SlideShare a Scribd company logo
Using Return Path Data to Protect Your Brand
Security Breakout Session
Brian Westnedge, Sr. Director of Client Services
Agenda
•  Email fraud trends and impact
•  The power of data: email threat intelligence
•  The Return Path Data Cloud
•  Tactics used by cybercriminals today
•  Unite against email fraud: tips for defending your customers, brand, and
bottom line
•  Questions
Email Fraud Trends
& Impact
Email Delivers Business Value…
Increases
Customer Loyalty
Boosts
Revenue
Reduces
Operating Costs
…But Its Impact Is Being Eroded
5 out of 6 big
companies
are targeted with
phishing attacks
Phishing costs brands
worldwide $4.5 billion
each year
RSA identifies
a phishing attack
every minute
Email fraud has
up to a 45%
conversion rate
Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm
$4.5 B 1 MIN 5/6 45%
Phishing Leads To – Revenue Losses
•  Reduced trust in brand:
•  Subscribers don’t know what to trust
•  Reduced effectiveness of email
•  ISPs don’t know what to trust
Customers are 42% less likely to
interact with a brand after being
phished or spoofed.
Phishing Leads To – Unwanted Media Attention
“If you boil the jobs down of IT security
professionals, they are ultimately tasked with
protecting the brand… If you have a breach,
research suggests that 60% of your customers will
think about moving and 30% actually do.”
Bryan Littlefair
Global Chief Information Security Officer
Aviva
Phishing Leads To – Remediation Costs
Fraud Losses Malware Infection Investigation Remediation
Can You Spot a
Spoof?
Anatomy Of A
Phishing Email
to: You <you@yourdomain.com>
from: Phishing Company <phishingcompany@spoof.com>
subject: Unauthorized login attempt
Dear Customer,
We have recieved noticed that you have recently
attempted to login to your account from an unauthorized
device.
As a saftey measure, please visit the link below to
update your login details now:
http://www.phishingemail.com/updatedetails.asp
Once you have updated your details your account will be
secure from further unauthorized login attempts.
Thanks,
The Phishing Team
1 attachment
Making an email
look legitimate by
spoofing the
company name in
the “Display Name”
field.
Tricking email
servers into
delivering the email
to the inbox by
spoofing the
“envelope from”
address hidden in
the technical header
of the email.
Including logos,
company terms,
and urgent
language in the body
of the email.
Making an email
appear to come from
a brand by using a
legitimate company
domain, or a domain
that looks like it in
the “from” field.
Creating convincing
subject lines to drive
recipients to open
the message.
Including links to
malicious websites
that prompt users to
give up
credentials
Including
attachments
containing malicious
content.
From: service@paypal.com <paypal@service.com>
From: PayPal <paypal@e.paypal.co.uk>
The Power of the
Right Data
Knowledge Is Your Best Defense
•  We know there is no silver bullet.
•  But defense starts with understanding.
•  Data is the key to that understanding.
Breadth, Depth, and Speed
Contactually Molto ParibusGetAirHelp
Message Finder UnsubscriberOrganizer
EMAIL THREAT
DATA
· Consumer inbox data
· Email delivery data
· Authentication results
· Message level data
· SPAM trap & complaints data
EMAIL THREAT
INTELLIGENCE
· Domain-spoofing alerts
· Brand-spoofing intelligence
· Suspicious activity map
· Fraudcaster URL feed
· Sender Score: IP reputation
Email Fraud: Primary Attack Vectors
Domain Spoofing
(from domains owned by the brand)
Brand Spoofing
(from domains outside the brand’s control)
phish@company.com company@phish.com
30% of Attacks Spoof Domains You Own
30% Domain
Spoofing
•  Active Emailing Domains
•  Non-Sending Domains
•  Defensively-Registered
Domains
70% Brand
Spoofing
•  Cousin Domains
•  Display Name Spoofing
•  Subject Line Spoofing
•  Email Account Spoofing
Source: Return Path / APWG White Paper, 2014
Unite Against
Email Fraud
Tips for defending your customers, your brand, and
your bottom line.
Leading Companies Fighting Email Fraud
DMARC (Domain-based Message Authentication Reporting &
Conformance):
•  Technical specification created to help reduce the potential for email-
based abuse (www.dmarc.org)
•  Prevents domain-based spoofing by blocking fraudulent activity
appearing to come from domains under your control
•  Provides threat reporting mechanism (aggregate and forensic data)
#1: Authenticate Your Email
“Simply put, the DMARC standard works.
In a blended approach to fight email fraud, DMARC
represents the cornerstone of technical controls
that commercial senders can implement today to
rebuild trust and retake the email channel for
legitimate brands and consumers.”
Edward Tucker
Head of Cyber Security
Her Majesty’s Revenue & Customs
•  Addressing the 70% of email attacks that spoof your brand using
domains your company does not own requires email threat
intelligence.
•  Get visibility into all types of email threats targeting you today.
#2: Leverage Email Threat Intelligence
•  The reality is, some attacks are always going to get through.
•  The more prepared your customers are, the better.
•  Create an educational website
•  Include anti-fraud language within your legitimate email
•  In the event of an attack, warn your customers immediately
#3: Educate Your Customers
•  Engage with Brand Protection teams to make the business case.
•  Create a sense of urgency.
•  Communicate the risks that result from not taking action:
•  Email fraud destroys brand reputation and erodes customer loyalty
•  Email fraud thwarts email marketing effectiveness
•  Email fraud negatively impacts revenue
#4: Raise Awareness with Top Executives
Learn More
www.returnpath.com/StopEmailFraud
Twitter: @StopEmailFraud
New: Download the Email Threat
Intelligence report at
bit.ly/EmailThreatIntel

More Related Content

What's hot

Their Inbox, Your Responsibility
Their Inbox, Your ResponsibilityTheir Inbox, Your Responsibility
Their Inbox, Your Responsibility
Net Atlantic
 
Email marketing
Email marketingEmail marketing
Email marketing
Rishab Gupta
 
TOP 5 EMAIL MARKETING MISTAKES
TOP 5 EMAIL MARKETING MISTAKES TOP 5 EMAIL MARKETING MISTAKES
TOP 5 EMAIL MARKETING MISTAKES
Tinuiti
 
Vision 6 David Smerdon Evolve Your Email Marketing
Vision 6 David Smerdon Evolve Your Email MarketingVision 6 David Smerdon Evolve Your Email Marketing
Vision 6 David Smerdon Evolve Your Email Marketingdavidsmerdon
 
Email marketing 101
Email marketing 101Email marketing 101
Email marketing 101
Rethink Marketing
 
Building a World Class Email Preference Centre
Building a World Class Email Preference CentreBuilding a World Class Email Preference Centre
Building a World Class Email Preference CentreSilverpop
 
Email Marketing and MailChimp
Email Marketing and MailChimpEmail Marketing and MailChimp
Email Marketing and MailChimp
Mickey Mellen
 
Key Email Marketing Actions 2010
Key Email Marketing Actions 2010Key Email Marketing Actions 2010
Key Email Marketing Actions 2010
Silverpop
 
Perfect Your Email Marketing
Perfect Your Email MarketingPerfect Your Email Marketing
Perfect Your Email Marketing
Net Atlantic
 
Welcome Email Best Practices Silverpop
Welcome Email Best Practices SilverpopWelcome Email Best Practices Silverpop
Welcome Email Best Practices Silverpop
Silverpop
 
Aloha Welcome Email & Unsubscribe Best Practices
Aloha Welcome Email & Unsubscribe Best PracticesAloha Welcome Email & Unsubscribe Best Practices
Aloha Welcome Email & Unsubscribe Best Practices
Silverpop
 
Busting out of the junk folder: Dale Langley
Busting out of the junk folder: Dale LangleyBusting out of the junk folder: Dale Langley
Busting out of the junk folder: Dale Langley
Adestra
 
Return Path World Tour Keynote - San Francisco
Return Path World Tour Keynote - San FranciscoReturn Path World Tour Keynote - San Francisco
Return Path World Tour Keynote - San Francisco
Return Path
 
eDataSource Sponsored Lunch Presentation
eDataSource Sponsored Lunch PresentationeDataSource Sponsored Lunch Presentation
eDataSource Sponsored Lunch Presentation
MediaPost
 
Email Marketing Best Practices
Email Marketing Best PracticesEmail Marketing Best Practices
Email Marketing Best Practices
BullsEye Internet Marketing
 
Power of Relationships
Power of RelationshipsPower of Relationships
Power of Relationships
Scott K. Wilder
 
Adma 2009 Vision 6 David Smerdon
Adma 2009 Vision 6 David SmerdonAdma 2009 Vision 6 David Smerdon
Adma 2009 Vision 6 David Smerdondavidsmerdon
 

What's hot (17)

Their Inbox, Your Responsibility
Their Inbox, Your ResponsibilityTheir Inbox, Your Responsibility
Their Inbox, Your Responsibility
 
Email marketing
Email marketingEmail marketing
Email marketing
 
TOP 5 EMAIL MARKETING MISTAKES
TOP 5 EMAIL MARKETING MISTAKES TOP 5 EMAIL MARKETING MISTAKES
TOP 5 EMAIL MARKETING MISTAKES
 
Vision 6 David Smerdon Evolve Your Email Marketing
Vision 6 David Smerdon Evolve Your Email MarketingVision 6 David Smerdon Evolve Your Email Marketing
Vision 6 David Smerdon Evolve Your Email Marketing
 
Email marketing 101
Email marketing 101Email marketing 101
Email marketing 101
 
Building a World Class Email Preference Centre
Building a World Class Email Preference CentreBuilding a World Class Email Preference Centre
Building a World Class Email Preference Centre
 
Email Marketing and MailChimp
Email Marketing and MailChimpEmail Marketing and MailChimp
Email Marketing and MailChimp
 
Key Email Marketing Actions 2010
Key Email Marketing Actions 2010Key Email Marketing Actions 2010
Key Email Marketing Actions 2010
 
Perfect Your Email Marketing
Perfect Your Email MarketingPerfect Your Email Marketing
Perfect Your Email Marketing
 
Welcome Email Best Practices Silverpop
Welcome Email Best Practices SilverpopWelcome Email Best Practices Silverpop
Welcome Email Best Practices Silverpop
 
Aloha Welcome Email & Unsubscribe Best Practices
Aloha Welcome Email & Unsubscribe Best PracticesAloha Welcome Email & Unsubscribe Best Practices
Aloha Welcome Email & Unsubscribe Best Practices
 
Busting out of the junk folder: Dale Langley
Busting out of the junk folder: Dale LangleyBusting out of the junk folder: Dale Langley
Busting out of the junk folder: Dale Langley
 
Return Path World Tour Keynote - San Francisco
Return Path World Tour Keynote - San FranciscoReturn Path World Tour Keynote - San Francisco
Return Path World Tour Keynote - San Francisco
 
eDataSource Sponsored Lunch Presentation
eDataSource Sponsored Lunch PresentationeDataSource Sponsored Lunch Presentation
eDataSource Sponsored Lunch Presentation
 
Email Marketing Best Practices
Email Marketing Best PracticesEmail Marketing Best Practices
Email Marketing Best Practices
 
Power of Relationships
Power of RelationshipsPower of Relationships
Power of Relationships
 
Adma 2009 Vision 6 David Smerdon
Adma 2009 Vision 6 David SmerdonAdma 2009 Vision 6 David Smerdon
Adma 2009 Vision 6 David Smerdon
 

Viewers also liked

Newsletter 01 12-2015(38-22) (1)
Newsletter 01 12-2015(38-22) (1)Newsletter 01 12-2015(38-22) (1)
Newsletter 01 12-2015(38-22) (1)
cacds_ukraine
 
Advanced Manufacturing Careers
Advanced Manufacturing CareersAdvanced Manufacturing Careers
Advanced Manufacturing Careers
SmarTrax
 
InternDesignDay_0823
InternDesignDay_0823InternDesignDay_0823
InternDesignDay_0823Vincent Agoe
 
Surrealismo
SurrealismoSurrealismo
Surrealismo
Michelle Bouvier
 
How to remove net.portalsepeti.com pop up
How to remove net.portalsepeti.com pop upHow to remove net.portalsepeti.com pop up
How to remove net.portalsepeti.com pop up
coseanonans
 
Bulletin cacds 15_10-2015(35-19)
Bulletin cacds 15_10-2015(35-19)Bulletin cacds 15_10-2015(35-19)
Bulletin cacds 15_10-2015(35-19)
cacds_ukraine
 
Return Path World Tour Keynote - New York
Return Path World Tour Keynote - New YorkReturn Path World Tour Keynote - New York
Return Path World Tour Keynote - New York
Return Path
 
Antes do cinema
Antes do cinemaAntes do cinema
Antes do cinema
filmotecaforum
 
Resident Retention Rehab - The Cure For Reluctant Renewals
Resident Retention Rehab - The Cure For Reluctant RenewalsResident Retention Rehab - The Cure For Reluctant Renewals
Resident Retention Rehab - The Cure For Reluctant Renewals
Multifamily Insiders
 
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...
Docker, Inc.
 

Viewers also liked (12)

Newsletter 01 12-2015(38-22) (1)
Newsletter 01 12-2015(38-22) (1)Newsletter 01 12-2015(38-22) (1)
Newsletter 01 12-2015(38-22) (1)
 
Advanced Manufacturing Careers
Advanced Manufacturing CareersAdvanced Manufacturing Careers
Advanced Manufacturing Careers
 
RESUME np
RESUME npRESUME np
RESUME np
 
InternDesignDay_0823
InternDesignDay_0823InternDesignDay_0823
InternDesignDay_0823
 
Surrealismo
SurrealismoSurrealismo
Surrealismo
 
How to remove net.portalsepeti.com pop up
How to remove net.portalsepeti.com pop upHow to remove net.portalsepeti.com pop up
How to remove net.portalsepeti.com pop up
 
Bulletin cacds 15_10-2015(35-19)
Bulletin cacds 15_10-2015(35-19)Bulletin cacds 15_10-2015(35-19)
Bulletin cacds 15_10-2015(35-19)
 
Return Path World Tour Keynote - New York
Return Path World Tour Keynote - New YorkReturn Path World Tour Keynote - New York
Return Path World Tour Keynote - New York
 
Antes do cinema
Antes do cinemaAntes do cinema
Antes do cinema
 
Resident Retention Rehab - The Cure For Reluctant Renewals
Resident Retention Rehab - The Cure For Reluctant RenewalsResident Retention Rehab - The Cure For Reluctant Renewals
Resident Retention Rehab - The Cure For Reluctant Renewals
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...
 

Similar to Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Return Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Return Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Return Path
 
How Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email Authentication
Return Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonUsing Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Return Path
 
Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)
Salesforce Partners
 
7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise
Elena Tatarenkova
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
Claranet UK
 
Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
Contactlab
 
Gone Phishing
Gone Phishing Gone Phishing
Gone Phishing
stratospherenetworks
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
anjandavid
 
Neuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt LtdNeuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt Ltd
Shankar Suman
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
AbdullaFatiya3
 
PHISHING PROTECTION
 PHISHING PROTECTION PHISHING PROTECTION
PHISHING PROTECTION
KaterynaPetrova4
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email Phishing
Tarun Arora
 
Dmarc is your savior
Dmarc is your saviorDmarc is your savior
Dmarc is your savior
TIKAJ
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
Symantec
 
weDMARC: Reinventing Email Security for the Modern Era
weDMARC: Reinventing Email Security for the Modern EraweDMARC: Reinventing Email Security for the Modern Era
weDMARC: Reinventing Email Security for the Modern Era
weDMARC
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Return Path
 

Similar to Using Return Path Data to Protect Your Brand: Security Breakout Session - LA (20)

Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
 
How Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email Authentication
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonUsing Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
 
Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)
 
7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 
Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
 
Gone Phishing
Gone Phishing Gone Phishing
Gone Phishing
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
 
Neuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt LtdNeuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt Ltd
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
PHISHING PROTECTION
 PHISHING PROTECTION PHISHING PROTECTION
PHISHING PROTECTION
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email Phishing
 
Dmarc is your savior
Dmarc is your saviorDmarc is your savior
Dmarc is your savior
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
weDMARC: Reinventing Email Security for the Modern Era
weDMARC: Reinventing Email Security for the Modern EraweDMARC: Reinventing Email Security for the Modern Era
weDMARC: Reinventing Email Security for the Modern Era
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
 

More from Return Path

Green Eggs & Spam
Green Eggs & SpamGreen Eggs & Spam
Green Eggs & Spam
Return Path
 
Return Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sao PauloReturn Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sao Paulo
Return Path
 
Return Path World Tour Keynote - Sydney
Return Path World Tour Keynote - SydneyReturn Path World Tour Keynote - Sydney
Return Path World Tour Keynote - Sydney
Return Path
 
Return Path World Tour Keynote - Paris
Return Path World Tour Keynote - ParisReturn Path World Tour Keynote - Paris
Return Path World Tour Keynote - Paris
Return Path
 
World Tour Keynote Presentation - London
World Tour Keynote Presentation - LondonWorld Tour Keynote Presentation - London
World Tour Keynote Presentation - London
Return Path
 
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LALittle Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYCLittle Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - ChicagoLittle Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Return Path
 
Increase Open Rates by Sending at the Best Time
Increase Open Rates by Sending at the Best TimeIncrease Open Rates by Sending at the Best Time
Increase Open Rates by Sending at the Best Time
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao Paulo
Little Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao PauloLittle Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao Paulo
Little Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao Paulo
Return Path
 

More from Return Path (17)

Green Eggs & Spam
Green Eggs & SpamGreen Eggs & Spam
Green Eggs & Spam
 
Return Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sao PauloReturn Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sao Paulo
 
Return Path World Tour Keynote - Sydney
Return Path World Tour Keynote - SydneyReturn Path World Tour Keynote - Sydney
Return Path World Tour Keynote - Sydney
 
Return Path World Tour Keynote - Paris
Return Path World Tour Keynote - ParisReturn Path World Tour Keynote - Paris
Return Path World Tour Keynote - Paris
 
World Tour Keynote Presentation - London
World Tour Keynote Presentation - LondonWorld Tour Keynote Presentation - London
World Tour Keynote Presentation - London
 
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LALittle Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYCLittle Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - ChicagoLittle Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
 
Increase Open Rates by Sending at the Best Time
Increase Open Rates by Sending at the Best TimeIncrease Open Rates by Sending at the Best Time
Increase Open Rates by Sending at the Best Time
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao Paulo
Little Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao PauloLittle Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao Paulo
Little Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao Paulo
 

Recently uploaded

一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
pchutichetpong
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
Tiktokethiodaily
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
ArpitMalhotra16
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
enxupq
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
Opendatabay
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
ewymefz
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 

Recently uploaded (20)

一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 

Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

  • 1. Using Return Path Data to Protect Your Brand Security Breakout Session Brian Westnedge, Sr. Director of Client Services
  • 2. Agenda •  Email fraud trends and impact •  The power of data: email threat intelligence •  The Return Path Data Cloud •  Tactics used by cybercriminals today •  Unite against email fraud: tips for defending your customers, brand, and bottom line •  Questions
  • 4. Email Delivers Business Value… Increases Customer Loyalty Boosts Revenue Reduces Operating Costs
  • 5. …But Its Impact Is Being Eroded 5 out of 6 big companies are targeted with phishing attacks Phishing costs brands worldwide $4.5 billion each year RSA identifies a phishing attack every minute Email fraud has up to a 45% conversion rate Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm $4.5 B 1 MIN 5/6 45%
  • 6. Phishing Leads To – Revenue Losses •  Reduced trust in brand: •  Subscribers don’t know what to trust •  Reduced effectiveness of email •  ISPs don’t know what to trust Customers are 42% less likely to interact with a brand after being phished or spoofed.
  • 7. Phishing Leads To – Unwanted Media Attention
  • 8. “If you boil the jobs down of IT security professionals, they are ultimately tasked with protecting the brand… If you have a breach, research suggests that 60% of your customers will think about moving and 30% actually do.” Bryan Littlefair Global Chief Information Security Officer Aviva
  • 9. Phishing Leads To – Remediation Costs Fraud Losses Malware Infection Investigation Remediation
  • 10. Can You Spot a Spoof?
  • 11. Anatomy Of A Phishing Email to: You <you@yourdomain.com> from: Phishing Company <phishingcompany@spoof.com> subject: Unauthorized login attempt Dear Customer, We have recieved noticed that you have recently attempted to login to your account from an unauthorized device. As a saftey measure, please visit the link below to update your login details now: http://www.phishingemail.com/updatedetails.asp Once you have updated your details your account will be secure from further unauthorized login attempts. Thanks, The Phishing Team 1 attachment Making an email look legitimate by spoofing the company name in the “Display Name” field. Tricking email servers into delivering the email to the inbox by spoofing the “envelope from” address hidden in the technical header of the email. Including logos, company terms, and urgent language in the body of the email. Making an email appear to come from a brand by using a legitimate company domain, or a domain that looks like it in the “from” field. Creating convincing subject lines to drive recipients to open the message. Including links to malicious websites that prompt users to give up credentials Including attachments containing malicious content.
  • 12. From: service@paypal.com <paypal@service.com> From: PayPal <paypal@e.paypal.co.uk>
  • 13. The Power of the Right Data
  • 14. Knowledge Is Your Best Defense •  We know there is no silver bullet. •  But defense starts with understanding. •  Data is the key to that understanding.
  • 15. Breadth, Depth, and Speed Contactually Molto ParibusGetAirHelp Message Finder UnsubscriberOrganizer
  • 16. EMAIL THREAT DATA · Consumer inbox data · Email delivery data · Authentication results · Message level data · SPAM trap & complaints data EMAIL THREAT INTELLIGENCE · Domain-spoofing alerts · Brand-spoofing intelligence · Suspicious activity map · Fraudcaster URL feed · Sender Score: IP reputation
  • 17. Email Fraud: Primary Attack Vectors Domain Spoofing (from domains owned by the brand) Brand Spoofing (from domains outside the brand’s control) phish@company.com company@phish.com
  • 18. 30% of Attacks Spoof Domains You Own 30% Domain Spoofing •  Active Emailing Domains •  Non-Sending Domains •  Defensively-Registered Domains 70% Brand Spoofing •  Cousin Domains •  Display Name Spoofing •  Subject Line Spoofing •  Email Account Spoofing Source: Return Path / APWG White Paper, 2014
  • 19. Unite Against Email Fraud Tips for defending your customers, your brand, and your bottom line.
  • 21. DMARC (Domain-based Message Authentication Reporting & Conformance): •  Technical specification created to help reduce the potential for email- based abuse (www.dmarc.org) •  Prevents domain-based spoofing by blocking fraudulent activity appearing to come from domains under your control •  Provides threat reporting mechanism (aggregate and forensic data) #1: Authenticate Your Email
  • 22. “Simply put, the DMARC standard works. In a blended approach to fight email fraud, DMARC represents the cornerstone of technical controls that commercial senders can implement today to rebuild trust and retake the email channel for legitimate brands and consumers.” Edward Tucker Head of Cyber Security Her Majesty’s Revenue & Customs
  • 23. •  Addressing the 70% of email attacks that spoof your brand using domains your company does not own requires email threat intelligence. •  Get visibility into all types of email threats targeting you today. #2: Leverage Email Threat Intelligence
  • 24. •  The reality is, some attacks are always going to get through. •  The more prepared your customers are, the better. •  Create an educational website •  Include anti-fraud language within your legitimate email •  In the event of an attack, warn your customers immediately #3: Educate Your Customers
  • 25. •  Engage with Brand Protection teams to make the business case. •  Create a sense of urgency. •  Communicate the risks that result from not taking action: •  Email fraud destroys brand reputation and erodes customer loyalty •  Email fraud thwarts email marketing effectiveness •  Email fraud negatively impacts revenue #4: Raise Awareness with Top Executives
  • 26. Learn More www.returnpath.com/StopEmailFraud Twitter: @StopEmailFraud New: Download the Email Threat Intelligence report at bit.ly/EmailThreatIntel