-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Email Security Growing in threats, quickening in pace
Erez Haimowicz
Enablement and Security
Mimecast
11-10-17
NTXISSA.orgNTXISSA.orgNTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Email: The Ultimate App
With demanding business and user requirements
24 X 7 Email Availability
ContinuousMission-critical Mobile
.2
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Cyber Resilience
The technology that provides the best possible multi-layered
protection
MULTILAYERED SECURITY
A solution that allows you to continue to work while the issue
is resolved
CONTINUITY
The knowledge that no matter what, you can get back to the
last known good state
REMEDIATION
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Countdown to a breach
Verizon 2016 Data Breach Investigations Report (DBIR)
100 Seconds average time-to-first-click
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
91% of all incidents start with a phish
Wired
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
You can no longer stand in front of your board and say that you wont have an attack.
As we all know, its now a case of when.
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
What those attacking look like
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Your company
is at risk if
you.. You have certain letters in your domain name You accept resumes on your website
You have a team of people in finance
You have a profile
Your life is deemed interesting enough to be on
Your company is at RISK if you
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Do You Have a Page Like This On Your Website?
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Real life examples with email
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Imagine being able to stop EVERY malicious file
We all know the risks
Trust your users not to click?
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Who Says Attacks Need to Involve Malware?
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Compromised AccountsStolen User Credentials
Utilize Corp Web mail to spread attack internally or externally to partners/customers
Careless UsersSending sensitive data internally such as projects and PII
Oops, sent it to the wrong Michael
Malicious InsidersPurposely distributing malware or malicious URLs
Internal threats!
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Flawed - The technology23% open the phish & click
Confidetial |
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
To run an attack
You dont even need to know how to code
Source: Forbes.com - "Ransomware As A Service Being Offered For
$39 On The Dark Net" 7/15/16
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
AND to bypass sandboxes.
FUD (Fully Undetectable) Crypting Services to avoid AV detection
AND to bypass sandboxes
FUD (Fully Undetectable) Crypting Services to avoid AV Detection
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Confidential |
At Risk - The human firewall11% open the phish & run the attachment
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
HEY STRANGERS - Please send me files
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Click to View Dupe
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
You cant fix stupid
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Whatever we do, theyre still around and getting creative
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
Your business
needs a cyber resilience strategy
ARCHIVING
SECURITY
CONTINUITY
NTXISSA.orgNTXISSA.org
-
NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5
29
Thank you
NTXISSA.orgNTXISSA.org