SlideShare a Scribd company logo
1 of 26
Download to read offline
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
© 2019 Terbium Labs
What’s Your Organization’s Data
Exposure on the Dark Web?
Understanding Business Risk from Data Exposure Online
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
2
About Us
Dee Liebenstein, VP of Product
Emily Wilson, VP of Research
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
What is the dark web?
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
4
The dark web has a bad reputation: clickbait headlines and popular
media are full of inaccuracies.
The dark web is home to both illicit and legal activity, and using the dark
web is not inherently sketchy.
The dark web is just another part of the internet. Criminal activity
takes place across the internet, not exclusively on the dark web.
Myths and Misconceptions
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
5
Three segments of the internet
The open web is
accessible through
search engines and
requires no special
technology to access.
The deep web is not
accessible through
search engines, but
generally requires no
special technology to
access.
The dark web is not
accessible through
search engines and
generally requires
special technology to
access.
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
6
ON-DEMAND WEBINAR
Visit terbiumlabs.com to access the
on-demand webinar, What’s Your
Organization’s Data Exposure on
the Dark Web?
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
The dark web is designed
for privacy and
anonymity. The desire for
privacy does not equate
to criminality.
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
What’s on the dark
web?
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
9
What is the dark web?
The dark web hosts an illicit ecosystem, made up of
multiple criminal economies.
The fraud economy is one of the most resilient
communities in the illegal ecosystem, because it is based
on digital, interchangeable goods.
The fraud economy has expanded beyond dark web
criminal markets into deep web markets, social media
platforms, and open web sites.
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
The online fraud economy
includes all of the raw
materials, resources, and
services a cyber criminal
needs
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
11
What type of data gets traded in the fraud
economy?
• Personal information
• Financial information
• Corporate Data
• Guides and Tutorials
• Services
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
12
• Names and addresses
• Contact details
• Credentials
• Government identifiers
• Extended personal history
Personal Information
Phishing
Account takeover
Identity theft
Physical security threats
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
13
• Payment Cards
• Bank Accounts
• Payment Processor Accounts
Financial Information
Unauthorized charges
Money laundering
Account takeover
Identity theft
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
14
• Employment-associated PII
– Corporate email addresses
– Corporate credentials
• W2s and tax information
• Invoicing and vendor/contractor details
• Intellectual property
Corporate Data
Tax fraud
Identity theft
Account takeover
Phishing
Business email compromise
Misuse of proprietary information
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
Case Studies of
Corporate Data
Exposure
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
16
Case Study:
Terbium Labs detected a fraudulent
customer support account for a popular
retailer on Twitter. This account
attempted to intercept legitimate
customer support by responding to
tweets.
The account requested users direct
message their account details for further
support, at which point the cyber
criminals would exploit the shared
credentials.
Brand Misuse Monitoring
How to Protect:
A comprehensive digital risk protection
strategy goes beyond purely monitoring
for data leaks.
By monitoring for the appearance of
corporate information – including
corporate branding – across social
media and open web accounts,
organizations can detect and take down
fraudulent efforts to steal customer data
and generate reputational damage.
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
17
Case Study:
Terbium Labs detected an extensive leak
of high-profile customer information
belonging to a Matchlight client.
Analysis on the data leak indicated the
client list was not the result of a direct
leak of client information, but instead the
result of a third party data incident.
Data Loss Detection
How to Protect:
Organizations face fallout from data
exposure regardless of the source of the
leak. Monitoring for customer records,
including specific customer contact
details, provides immediate visibility into
exposure.
Matchlight’s fully private monitoring
allows for comprehensive visibility
without increased risk.
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
18
Case Study:
Terbium Labs detected a series of fraud
guides for sale for a financial institution.
These guides included updated
instructions on how to bypass multi-
factor authentication on customer
accounts to execute account takeover
exploits against the financial institution.
Fraud Detection
How to Protect:
Monitoring for corporate brands,
products, and other unique indicators
combined with analyst activity to identify
and purchase fraud guides.
Investigating detailed fraud techniques
contained in guides and tutorials allows
for in-house remediation and further
identification of potentially compromised
accounts based on outlined techniques.
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
Choosing a Digital Risk
Protection Provider
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
A comprehensive digital
risk protection strategy
provides full and ongoing
visibility into your
corporate exposure online
– without sacrificing data
privacy.
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
21
Three key requirements for a provider
Digital risk protection providers are not created equal. In order to ensure
your organization adopts a comprehensive strategy, look for a provider
that prioritizes:
• Privacy
• Breadth of Coverage
• Actionable Insights
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
22
Privacy
Data Fingerprinting allows Matchlight to search the web for matching data without
knowing what that data is
Securely generate irreversible fingerprints on your corporate network without revealing
any information about the original documents to us or any third party
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
23
Breadth of Coverage
• Customer PII Theft
• Employee PII Theft
• Fraud Guides
• Fraudulent Apps
• Customer Phishing
• Account Takeovers
• Automated and continuous
crawling across the open, deep
and dark web
• Intellectual Property Theft
• Patient PII Theft
• Imitation Accounts
• Impersonations
• Fake Domains
• Targeted Scams
Examples of Digital Risks
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
24
Actionable Insights
– What was found,
where and how
much
– Company’s overall
risk measure
– Top concerning
assets
– Dedicated Risk
Analysts
– Relevant contextual
information
– Actionable
Intelligence with
recommendations
– Comprehensive view
of risk
– Context to act
quickly
– Vetted
recommendations
– Prioritization
Automated
Analytics
Analyst Team Risk Analysis
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
25
New Research
The latest survey from Terbium Labs
unpacks how organizations think about
data exposure – and reveals a startling
disconnect amongst IT professionals in
how they measure risk and plan for digital
security incidents.
Visit terbiumlabs.com to access a full
copy of the report, The Underrated Risks
of Data Exposure.
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
© 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs.
Digital Risk Protection
Actionable Insights
Fully Private Monitoring
sales@terbiumlabs.com
Learn more at terbiumlabs.com

More Related Content

What's hot

2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
Building your-dream-cyber-team
Building your-dream-cyber-teamBuilding your-dream-cyber-team
Building your-dream-cyber-teamKleomenis Symeon
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250Chris Crowe
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Echoworx
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBakerTillyConsulting
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
 
Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Browne Jacobson LLP
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorEMC
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftElizabeth Dimit
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)Kate Dalakova
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...Declan Winston Ramsaran
 

What's hot (20)

2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Building your-dream-cyber-team
Building your-dream-cyber-teamBuilding your-dream-cyber-team
Building your-dream-cyber-team
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 

Similar to WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?

Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery, Inc.
 
Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19Kyriba Corporation
 
Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Kyriba Corporation
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowTechSoup
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery, Inc.
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy ManagementTrustArc
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10seadeloitte
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy ProgramDaniel Ayala
 
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksSurfWatch Labs
 
Digital Forensics_Lecture.pptx
Digital Forensics_Lecture.pptxDigital Forensics_Lecture.pptx
Digital Forensics_Lecture.pptxkhalifaAlMarzooqi3
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 

Similar to WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB? (20)

Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security Study
 
Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19
 
Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security Study
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Digital Forensics_Lecture.pptx
Digital Forensics_Lecture.pptxDigital Forensics_Lecture.pptx
Digital Forensics_Lecture.pptx
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?

  • 1. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. © 2019 Terbium Labs What’s Your Organization’s Data Exposure on the Dark Web? Understanding Business Risk from Data Exposure Online
  • 2. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 2 About Us Dee Liebenstein, VP of Product Emily Wilson, VP of Research
  • 3. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. What is the dark web?
  • 4. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 4 The dark web has a bad reputation: clickbait headlines and popular media are full of inaccuracies. The dark web is home to both illicit and legal activity, and using the dark web is not inherently sketchy. The dark web is just another part of the internet. Criminal activity takes place across the internet, not exclusively on the dark web. Myths and Misconceptions
  • 5. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 5 Three segments of the internet The open web is accessible through search engines and requires no special technology to access. The deep web is not accessible through search engines, but generally requires no special technology to access. The dark web is not accessible through search engines and generally requires special technology to access.
  • 6. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 6 ON-DEMAND WEBINAR Visit terbiumlabs.com to access the on-demand webinar, What’s Your Organization’s Data Exposure on the Dark Web?
  • 7. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. The dark web is designed for privacy and anonymity. The desire for privacy does not equate to criminality.
  • 8. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. What’s on the dark web?
  • 9. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 9 What is the dark web? The dark web hosts an illicit ecosystem, made up of multiple criminal economies. The fraud economy is one of the most resilient communities in the illegal ecosystem, because it is based on digital, interchangeable goods. The fraud economy has expanded beyond dark web criminal markets into deep web markets, social media platforms, and open web sites.
  • 10. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. The online fraud economy includes all of the raw materials, resources, and services a cyber criminal needs
  • 11. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 11 What type of data gets traded in the fraud economy? • Personal information • Financial information • Corporate Data • Guides and Tutorials • Services
  • 12. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 12 • Names and addresses • Contact details • Credentials • Government identifiers • Extended personal history Personal Information Phishing Account takeover Identity theft Physical security threats
  • 13. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 13 • Payment Cards • Bank Accounts • Payment Processor Accounts Financial Information Unauthorized charges Money laundering Account takeover Identity theft
  • 14. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 14 • Employment-associated PII – Corporate email addresses – Corporate credentials • W2s and tax information • Invoicing and vendor/contractor details • Intellectual property Corporate Data Tax fraud Identity theft Account takeover Phishing Business email compromise Misuse of proprietary information
  • 15. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. Case Studies of Corporate Data Exposure
  • 16. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 16 Case Study: Terbium Labs detected a fraudulent customer support account for a popular retailer on Twitter. This account attempted to intercept legitimate customer support by responding to tweets. The account requested users direct message their account details for further support, at which point the cyber criminals would exploit the shared credentials. Brand Misuse Monitoring How to Protect: A comprehensive digital risk protection strategy goes beyond purely monitoring for data leaks. By monitoring for the appearance of corporate information – including corporate branding – across social media and open web accounts, organizations can detect and take down fraudulent efforts to steal customer data and generate reputational damage.
  • 17. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 17 Case Study: Terbium Labs detected an extensive leak of high-profile customer information belonging to a Matchlight client. Analysis on the data leak indicated the client list was not the result of a direct leak of client information, but instead the result of a third party data incident. Data Loss Detection How to Protect: Organizations face fallout from data exposure regardless of the source of the leak. Monitoring for customer records, including specific customer contact details, provides immediate visibility into exposure. Matchlight’s fully private monitoring allows for comprehensive visibility without increased risk.
  • 18. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 18 Case Study: Terbium Labs detected a series of fraud guides for sale for a financial institution. These guides included updated instructions on how to bypass multi- factor authentication on customer accounts to execute account takeover exploits against the financial institution. Fraud Detection How to Protect: Monitoring for corporate brands, products, and other unique indicators combined with analyst activity to identify and purchase fraud guides. Investigating detailed fraud techniques contained in guides and tutorials allows for in-house remediation and further identification of potentially compromised accounts based on outlined techniques.
  • 19. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. Choosing a Digital Risk Protection Provider
  • 20. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. A comprehensive digital risk protection strategy provides full and ongoing visibility into your corporate exposure online – without sacrificing data privacy.
  • 21. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 21 Three key requirements for a provider Digital risk protection providers are not created equal. In order to ensure your organization adopts a comprehensive strategy, look for a provider that prioritizes: • Privacy • Breadth of Coverage • Actionable Insights
  • 22. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 22 Privacy Data Fingerprinting allows Matchlight to search the web for matching data without knowing what that data is Securely generate irreversible fingerprints on your corporate network without revealing any information about the original documents to us or any third party
  • 23. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 23 Breadth of Coverage • Customer PII Theft • Employee PII Theft • Fraud Guides • Fraudulent Apps • Customer Phishing • Account Takeovers • Automated and continuous crawling across the open, deep and dark web • Intellectual Property Theft • Patient PII Theft • Imitation Accounts • Impersonations • Fake Domains • Targeted Scams Examples of Digital Risks
  • 24. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 24 Actionable Insights – What was found, where and how much – Company’s overall risk measure – Top concerning assets – Dedicated Risk Analysts – Relevant contextual information – Actionable Intelligence with recommendations – Comprehensive view of risk – Context to act quickly – Vetted recommendations – Prioritization Automated Analytics Analyst Team Risk Analysis
  • 25. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. 25 New Research The latest survey from Terbium Labs unpacks how organizations think about data exposure – and reveals a startling disconnect amongst IT professionals in how they measure risk and plan for digital security incidents. Visit terbiumlabs.com to access a full copy of the report, The Underrated Risks of Data Exposure.
  • 26. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. © 2019 Terbium Labs. Confidential—Do not duplicate or distribute without written permission from Terbium Labs. Digital Risk Protection Actionable Insights Fully Private Monitoring sales@terbiumlabs.com Learn more at terbiumlabs.com