PEOPLE CENTRIC SECURITY THE NEW PARADIGM IN CYBERSECURITY David Karlsson SE Nordics March 2018 1 2018 Proofpoint, Inc.
Proofpoint at a Glance LEADING CUSTOMERS DEEP SECURITY DNA UNIQUE VISIBILITY PARTNERS & AQUISITIONS 59 Fortune 100 125+ threat ops and research team 6B+ messages processed daily 40K+ customers ~21% revenue invested in R&D 500B+ node threat graph CLOUDMARK 90%+ renewal rate 300K+ daily malware samples 8B+ URLs per day 2 2018 Proofpoint, Inc.
Industry trends 3 2018 Proofpoint, Inc.
Shifts in the Industry Threats use social engineering, not vulnerabilities Shift to cloud & mobile creates new threat vectors, data exposure Email fraud becomes #1 source of loss 99%+ Rely on user to run malicious code 70% Malicious links are credential phishing $5.3B Direct losses since January 2015, up 2,370% 40,203 Organizations victimized in the US alone Source: FBI 2017 4 2018 Proofpoint, Inc.
A People-Centric View of Vulnerability High Value Access to critical systems Access to sensitive data Authority over teams with access Highly targeted Highly sophisticated High volumes Highly Attacked High Risk Targets Highly Vulnerable Vulnerable devices or networks Interacts with malicious content Highly visible 5 2018 Proofpoint, Inc.
Email: #1 Threat Vector $ Email Invented Hello, WWW! Spam Email Malware Spear Phishing Social Eng Attacks Data Breaches Ransomware BEC 1970 1990 2000 2010 2015 $712 Per employee $3.7M Per company $1B+ For large breaches $5B In 2017 $5.3B worldwide Source: CSOonline.com, Cybersecurity ventures, Nucleus Research, FBI 6 2018 Proofpoint, Inc.
Organisations Underinvest in Email; Attackers Don t IT Security Industry Attack Vectors Network 62% Endpoint 18% Web 12% Email 8% Other 90%+ of sophisticated attacks target people, largely via email Source: Gartner (2017 forecast) Source: Verizon DBIR, Trend Micro, FEYE, etc. 7 2018 Proofpoint, Inc.
The Great Migration to Office 365 & Cloud 67% 78% of enterprises have told Gartner that they will migrate to Office 365 by 2020 28% 38% 43% 60% Will use 3rd party tools to protect Office 365 8 2018 Proofpoint, Inc.
In the Sights of the Actor 9 2018 Proofpoint, Inc.
Everyone is Targeted All Size Organizations All Industries All Roles Average # BEC Attacks Per Company Targeted 2017-Q2 Manufacturing 44 Telecommunications 39 Technology 38 Energy/Utilities 31 Automotive 26 Financial Services 23 Retail 22 Transportation 20 Healthcare 19 CFO HR FINANCE PAYROLL COO 47% 25% 13% 8% 5% Source: Proofpoint Threat Research 10 2018 Proofpoint, Inc.
The Email Fraud Challenge $5.3B Reported Losses Due to BEC (FBI) 2/3 Impostor Emails are Domain-spoofing Attacks (Proofpoint) 95% Enterprise Network Attacks Begin with Spear Phishing (SANS Institute) $100M 150% 45% Stolen by 1 Person Spoofing Business Partners (US DOJ) YoY Increase of Consumer Phishing (APWG) Conversion Rate for Consumer Email Fraud (Google) 11 2018 Proofpoint, Inc.
Solutions to help 12 2018 Proofpoint, Inc.
Advanced Email Security Email Protection Targeted Attack Protection Email arrives Email Security Impostor Dynamic Anti-Virus SPAM Virus Classification Malware DDOSReputation Phishing Attachment Malicious Defense Attachments Advanced Threats Advanced Threats URL Defense Malicious URLs TAP SaaS Defense Email Fraud Protection Executive Impersonation Supply-chain Phishing Email Fraud Domain Email Fraud (BEC) Defense Discover Consumer Phishing Look Alike Business Continuity Remediation TRAP Response Business Continuity Continuity Information Protection Exfiltration Protecting Insider Threats Sensitive Information Regulatory Compliance Email Encryption Email DLP SaaS Protection Email leaves 13 2018 Proofpoint, Inc.
Advanced Email Security Email Protection Targeted Attack Protection Email arrives Email Security Impostor Dynamic Anti-Virus SPAM Virus Classification Malware DDOSReputation Phishing Attachment Malicious Defense Attachments Advanced Threats Advanced Threats URL Defense Malicious URLs TAP SaaS Defense Email Fraud Protection Executive Impersonation Supply-chain Phishing Email Fraud Domain Email Fraud (BEC) Defense Discover Consumer Phishing Look Alike Business Continuity Remediation TRAP Response Business Continuity Continuity Information Protection Exfiltration Protecting Insider Threats Sensitive Information Regulatory Compliance Email Encryption Email DLP SaaS Protection Email leaves 14 2018 Proofpoint, Inc.
Delivering People-Centric Security RISK VISIBILITY PREVENT DEFEND RESPOND THREAT PROTECTION Stop Email Fraud Stop Email Threats Orchestrate Response INFORMATION PROTECTION Limit Data Exposure Protect Data Access Stop Data Loss USER PROTECTION Simulate Attacks Isolate Web Browsing Train Users 15 2018 Proofpoint, Inc.
WIN A RING AT THE PROOFPOINT STAND. Visibility. It matters in all types of security: network and home. Take a Threat Discover Risk Assessment to win a Ring Video Doorbell and you could walk away with a better view of who s knocking on your door at home. 16 2018 Proofpoint, Inc.
Thank You! 17 2018 Proofpoint, Inc.