SlideShare a Scribd company logo
1 of 18
State of the Phish:
What You Should Know About
Trends, Training, and Results
Don’t just check the box. Move the needle.
© Copyright ThreatSim 2015, All rights reserved. 2
2015 State of the Phish Report
© Copyright ThreatSim 2015, All rights reserved.
The slide where I talk about myself
Trevor Hawthorn, CTO and co-founder at ThreatSim (Reston, VA USA)
Previous: Stratum Security, Cybertrust/TruSecure/Verizon Business, UUNET,
Earthlink
Technical hands-on security work for 18 years
Incident response, Former QSA, Network and App Pen-tester…
© Copyright ThreatSim 2015, All rights reserved. 4
Verizon Data Breach Report: Impact of Phishing on Businesses
© Copyright ThreatSim 2015, All rights reserved.
Industry Survey: Are you being phished, increasingly?
Yes
No
Increasing
Staying about
the same as
years past
Decreasing
Have you experienced a phishing attack in the last calendar year?
Is the rate of phishing attacks against your
organization increasing?
© Copyright ThreatSim 2015, All rights reserved.
Industry Survey: How are you impacted?
What, if any, of the following impacted your organization?
Loss of data
Compromised
accounts
Malware infections
Other
© Copyright ThreatSim 2015, All rights reserved. 7
Why do you have to do something about it?
“Consumerization” of IT –
Thanks a lot, Apple.
Consumers-like services in the
enterprise.
Next generation of workforce
will expect always-on, always-
connected, ability to share, and
collaborate. It’s like they hate
security or something.
Increasing reliance on users to
make good security decisions.
You’re not always going to be
there for them.
Integration of user behavior
analysis with other “security
stuff” (e.g. threat intel feeds)
Fig 1: Security professional in the wild
© Copyright ThreatSim 2015, All rights reserved. 8
2015 SotP Data: Open Rate vs. Click Rate 2013-2014
© Copyright ThreatSim 2015, All rights reserved. 9
2015 SotP Data: Decreasing Click Rates Over Time
© Copyright ThreatSim 2015, All rights reserved.
Industry Survey: Reduction in Click Rates Through Training
What percentage reduction have you achieved?
76-100%
26-50%
51-75%
Unsure/Still testing
© Copyright ThreatSim 2015, All rights reserved. 11
2015 SotP Data: Measurable Phishing Risk Reduction
© Copyright ThreatSim 2015, All rights reserved. 1
2
2015 SotP Data: Sharpening the Spear
© Copyright ThreatSim 2015, All rights reserved. 13
Email received First click
2015 SotP Data: Median time to first click, all campaigns
82 secs
© Copyright ThreatSim 2015, All rights reserved. 14
2015 SotP Data: Which phishing email types get the most clicks?
© Copyright ThreatSim 2015, All rights reserved. 15
2015 SotP Data: Mobile click rates, iOS vs. Android
© Copyright ThreatSim 2015, All rights reserved.
Industry Survey: What Your Peers are Doing
Which of the following activities are used in training your end users on how to
identify and avoid phishing messages, in addition to phishing simulation exercises?
© Copyright ThreatSim 2015, All rights reserved. 17
Self-Serving Slide: Why quick simulation training works
“Train as you fight"
The training is delivered seconds after the user performs the
action you wish to correct
It’s quick (on average 0:43 seconds)
It allows you to persist your message over time (monthly, etc.)
Bite-sized training content (get to the point)
Security awareness training is marketing — drive the target to a
specific behavior or action
IT’S MEASURABLE. METRICS EVERYONE! METRIIICCSSS!!
Connect with us
13800 Coppermine Rd.
Suite 302
Herndon, VA 20171
888-687-1337
info@threatsim.com
http://threatsim.com
info@threatsim.com
threatsim.com/demo
@threatsim
Q&A / Discussion
View the recorded
webinar here:
http://bit.ly/1K84eyf

More Related Content

What's hot

7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boardsPaul McGillicuddy
 
Cybersecurity Toolkit
Cybersecurity ToolkitCybersecurity Toolkit
Cybersecurity ToolkitClaranet UK
 
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015TierPoint
 
What Does a Data Breach Cost?
What Does a Data Breach Cost?What Does a Data Breach Cost?
What Does a Data Breach Cost?CBT Nuggets
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
STUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSTUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSymantec
 
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk AwarenessNFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk AwarenessCitrin Cooperman
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...Citrin Cooperman
 
Best of Both Worlds: Correlating Static and Dynamic Analysis Results
Best of Both Worlds: Correlating Static and Dynamic Analysis ResultsBest of Both Worlds: Correlating Static and Dynamic Analysis Results
Best of Both Worlds: Correlating Static and Dynamic Analysis ResultsJeremiah Grossman
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
How secure is your enterprise from threats?
How secure is your enterprise from threats? How secure is your enterprise from threats?
How secure is your enterprise from threats? IBM Analytics
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakesmxotech
 
2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&ANick Normile
 
Tackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementCharles Steve
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Citrin Cooperman
 
Survey: Business Impact of IT Incident Communications
Survey: Business Impact of IT Incident CommunicationsSurvey: Business Impact of IT Incident Communications
Survey: Business Impact of IT Incident CommunicationsxMatters Inc
 

What's hot (20)

7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
Productivity 3.0
Productivity 3.0Productivity 3.0
Productivity 3.0
 
Cybersecurity Toolkit
Cybersecurity ToolkitCybersecurity Toolkit
Cybersecurity Toolkit
 
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015
 
What Does a Data Breach Cost?
What Does a Data Breach Cost?What Does a Data Breach Cost?
What Does a Data Breach Cost?
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
STUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSTUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability Assessment
 
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk AwarenessNFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cyber-attacks
 
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
 
Best of Both Worlds: Correlating Static and Dynamic Analysis Results
Best of Both Worlds: Correlating Static and Dynamic Analysis ResultsBest of Both Worlds: Correlating Static and Dynamic Analysis Results
Best of Both Worlds: Correlating Static and Dynamic Analysis Results
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
How secure is your enterprise from threats?
How secure is your enterprise from threats? How secure is your enterprise from threats?
How secure is your enterprise from threats?
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakes
 
2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A
 
Tackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-management
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
 
Survey: Business Impact of IT Incident Communications
Survey: Business Impact of IT Incident CommunicationsSurvey: Business Impact of IT Incident Communications
Survey: Business Impact of IT Incident Communications
 
The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses
 

Viewers also liked

Practical Phishing Automation with PhishLulz - KiwiCon X
Practical Phishing Automation with PhishLulz - KiwiCon XPractical Phishing Automation with PhishLulz - KiwiCon X
Practical Phishing Automation with PhishLulz - KiwiCon XMichele Orru
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacksSreejith.D. Menon
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private CloudVertical Solutions
 
Getting started with performance testing
Getting started with performance testingGetting started with performance testing
Getting started with performance testingTestplant
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterTegile Systems
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Technology
 
5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro AreaSims Recycling Solutions
 
Pramata Tech Dinosaurs ePaper - Social Sharing
Pramata Tech Dinosaurs ePaper - Social SharingPramata Tech Dinosaurs ePaper - Social Sharing
Pramata Tech Dinosaurs ePaper - Social SharingTidemark Systems Inc.
 
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮NSFOCUS
 
Wedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDaysWedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDaysPanos Kontopoulos
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITSymplified
 
Visual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEVisual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEStefanini
 

Viewers also liked (17)

Practical Phishing Automation with PhishLulz - KiwiCon X
Practical Phishing Automation with PhishLulz - KiwiCon XPractical Phishing Automation with PhishLulz - KiwiCon X
Practical Phishing Automation with PhishLulz - KiwiCon X
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
TXT Next Presentation
TXT Next Presentation TXT Next Presentation
TXT Next Presentation
 
Dr Ravi Gupta
Dr Ravi GuptaDr Ravi Gupta
Dr Ravi Gupta
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private Cloud
 
Getting started with performance testing
Getting started with performance testingGetting started with performance testing
Getting started with performance testing
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenter
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visuales
 
5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area
 
Pramata Tech Dinosaurs ePaper - Social Sharing
Pramata Tech Dinosaurs ePaper - Social SharingPramata Tech Dinosaurs ePaper - Social Sharing
Pramata Tech Dinosaurs ePaper - Social Sharing
 
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
 
Perceptive Software Scope
Perceptive Software ScopePerceptive Software Scope
Perceptive Software Scope
 
Wedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDaysWedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDays
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & IT
 
Visual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEVisual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDE
 
Top 10 Business Continuity Disasters
Top 10 Business Continuity DisastersTop 10 Business Continuity Disasters
Top 10 Business Continuity Disasters
 

Similar to State of the Phish Webinar 2015

The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On SteroidsThe State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On SteroidsImperva
 
Integrating Marketing Session - Charlotte AMA Spring Workshop
Integrating Marketing Session - Charlotte AMA Spring WorkshopIntegrating Marketing Session - Charlotte AMA Spring Workshop
Integrating Marketing Session - Charlotte AMA Spring WorkshopJon Barlow
 
2015 Minneapolis, Mn - Fall AMA Workshops
2015 Minneapolis, Mn - Fall AMA Workshops2015 Minneapolis, Mn - Fall AMA Workshops
2015 Minneapolis, Mn - Fall AMA WorkshopsJon Barlow
 
Minneapolis, Mn - AMA Fall Workshops 2015
Minneapolis, Mn - AMA Fall Workshops 2015Minneapolis, Mn - AMA Fall Workshops 2015
Minneapolis, Mn - AMA Fall Workshops 2015Jon Barlow
 
Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseAaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & Defensecentralohioissa
 
Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseAaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseJason Luttrell, CISSP, CISM
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Craig Taggart MBA
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...Craig Taggart
 
Marketing Decision Makers: Stop Thinking Tactics, Start Thinking Campaigns - ...
Marketing Decision Makers: Stop Thinking Tactics, Start Thinking Campaigns - ...Marketing Decision Makers: Stop Thinking Tactics, Start Thinking Campaigns - ...
Marketing Decision Makers: Stop Thinking Tactics, Start Thinking Campaigns - ...Jon Barlow
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Enterprise Management Associates
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityGlobal Knowledge Training
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
 
[Slides] #netvu15 Marketing Automation in 2015
[Slides] #netvu15 Marketing Automation in 2015[Slides] #netvu15 Marketing Automation in 2015
[Slides] #netvu15 Marketing Automation in 2015Michael Jans Advisory
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupLaurent Pacalin
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Peter1020
 
Take Insurance Loyalty to Next Level Epsilon_Forrester
Take Insurance Loyalty to Next Level Epsilon_ForresterTake Insurance Loyalty to Next Level Epsilon_Forrester
Take Insurance Loyalty to Next Level Epsilon_ForresterDave Edington
 
2015-advanced-persistent-threat-awareness_whp_eng_1015
2015-advanced-persistent-threat-awareness_whp_eng_10152015-advanced-persistent-threat-awareness_whp_eng_1015
2015-advanced-persistent-threat-awareness_whp_eng_1015Robin "Montana" Williams
 

Similar to State of the Phish Webinar 2015 (20)

The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On SteroidsThe State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
 
Integrating Marketing Session - Charlotte AMA Spring Workshop
Integrating Marketing Session - Charlotte AMA Spring WorkshopIntegrating Marketing Session - Charlotte AMA Spring Workshop
Integrating Marketing Session - Charlotte AMA Spring Workshop
 
2015 Minneapolis, Mn - Fall AMA Workshops
2015 Minneapolis, Mn - Fall AMA Workshops2015 Minneapolis, Mn - Fall AMA Workshops
2015 Minneapolis, Mn - Fall AMA Workshops
 
Minneapolis, Mn - AMA Fall Workshops 2015
Minneapolis, Mn - AMA Fall Workshops 2015Minneapolis, Mn - AMA Fall Workshops 2015
Minneapolis, Mn - AMA Fall Workshops 2015
 
Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseAaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & Defense
 
Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseAaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & Defense
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
 
Marketing Decision Makers: Stop Thinking Tactics, Start Thinking Campaigns - ...
Marketing Decision Makers: Stop Thinking Tactics, Start Thinking Campaigns - ...Marketing Decision Makers: Stop Thinking Tactics, Start Thinking Campaigns - ...
Marketing Decision Makers: Stop Thinking Tactics, Start Thinking Campaigns - ...
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
[Slides] #netvu15 Marketing Automation in 2015
[Slides] #netvu15 Marketing Automation in 2015[Slides] #netvu15 Marketing Automation in 2015
[Slides] #netvu15 Marketing Automation in 2015
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite Group
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
 
Take Insurance Loyalty to Next Level Epsilon_Forrester
Take Insurance Loyalty to Next Level Epsilon_ForresterTake Insurance Loyalty to Next Level Epsilon_Forrester
Take Insurance Loyalty to Next Level Epsilon_Forrester
 
2015-advanced-persistent-threat-awareness_whp_eng_1015
2015-advanced-persistent-threat-awareness_whp_eng_10152015-advanced-persistent-threat-awareness_whp_eng_1015
2015-advanced-persistent-threat-awareness_whp_eng_1015
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

State of the Phish Webinar 2015

  • 1. State of the Phish: What You Should Know About Trends, Training, and Results Don’t just check the box. Move the needle.
  • 2. © Copyright ThreatSim 2015, All rights reserved. 2 2015 State of the Phish Report
  • 3. © Copyright ThreatSim 2015, All rights reserved. The slide where I talk about myself Trevor Hawthorn, CTO and co-founder at ThreatSim (Reston, VA USA) Previous: Stratum Security, Cybertrust/TruSecure/Verizon Business, UUNET, Earthlink Technical hands-on security work for 18 years Incident response, Former QSA, Network and App Pen-tester…
  • 4. © Copyright ThreatSim 2015, All rights reserved. 4 Verizon Data Breach Report: Impact of Phishing on Businesses
  • 5. © Copyright ThreatSim 2015, All rights reserved. Industry Survey: Are you being phished, increasingly? Yes No Increasing Staying about the same as years past Decreasing Have you experienced a phishing attack in the last calendar year? Is the rate of phishing attacks against your organization increasing?
  • 6. © Copyright ThreatSim 2015, All rights reserved. Industry Survey: How are you impacted? What, if any, of the following impacted your organization? Loss of data Compromised accounts Malware infections Other
  • 7. © Copyright ThreatSim 2015, All rights reserved. 7 Why do you have to do something about it? “Consumerization” of IT – Thanks a lot, Apple. Consumers-like services in the enterprise. Next generation of workforce will expect always-on, always- connected, ability to share, and collaborate. It’s like they hate security or something. Increasing reliance on users to make good security decisions. You’re not always going to be there for them. Integration of user behavior analysis with other “security stuff” (e.g. threat intel feeds) Fig 1: Security professional in the wild
  • 8. © Copyright ThreatSim 2015, All rights reserved. 8 2015 SotP Data: Open Rate vs. Click Rate 2013-2014
  • 9. © Copyright ThreatSim 2015, All rights reserved. 9 2015 SotP Data: Decreasing Click Rates Over Time
  • 10. © Copyright ThreatSim 2015, All rights reserved. Industry Survey: Reduction in Click Rates Through Training What percentage reduction have you achieved? 76-100% 26-50% 51-75% Unsure/Still testing
  • 11. © Copyright ThreatSim 2015, All rights reserved. 11 2015 SotP Data: Measurable Phishing Risk Reduction
  • 12. © Copyright ThreatSim 2015, All rights reserved. 1 2 2015 SotP Data: Sharpening the Spear
  • 13. © Copyright ThreatSim 2015, All rights reserved. 13 Email received First click 2015 SotP Data: Median time to first click, all campaigns 82 secs
  • 14. © Copyright ThreatSim 2015, All rights reserved. 14 2015 SotP Data: Which phishing email types get the most clicks?
  • 15. © Copyright ThreatSim 2015, All rights reserved. 15 2015 SotP Data: Mobile click rates, iOS vs. Android
  • 16. © Copyright ThreatSim 2015, All rights reserved. Industry Survey: What Your Peers are Doing Which of the following activities are used in training your end users on how to identify and avoid phishing messages, in addition to phishing simulation exercises?
  • 17. © Copyright ThreatSim 2015, All rights reserved. 17 Self-Serving Slide: Why quick simulation training works “Train as you fight" The training is delivered seconds after the user performs the action you wish to correct It’s quick (on average 0:43 seconds) It allows you to persist your message over time (monthly, etc.) Bite-sized training content (get to the point) Security awareness training is marketing — drive the target to a specific behavior or action IT’S MEASURABLE. METRICS EVERYONE! METRIIICCSSS!!
  • 18. Connect with us 13800 Coppermine Rd. Suite 302 Herndon, VA 20171 888-687-1337 info@threatsim.com http://threatsim.com info@threatsim.com threatsim.com/demo @threatsim Q&A / Discussion View the recorded webinar here: http://bit.ly/1K84eyf

Editor's Notes

  1. NOTE: use the Ron Burgundy picture --- lightens the mood early and infuses some humor -- it’s also just a more interesting slide to look at Talk about – before I did TS I was doing Pen-testing. Noticed that users still fell for phishing. I’ve had a very technical background. Found that this type of training works.
  2. This is the high level problem. Starting high level. Phishing is still a big problem. Not going to waste your time.
  3. Talk about hidden costs Say “you, you guys, etc.” make it about the attendees
  4. It only takes one click. Eye-rolling objections. Why should I even try? “Moving the football down the field”. Demonstrable reduction of end user risk. Remove “Focus” point – trim this down
  5. Make sure we qual this data - 23% open of ALL customers of ALL maturity levels.
  6. 11% - After several months we see a nice reduction in training
  7. Need to call out the key results ---- “Nearly 20% of respondents were able to reduce click rates by 76-100%; 14% reduced by over 50%” --- dynamic training works
  8. Consistent year-to-year finding --- the frequency of training has a direct & positive impact on reducing click rates and increasing end users’ skill at identifying phishing messages. In 2014: Quarterly = 15-18% Bi-Monthly = 12-15% Monthly = 4-9% **most customers had only been using TS for 1-2 years at that time. Current data includes a significant number of customers in their 3rd year.
  9. Differentiate Phishing vs. Spear Phishing – If the attacker is willing to take the time to target specific people – they are highly motivated and not a garden variety attacker. Note: take some time to highlight spear phishing as the real threat… It really pays to focus on spear phishing training --- and what we mean by that is using more customized messages with your end users, as well as very targeted simulations against high-risk segments (executives, finance, sys admins) 92% of all targeted attacks start with spear phishing ----- Sony, RSA, White House, etc… (update with other breaches) How do you avoid the bear? Run faster than the next guy. Training end users about spear phishing is just another layer in your defense in depth program that raises the cost of attack and hopefully motivates the hacker to move onto easier targets.
  10. Interesting info to IR team Substantiates why we need employees as part of the solution
  11. Just do top 3 Make sure it’s clear that these are click rates Say “phishing message content” or “phishing emails”
  12. We saw a HUGE increase in mobile activity 405% iOS growth 927% for Android growth
  13. Talk about stats, talk about why this isn’t enough – “Train like you fight”. Persist the message over time – changes user behavior over time.
  14. Offer a demo