The Case for a Turnkey Approach to Fraud OperationsThe Case for a Turnkey Approach to Fraud Operations
The Case for a Turnkey Approach to Fraud Operations
Laurent Pacalin
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
Laurent Pacalin
 
4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing
PhishingBox
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
Wultra
 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
prcircle
 
Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...
Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...
Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...
Money 2Conf
 

What's hot (19)

State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan Simic
State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan SimicState of Bitcoin Security - Inside Bitcoins April 2014 - Bojan Simic
State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan Simic
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!
 
How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and data
 
AI And Cyber-security Threats
AI And Cyber-security ThreatsAI And Cyber-security Threats
AI And Cyber-security Threats
 
Cyber Vulnerabilities of Biometrics - OWASP 2015
Cyber Vulnerabilities of Biometrics - OWASP 2015Cyber Vulnerabilities of Biometrics - OWASP 2015
Cyber Vulnerabilities of Biometrics - OWASP 2015
 
CyberDen 2020
CyberDen 2020CyberDen 2020
CyberDen 2020
 
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 ConferenceEffective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
 
Ey managing-real-estate-cybersecurity
Ey managing-real-estate-cybersecurityEy managing-real-estate-cybersecurity
Ey managing-real-estate-cybersecurity
 
Designing Trustable Products: Microinteractions Matter for Secure UX
Designing Trustable Products: Microinteractions Matter for Secure UXDesigning Trustable Products: Microinteractions Matter for Secure UX
Designing Trustable Products: Microinteractions Matter for Secure UX
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017
 
The Case for a Turnkey Approach to Fraud Operations
The Case for a Turnkey Approach to Fraud OperationsThe Case for a Turnkey Approach to Fraud Operations
The Case for a Turnkey Approach to Fraud Operations
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
 
Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...
Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...
Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...
 

Viewers also liked

EMF in Real Estate Transactions
EMF in Real Estate TransactionsEMF in Real Estate Transactions
EMF in Real Estate Transactions
EMF&RF Solutions
 
10 Tech Predictions that Will Impact Real Estate - Jeff Lobb
10 Tech Predictions that Will Impact Real Estate - Jeff Lobb10 Tech Predictions that Will Impact Real Estate - Jeff Lobb
10 Tech Predictions that Will Impact Real Estate - Jeff Lobb
Inman News
 
Luxury Connect - Dolly Lenz
Luxury Connect - Dolly LenzLuxury Connect - Dolly Lenz
Luxury Connect - Dolly Lenz
Inman News
 
Luxury Connect - Allan Weiss
Luxury Connect - Allan WeissLuxury Connect - Allan Weiss
Luxury Connect - Allan Weiss
Inman News
 
Recognition Strategies: SEO + Content Marketing + Video: A Roadmap for Rapid ...
Recognition Strategies: SEO + Content Marketing + Video: A Roadmap for Rapid ...Recognition Strategies: SEO + Content Marketing + Video: A Roadmap for Rapid ...
Recognition Strategies: SEO + Content Marketing + Video: A Roadmap for Rapid ...
Inman News
 
Power of the Peloton - Building Your "Pack" to Accelerate Performance - Ginge...
Power of the Peloton - Building Your "Pack" to Accelerate Performance - Ginge...Power of the Peloton - Building Your "Pack" to Accelerate Performance - Ginge...
Power of the Peloton - Building Your "Pack" to Accelerate Performance - Ginge...
Inman News
 
The BIG Picture: Where does the market stand? Sarah Garrity
The BIG Picture: Where does the market stand? Sarah GarrityThe BIG Picture: Where does the market stand? Sarah Garrity
The BIG Picture: Where does the market stand? Sarah Garrity
Inman News
 
API's - Successes to Replicate. Pitfalls to Avoid.
API's - Successes to Replicate. Pitfalls to Avoid.API's - Successes to Replicate. Pitfalls to Avoid.
API's - Successes to Replicate. Pitfalls to Avoid.
Inman News
 
Creative Digital Relevance - Seth Price
Creative Digital Relevance - Seth PriceCreative Digital Relevance - Seth Price
Creative Digital Relevance - Seth Price
Inman News
 
It's Broken. Let's Rework It. - Wendy Forsythe
It's Broken. Let's Rework It. - Wendy ForsytheIt's Broken. Let's Rework It. - Wendy Forsythe
It's Broken. Let's Rework It. - Wendy Forsythe
Inman News
 
Blockchain Real Estate
Blockchain Real EstateBlockchain Real Estate
Blockchain Real Estate
Inman News
 
Five Tried and True Ways to Increase Sales This Year - Ashton Gustafson
Five Tried and True Ways to Increase Sales This Year - Ashton GustafsonFive Tried and True Ways to Increase Sales This Year - Ashton Gustafson
Five Tried and True Ways to Increase Sales This Year - Ashton Gustafson
Inman News
 
Stop Selling Like It's 1985 - Orlando Montiel
Stop Selling Like It's 1985 - Orlando MontielStop Selling Like It's 1985 - Orlando Montiel
Stop Selling Like It's 1985 - Orlando Montiel
Inman News
 
How Zillow Group is Working With the Tech Community
How Zillow Group is Working With the Tech CommunityHow Zillow Group is Working With the Tech Community
How Zillow Group is Working With the Tech Community
Inman News
 
DDOS ACTIONS AND THE INTERNET OF THINGS
DDOS ACTIONS AND THE INTERNET OF THINGSDDOS ACTIONS AND THE INTERNET OF THINGS
DDOS ACTIONS AND THE INTERNET OF THINGS
Inman News
 
3 Sales Strategies to 3x Your Business - Jeff Lobb
3 Sales Strategies to 3x Your Business - Jeff Lobb3 Sales Strategies to 3x Your Business - Jeff Lobb
3 Sales Strategies to 3x Your Business - Jeff Lobb
Inman News
 
Stop Ruining Your Reputation: The 15 Minute Digital Brand Detox - Laura Monroe
Stop Ruining Your Reputation: The 15 Minute Digital Brand Detox - Laura MonroeStop Ruining Your Reputation: The 15 Minute Digital Brand Detox - Laura Monroe
Stop Ruining Your Reputation: The 15 Minute Digital Brand Detox - Laura Monroe
Inman News
 
Facebook Marketing Automation for Real Estate
Facebook Marketing Automation for Real EstateFacebook Marketing Automation for Real Estate
Facebook Marketing Automation for Real Estate
Inman News
 
Machine Learning at Trulia
Machine Learning at TruliaMachine Learning at Trulia
Machine Learning at Trulia
Inman News
 

Viewers also liked (20)

EMF in Real Estate Transactions
EMF in Real Estate TransactionsEMF in Real Estate Transactions
EMF in Real Estate Transactions
 
Fantasy
FantasyFantasy
Fantasy
 
10 Tech Predictions that Will Impact Real Estate - Jeff Lobb
10 Tech Predictions that Will Impact Real Estate - Jeff Lobb10 Tech Predictions that Will Impact Real Estate - Jeff Lobb
10 Tech Predictions that Will Impact Real Estate - Jeff Lobb
 
Luxury Connect - Dolly Lenz
Luxury Connect - Dolly LenzLuxury Connect - Dolly Lenz
Luxury Connect - Dolly Lenz
 
Luxury Connect - Allan Weiss
Luxury Connect - Allan WeissLuxury Connect - Allan Weiss
Luxury Connect - Allan Weiss
 
Recognition Strategies: SEO + Content Marketing + Video: A Roadmap for Rapid ...
Recognition Strategies: SEO + Content Marketing + Video: A Roadmap for Rapid ...Recognition Strategies: SEO + Content Marketing + Video: A Roadmap for Rapid ...
Recognition Strategies: SEO + Content Marketing + Video: A Roadmap for Rapid ...
 
Power of the Peloton - Building Your "Pack" to Accelerate Performance - Ginge...
Power of the Peloton - Building Your "Pack" to Accelerate Performance - Ginge...Power of the Peloton - Building Your "Pack" to Accelerate Performance - Ginge...
Power of the Peloton - Building Your "Pack" to Accelerate Performance - Ginge...
 
The BIG Picture: Where does the market stand? Sarah Garrity
The BIG Picture: Where does the market stand? Sarah GarrityThe BIG Picture: Where does the market stand? Sarah Garrity
The BIG Picture: Where does the market stand? Sarah Garrity
 
API's - Successes to Replicate. Pitfalls to Avoid.
API's - Successes to Replicate. Pitfalls to Avoid.API's - Successes to Replicate. Pitfalls to Avoid.
API's - Successes to Replicate. Pitfalls to Avoid.
 
Creative Digital Relevance - Seth Price
Creative Digital Relevance - Seth PriceCreative Digital Relevance - Seth Price
Creative Digital Relevance - Seth Price
 
It's Broken. Let's Rework It. - Wendy Forsythe
It's Broken. Let's Rework It. - Wendy ForsytheIt's Broken. Let's Rework It. - Wendy Forsythe
It's Broken. Let's Rework It. - Wendy Forsythe
 
Blockchain Real Estate
Blockchain Real EstateBlockchain Real Estate
Blockchain Real Estate
 
Five Tried and True Ways to Increase Sales This Year - Ashton Gustafson
Five Tried and True Ways to Increase Sales This Year - Ashton GustafsonFive Tried and True Ways to Increase Sales This Year - Ashton Gustafson
Five Tried and True Ways to Increase Sales This Year - Ashton Gustafson
 
Stop Selling Like It's 1985 - Orlando Montiel
Stop Selling Like It's 1985 - Orlando MontielStop Selling Like It's 1985 - Orlando Montiel
Stop Selling Like It's 1985 - Orlando Montiel
 
How Zillow Group is Working With the Tech Community
How Zillow Group is Working With the Tech CommunityHow Zillow Group is Working With the Tech Community
How Zillow Group is Working With the Tech Community
 
DDOS ACTIONS AND THE INTERNET OF THINGS
DDOS ACTIONS AND THE INTERNET OF THINGSDDOS ACTIONS AND THE INTERNET OF THINGS
DDOS ACTIONS AND THE INTERNET OF THINGS
 
3 Sales Strategies to 3x Your Business - Jeff Lobb
3 Sales Strategies to 3x Your Business - Jeff Lobb3 Sales Strategies to 3x Your Business - Jeff Lobb
3 Sales Strategies to 3x Your Business - Jeff Lobb
 
Stop Ruining Your Reputation: The 15 Minute Digital Brand Detox - Laura Monroe
Stop Ruining Your Reputation: The 15 Minute Digital Brand Detox - Laura MonroeStop Ruining Your Reputation: The 15 Minute Digital Brand Detox - Laura Monroe
Stop Ruining Your Reputation: The 15 Minute Digital Brand Detox - Laura Monroe
 
Facebook Marketing Automation for Real Estate
Facebook Marketing Automation for Real EstateFacebook Marketing Automation for Real Estate
Facebook Marketing Automation for Real Estate
 
Machine Learning at Trulia
Machine Learning at TruliaMachine Learning at Trulia
Machine Learning at Trulia
 

Similar to Securing Real Estate Transactions through Threat Intelligence

Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
IRJET Journal
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
CBIZ, Inc.
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
SensePost
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Randall Chase
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Knowledge Group
 
Security & Privacy in Today's IT Environment
Security & Privacy in Today's IT EnvironmentSecurity & Privacy in Today's IT Environment
Security & Privacy in Today's IT Environment
TechSoup
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
AbdullaFatiya3
 
O365Engage17 - Protecting your Users Against Email Spoofing and Phishing
O365Engage17 - Protecting your Users Against Email Spoofing and PhishingO365Engage17 - Protecting your Users Against Email Spoofing and Phishing
O365Engage17 - Protecting your Users Against Email Spoofing and Phishing
NCCOMMS
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
amiable_indian
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
todd521
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
IRJET Journal
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
MariGogokhia
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
BakerTillyConsulting
 
Cb Threat Report
Cb Threat ReportCb Threat Report
Cb Threat Report
Andrew Cibotti
 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing Techniques
IRJET Journal
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
Ulf Mattsson
 

Similar to Securing Real Estate Transactions through Threat Intelligence (20)

Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Security & Privacy in Today's IT Environment
Security & Privacy in Today's IT EnvironmentSecurity & Privacy in Today's IT Environment
Security & Privacy in Today's IT Environment
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
O365Engage17 - Protecting your Users Against Email Spoofing and Phishing
O365Engage17 - Protecting your Users Against Email Spoofing and PhishingO365Engage17 - Protecting your Users Against Email Spoofing and Phishing
O365Engage17 - Protecting your Users Against Email Spoofing and Phishing
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Cb Threat Report
Cb Threat ReportCb Threat Report
Cb Threat Report
 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing Techniques
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 

More from Inman News

Talking Dollars and Cents: Agent Compensation
Talking Dollars and Cents: Agent CompensationTalking Dollars and Cents: Agent Compensation
Talking Dollars and Cents: Agent Compensation
Inman News
 
Zero Cost Strategies for Maximizing Facebook and Instagram
Zero Cost Strategies for Maximizing Facebook and InstagramZero Cost Strategies for Maximizing Facebook and Instagram
Zero Cost Strategies for Maximizing Facebook and Instagram
Inman News
 
Top 10 Non-Negotiable Fundamentals of A Successful Real Estate Agent
Top 10 Non-Negotiable Fundamentals of A Successful Real Estate AgentTop 10 Non-Negotiable Fundamentals of A Successful Real Estate Agent
Top 10 Non-Negotiable Fundamentals of A Successful Real Estate Agent
Inman News
 
Digging Deeper for an Authentic, Magnetic Brand
Digging Deeper for an Authentic, Magnetic BrandDigging Deeper for an Authentic, Magnetic Brand
Digging Deeper for an Authentic, Magnetic Brand
Inman News
 
FRANCHISE: Pro Tips on Media Relations to Drive Business Growth
FRANCHISE: Pro Tips on Media Relations to Drive Business Growth FRANCHISE: Pro Tips on Media Relations to Drive Business Growth
FRANCHISE: Pro Tips on Media Relations to Drive Business Growth
Inman News
 
More Than Just Likes: A Blueprint for Your Social Media Spend in the New Market
More Than Just Likes: A Blueprint for Your Social Media Spend in the New MarketMore Than Just Likes: A Blueprint for Your Social Media Spend in the New Market
More Than Just Likes: A Blueprint for Your Social Media Spend in the New Market
Inman News
 
Top 10 Trends Agents Need to Know in a Shifting Market
Top 10 Trends Agents Need to Know in a Shifting MarketTop 10 Trends Agents Need to Know in a Shifting Market
Top 10 Trends Agents Need to Know in a Shifting Market
Inman News
 
By the Numbers: The True Cost of Opening a Brokerage
By the Numbers: The True Cost of Opening a BrokerageBy the Numbers: The True Cost of Opening a Brokerage
By the Numbers: The True Cost of Opening a Brokerage
Inman News
 
Competing with the Big Dogs: Recruiting Practices for Small Indies
Competing with the Big Dogs: Recruiting Practices for Small IndiesCompeting with the Big Dogs: Recruiting Practices for Small Indies
Competing with the Big Dogs: Recruiting Practices for Small Indies
Inman News
 
How to Grow Your Agents’ Businesses by Over 300% Year One
How to Grow Your Agents’ Businesses by Over 300% Year OneHow to Grow Your Agents’ Businesses by Over 300% Year One
How to Grow Your Agents’ Businesses by Over 300% Year One
Inman News
 
8 marketing tools that won't break the budget
8 marketing tools that won't break the budget8 marketing tools that won't break the budget
8 marketing tools that won't break the budget
Inman News
 
Finding your sweet spot - building a brand that sticks
Finding your sweet spot - building a brand that sticksFinding your sweet spot - building a brand that sticks
Finding your sweet spot - building a brand that sticks
Inman News
 
Connect 10x10: The trends affecting your brokerage
Connect 10x10: The trends affecting your brokerageConnect 10x10: The trends affecting your brokerage
Connect 10x10: The trends affecting your brokerage
Inman News
 
David vs. Goliath: What is your slingshot?
David vs. Goliath: What is your slingshot?David vs. Goliath: What is your slingshot?
David vs. Goliath: What is your slingshot?
Inman News
 
10 Daily Habits That Will Take You from Rookie to Top Producer
10 Daily Habits That Will Take You from Rookie to Top Producer10 Daily Habits That Will Take You from Rookie to Top Producer
10 Daily Habits That Will Take You from Rookie to Top Producer
Inman News
 
Connect 10 X 10: Trends You Cannot Ignore
Connect 10 X 10: Trends You Cannot IgnoreConnect 10 X 10: Trends You Cannot Ignore
Connect 10 X 10: Trends You Cannot Ignore
Inman News
 
Success = Zooming Out and Reclaiming Your Life
Success = Zooming Out and Reclaiming Your LifeSuccess = Zooming Out and Reclaiming Your Life
Success = Zooming Out and Reclaiming Your Life
Inman News
 
Zero Cost Marketing Tactics With Big ROI.
Zero Cost Marketing Tactics With Big ROI. Zero Cost Marketing Tactics With Big ROI.
Zero Cost Marketing Tactics With Big ROI.
Inman News
 
10 Simple & Elegant Hacks
10 Simple & Elegant Hacks10 Simple & Elegant Hacks
10 Simple & Elegant Hacks
Inman News
 
Opendoor: Zain Memon at ICNY
Opendoor: Zain Memon at ICNYOpendoor: Zain Memon at ICNY
Opendoor: Zain Memon at ICNY
Inman News
 

More from Inman News (20)

Talking Dollars and Cents: Agent Compensation
Talking Dollars and Cents: Agent CompensationTalking Dollars and Cents: Agent Compensation
Talking Dollars and Cents: Agent Compensation
 
Zero Cost Strategies for Maximizing Facebook and Instagram
Zero Cost Strategies for Maximizing Facebook and InstagramZero Cost Strategies for Maximizing Facebook and Instagram
Zero Cost Strategies for Maximizing Facebook and Instagram
 
Top 10 Non-Negotiable Fundamentals of A Successful Real Estate Agent
Top 10 Non-Negotiable Fundamentals of A Successful Real Estate AgentTop 10 Non-Negotiable Fundamentals of A Successful Real Estate Agent
Top 10 Non-Negotiable Fundamentals of A Successful Real Estate Agent
 
Digging Deeper for an Authentic, Magnetic Brand
Digging Deeper for an Authentic, Magnetic BrandDigging Deeper for an Authentic, Magnetic Brand
Digging Deeper for an Authentic, Magnetic Brand
 
FRANCHISE: Pro Tips on Media Relations to Drive Business Growth
FRANCHISE: Pro Tips on Media Relations to Drive Business Growth FRANCHISE: Pro Tips on Media Relations to Drive Business Growth
FRANCHISE: Pro Tips on Media Relations to Drive Business Growth
 
More Than Just Likes: A Blueprint for Your Social Media Spend in the New Market
More Than Just Likes: A Blueprint for Your Social Media Spend in the New MarketMore Than Just Likes: A Blueprint for Your Social Media Spend in the New Market
More Than Just Likes: A Blueprint for Your Social Media Spend in the New Market
 
Top 10 Trends Agents Need to Know in a Shifting Market
Top 10 Trends Agents Need to Know in a Shifting MarketTop 10 Trends Agents Need to Know in a Shifting Market
Top 10 Trends Agents Need to Know in a Shifting Market
 
By the Numbers: The True Cost of Opening a Brokerage
By the Numbers: The True Cost of Opening a BrokerageBy the Numbers: The True Cost of Opening a Brokerage
By the Numbers: The True Cost of Opening a Brokerage
 
Competing with the Big Dogs: Recruiting Practices for Small Indies
Competing with the Big Dogs: Recruiting Practices for Small IndiesCompeting with the Big Dogs: Recruiting Practices for Small Indies
Competing with the Big Dogs: Recruiting Practices for Small Indies
 
How to Grow Your Agents’ Businesses by Over 300% Year One
How to Grow Your Agents’ Businesses by Over 300% Year OneHow to Grow Your Agents’ Businesses by Over 300% Year One
How to Grow Your Agents’ Businesses by Over 300% Year One
 
8 marketing tools that won't break the budget
8 marketing tools that won't break the budget8 marketing tools that won't break the budget
8 marketing tools that won't break the budget
 
Finding your sweet spot - building a brand that sticks
Finding your sweet spot - building a brand that sticksFinding your sweet spot - building a brand that sticks
Finding your sweet spot - building a brand that sticks
 
Connect 10x10: The trends affecting your brokerage
Connect 10x10: The trends affecting your brokerageConnect 10x10: The trends affecting your brokerage
Connect 10x10: The trends affecting your brokerage
 
David vs. Goliath: What is your slingshot?
David vs. Goliath: What is your slingshot?David vs. Goliath: What is your slingshot?
David vs. Goliath: What is your slingshot?
 
10 Daily Habits That Will Take You from Rookie to Top Producer
10 Daily Habits That Will Take You from Rookie to Top Producer10 Daily Habits That Will Take You from Rookie to Top Producer
10 Daily Habits That Will Take You from Rookie to Top Producer
 
Connect 10 X 10: Trends You Cannot Ignore
Connect 10 X 10: Trends You Cannot IgnoreConnect 10 X 10: Trends You Cannot Ignore
Connect 10 X 10: Trends You Cannot Ignore
 
Success = Zooming Out and Reclaiming Your Life
Success = Zooming Out and Reclaiming Your LifeSuccess = Zooming Out and Reclaiming Your Life
Success = Zooming Out and Reclaiming Your Life
 
Zero Cost Marketing Tactics With Big ROI.
Zero Cost Marketing Tactics With Big ROI. Zero Cost Marketing Tactics With Big ROI.
Zero Cost Marketing Tactics With Big ROI.
 
10 Simple & Elegant Hacks
10 Simple & Elegant Hacks10 Simple & Elegant Hacks
10 Simple & Elegant Hacks
 
Opendoor: Zain Memon at ICNY
Opendoor: Zain Memon at ICNYOpendoor: Zain Memon at ICNY
Opendoor: Zain Memon at ICNY
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Securing Real Estate Transactions through Threat Intelligence

  • 1. Inman Connect: Securing Real Estate Transactions through Threat Intelligence Thomas Kinsella Senior Manager, Cyber Intelligence & Investigations
  • 2. 2 2,260 confirmed data breaches in 2016 2.2 Billion compromised records The forecasted average loss for a breach of 1,000 records is between $52,000 and $87,000 Customers, especially businesses, are using security as a discriminator The Real Estate Industry is a target! Why Are You Here? Why Am I Here?
  • 4. 4
  • 6. 6 Future Business Email Compromise (BEC) Ecosystem BEC Infrastructure Phishing Interception Mule Management Money Transfer Malware Mule Pickups Exchange (e.g. BTC) Laundering Escrow Services WFH Recruitment Communication Cashout Services Target Email List Send Phish Check Phished Creds Detect Transactions Phishing Pages New Domains Hacked Websites Bulletproof Hosts Create Inbox Rules Design Invoices Communicate w/ Buyers & Sellers Design Exploit Kit Coding Injections Crypting Services AV Checking
  • 8. 8
  • 10. 10 Key Actions! This Week: Network – Leverage industry knowledge to find out what companies are doing about this issue This Quarter: Educate – Train staff to detect and report phishing and social engineering attempts Use Strong Authentication – Utilize 2-Factor Authentication, Password Managers; monitor for corporate emails in third-party data breaches This Year: Create Threat Intelligence – Create a program to receive (and share) known Indicators of Compromise (IOCs) Hunt – Begin actively searching for known tactics, techniques and procedures in your environment

Editor's Notes

  1. Opening Joke I’m Thomas Kinsella, I’m here to talk about Security.
  2. 2,260 reported in the Verizon Data Breach Investigation Report. 2.2 bn per haveibeenpwned. if you’ve been following the news over the last twelve months you cannot have escaped cybercrime headlines. From the DNC hack dominating the American election and headlines since, to San Francisco BART, DDoS Attacks taking down the internet, to the largest Data Breaches in history at LinkedIn, Yahoo, MySpace etc. to 80 million dollars stolen from a Bangladeshi bank… And the real estate industry has been targeted too. Fraudsters are after the money involved in real estate transactions – buyer’s deposits, rent deposits, balance transfers.The FTC, FBI have issued warnings about attacks specifically targeting the Real Estate industry, and it’s been covered in NYT, WSJ, FT, USA Today, CNN, MSNBC etc. There are lots of ways to attack of course – malware, DDoS, ransomware, and what I’m going to be talking to you about today is one of the ways you can keep yourself safe – by sharing information with each other about these attacks.
  3. This is what a sample of what a phishing email looks like, I’m using a DocuSign phishing email, but there are lots of brands impersonated. You can see the “Review Document” link actually brings you to a different site – gaanano1.com, and not DocuSign.net. It was also sent from “senacaprop.com”. And is very clearly about a real estate transaction. And this is an example of a phishing page – note that not all DocuSign phishing messages bring you to a DocuSign themed phishing page! If you received this message, I’d hope you’d notice it was fake, however because it was just created, there’s very little you can do to protect yourself or your employees proactively against it. That’s why later on I’m going to be talking about Threat Intelligence – information in near real-time about these phishing pages.
  4. Once a fraudster has compromised an email account of a real estate agent they’ll perform this switch. The money is what they are after. They’ll impersonate the real estate agent and send an email to the buyer with different instructions. So, for example, if they’re supposed to send the money to an attorney’s Bank of America account, they’ll actually get them to wire the money to a Citibank under their control. Immediately after the money is transferred they’ll transfer it to another account outside the country, and then another account outside the country. The buyer will almost always not know about it until it’s too late. Once the fraudsters are in your email, stopping the scam is very difficult, however reporting to law enforcement and your bank immediately may mean the victims will get some of the money back. FBI Warns of Dramatic Increase in Business E-Mail Compromise Scams - https://www.fbi.gov/contact-us/field-offices/boston/news/press-releases/fbi-warns-of-dramatic-increase-in-business-e-mail-compromise-scams
  5. Already in real estate this is no longer one person in a bedroom or in an internet café in Nigeria. It’s not, and it’s only going to get more sophisticated. The above image shows the general cybercrime infrastructure for a banking trojan - it’s sophisticated, but so are the people targeting Real Estate. For just one victim you need someone to create a phishing email, create a phishing page, generate a list of targets, check the emails that were phished. That’s not all the same person. You need a bank account, and usually that’s a money mule recruited from a work from home scam, so you need someone creating the WFH accounts, talking to mules, managing their recruitment. You then need a network of other bank accounts across the world, and a way to launder the money at home. This is a serious crime. And with hundreds of thousands at stake from each victim it’s no wonder groups are now professional.
  6. So how can you stop this – by helping each other using Threat Intelligence. What is threat intelligence? It’s timely and actionable information about threats and it usually comes in the form of what’s known as indicators of compromse – md5s, urls, ips, domains. An example of a really good indicator of compromise, an excellent piece of threat intelligence, would be a phishing email your organization received earlier today. Today if one of your employees received an email with a link to realestate_login.com, that’s an incredibly useful piece of intelligence. Why? Because it’s a) definitely bad B) actionable and c) timely. What would you do? You’d ask the employee if they clicked it! And if they had, you’d change their password. Then you’d check if someone else in your organisation received it. And then you’d check if someone else clicked it. You might even check if someone else visited the same IP address through your logs. Now threat intelligence can come in many forms. You can get threat intelligence in the form of TOR exit node IP addresses. That’s useful… in some circumstances. If you want to find if someone is using Tor on a computer, for example. It’s not useful for detecting, e.g. a Russian government spy ring in your network.    Another example of that would be a phish hosted on dropbox.com – yes, that’s very useful intelligence if you’re searching for URLs, but it’s reallynot useful if you’re searching for domains… and that matters. Sharing Threat Intelligence is what I want to promote here today.  
  7. Facebook Threat Exchange is an example of a threat intelligence program – 250 customers have signed up, it’s incredibly easy, and you’ll instantly start being able to receive, or search for, other “indicators of compromise”. DocuSign share inidicators of compromise with everyone else using this platform. Every single time we receive a phishing message reported to spam@docusign.com we analyze the page, and if we detect it as malicious we’ll share it with Facebook Threat Exchange – and with you, the wider industry. We’ll also send it for takedown, and share it with Google Safe Browsing, Microsoft, AntiVirus companies etc. What this means is that if someone from Century 21 receives a phishing message and reports it to spam@docusign.com, within a short period of time, usually below 30 minutes, we can confirm that it’s malicious, and as soon as we have we’ll share that information with anyone in Facebook Threat Exchange. You can then use that information to scan your own logs to see if anyone clicked the link. If you received a phishing message and you know it’s malicious, we’d encourage you to share your information too – then you can keep your peers, all your colleagues in this room, safe too. Similarly with malware targeting DocuSign users, we send the hash to Threat Exchange. This also works, obviously, even if you’re not a real estate agent – if you develop websites, offer a system to communicate between sellers and buyers. If you list properties. Obviously the ones we’re seeing are pretty specific, but it’s effective. If you’re marketing products then every single one of your customers is going to be targeted, maybe using your brand. If you use Carbon Black as your endpoint protection, for example, you may even be getting alerts already from us! If you think DocuSign information is useful you can just receive ours, or else you can opt to receive information from Facebook, DropBox, Yahoo, Tumblr, Pinterest and hundreds of other companies. Not only that, you should be alerting users as soon as you detect this. Furthermore, you should be telling people if they log in from their phone in New York and 15 mintues later in Seattle, asking them what’s going on!
  8. Haveibeenpwned.com
  9. Announcing