PEOPLE CENTRIC SECURITY THE NEW

Similar documents
Proofpoint, Inc.

BUILDING AN EFFECTIVE PROGRAM TO PROTECT AGAINST FRAUD

Turning the Tide: Fending off Cyber Threats

with Advanced Protection

Cyber Security Updates and Trends Affecting the Real Estate Industry

TABLE OF CONTENTS Introduction: IS A TOP THREAT VECTOR... 3 THE PROBLEM: ATTACKS ARE EVOLVING FASTER THAN DEFENSES...

Investor Overview 2018

Security and Compliance for Office 365

Machine-Powered Learning for People-Centered Security

2018 Edition. Security and Compliance for Office 365

Automated Context and Incident Response

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Security & Phishing

Evolution of Spear Phishing. White Paper

Analyst and Investor Day

2017 Annual Meeting of Members and Board of Directors Meeting

Copyright 2011 Trend Micro Inc.

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.

2018 Cyber Security Predictions

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

CYBER SOLUTIONS & THREAT INTELLIGENCE

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Office 365 Buyers Guide: Best Practices for Securing Office 365

CloudSOC and Security.cloud for Microsoft Office 365

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Office 365 Report. the inside track to threat protection

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

THE ACCENTURE CYBER DEFENSE SOLUTION

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.

REPORT. proofpoint.com

10 FOCUS AREAS FOR BREACH PREVENTION

A Data-Centric Approach to Endpoint Security

RSA NetWitness Suite Respond in Minutes, Not Months

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

MODERN DESKTOP SECURITY

WHITEPAPER. Protecting Against Account Takeover Based Attacks

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats.

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

See how proofpoint helps you connect with confidence across all digital channels

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Cybersecurity The Evolving Landscape

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

June 2 nd, 2016 Security Awareness

AKAMAI CLOUD SECURITY SOLUTIONS

CISO as Change Agent: Getting to Yes

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Cyber Insurance: What is your bank doing to manage risk? presented by

Modern attacks and malware

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

CSP 2017 Network Virtualisation and Security Scott McKinnon

THE CLOUD SECURITY CHALLENGE:

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Security-as-a-Service: The Future of Security Management

Secure Access for Microsoft Office 365 & SaaS Applications

CipherCloud CASB+ Connector for ServiceNow

FLIPPING THE SCRIPT ON SECURITY SPENDING

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

Spotlight Report. Information Security. Presented by. Group Partner

How Breaches Really Happen

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Security Gap Analysis: Aggregrated Results

Microsoft Security Management

Protect your business in today s fast-changing security and risk environment.

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

Cisco Security: Advanced Threat Defense for Microsoft Office 365

Lessons Learned from 4,000 Security Assessments. Sadik Al-Abdulla Security Practice Director, CDW

Transforming the Network for the Digital Business

THE EVOLUTION OF SIEM

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

May the (IBM) X-Force Be With You

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

Building Resilience in a Digital Enterprise

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Competitive Matrix - IRONSCALES vs Alternatives

Stopping Advanced Persistent Threats In Cloud and DataCenters

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

Checklist for Evaluating Deception Platforms

Case Study. Top Financial Services Provider Ditches Detection for Isolation

Best Practices in Securing a Multicloud World

Measuring cloud-based anti-malware protection for Office 365 user accounts

Protecting from Attack in Office 365

Transcription:

PEOPLE CENTRIC SECURITY THE NEW PARADIGM IN CYBERSECURITY David Karlsson SE Nordics March 2018 1 2018 Proofpoint, Inc.

Proofpoint at a Glance LEADING CUSTOMERS DEEP SECURITY DNA UNIQUE VISIBILITY PARTNERS & AQUISITIONS 59 Fortune 100 125+ threat ops and research team 6B+ messages processed daily 40K+ customers ~21% revenue invested in R&D 500B+ node threat graph CLOUDMARK 90%+ renewal rate 300K+ daily malware samples 8B+ URLs per day 2 2018 Proofpoint, Inc.

Industry trends 3 2018 Proofpoint, Inc.

Shifts in the Industry Threats use social engineering, not vulnerabilities Shift to cloud & mobile creates new threat vectors, data exposure Email fraud becomes #1 source of loss 99%+ Rely on user to run malicious code 70% Malicious links are credential phishing $5.3B Direct losses since January 2015, up 2,370% 40,203 Organizations victimized in the US alone Source: FBI 2017 4 2018 Proofpoint, Inc.

A People-Centric View of Vulnerability High Value Access to critical systems Access to sensitive data Authority over teams with access Highly targeted Highly sophisticated High volumes Highly Attacked High Risk Targets Highly Vulnerable Vulnerable devices or networks Interacts with malicious content Highly visible 5 2018 Proofpoint, Inc.

Email: #1 Threat Vector $ Email Invented Hello, WWW! Spam Email Malware Spear Phishing Social Eng Attacks Data Breaches Ransomware BEC 1970 1990 2000 2010 2015 $712 Per employee $3.7M Per company $1B+ For large breaches $5B In 2017 $5.3B worldwide Source: CSOonline.com, Cybersecurity ventures, Nucleus Research, FBI 6 2018 Proofpoint, Inc.

Organisations Underinvest in Email; Attackers Don t IT Security Industry Attack Vectors Network 62% Endpoint 18% Web 12% Email 8% Other 90%+ of sophisticated attacks target people, largely via email Source: Gartner (2017 forecast) Source: Verizon DBIR, Trend Micro, FEYE, etc. 7 2018 Proofpoint, Inc.

The Great Migration to Office 365 & Cloud 67% 78% of enterprises have told Gartner that they will migrate to Office 365 by 2020 28% 38% 43% 60% Will use 3rd party tools to protect Office 365 8 2018 Proofpoint, Inc.

In the Sights of the Actor 9 2018 Proofpoint, Inc.

Everyone is Targeted All Size Organizations All Industries All Roles Average # BEC Attacks Per Company Targeted 2017-Q2 Manufacturing 44 Telecommunications 39 Technology 38 Energy/Utilities 31 Automotive 26 Financial Services 23 Retail 22 Transportation 20 Healthcare 19 CFO HR FINANCE PAYROLL COO 47% 25% 13% 8% 5% Source: Proofpoint Threat Research 10 2018 Proofpoint, Inc.

The Email Fraud Challenge $5.3B Reported Losses Due to BEC (FBI) 2/3 Impostor Emails are Domain-spoofing Attacks (Proofpoint) 95% Enterprise Network Attacks Begin with Spear Phishing (SANS Institute) $100M 150% 45% Stolen by 1 Person Spoofing Business Partners (US DOJ) YoY Increase of Consumer Phishing (APWG) Conversion Rate for Consumer Email Fraud (Google) 11 2018 Proofpoint, Inc.

Solutions to help 12 2018 Proofpoint, Inc.

Advanced Email Security Email Protection Targeted Attack Protection Email arrives Email Security Impostor Dynamic Anti-Virus SPAM Virus Classification Malware DDOSReputation Phishing Attachment Malicious Defense Attachments Advanced Threats Advanced Threats URL Defense Malicious URLs TAP SaaS Defense Email Fraud Protection Executive Impersonation Supply-chain Phishing Email Fraud Domain Email Fraud (BEC) Defense Discover Consumer Phishing Look Alike Business Continuity Remediation TRAP Response Business Continuity Continuity Information Protection Exfiltration Protecting Insider Threats Sensitive Information Regulatory Compliance Email Encryption Email DLP SaaS Protection Email leaves 13 2018 Proofpoint, Inc.

Advanced Email Security Email Protection Targeted Attack Protection Email arrives Email Security Impostor Dynamic Anti-Virus SPAM Virus Classification Malware DDOSReputation Phishing Attachment Malicious Defense Attachments Advanced Threats Advanced Threats URL Defense Malicious URLs TAP SaaS Defense Email Fraud Protection Executive Impersonation Supply-chain Phishing Email Fraud Domain Email Fraud (BEC) Defense Discover Consumer Phishing Look Alike Business Continuity Remediation TRAP Response Business Continuity Continuity Information Protection Exfiltration Protecting Insider Threats Sensitive Information Regulatory Compliance Email Encryption Email DLP SaaS Protection Email leaves 14 2018 Proofpoint, Inc.

Delivering People-Centric Security RISK VISIBILITY PREVENT DEFEND RESPOND THREAT PROTECTION Stop Email Fraud Stop Email Threats Orchestrate Response INFORMATION PROTECTION Limit Data Exposure Protect Data Access Stop Data Loss USER PROTECTION Simulate Attacks Isolate Web Browsing Train Users 15 2018 Proofpoint, Inc.

WIN A RING AT THE PROOFPOINT STAND. Visibility. It matters in all types of security: network and home. Take a Threat Discover Risk Assessment to win a Ring Video Doorbell and you could walk away with a better view of who s knocking on your door at home. 16 2018 Proofpoint, Inc.

Thank You! 17 2018 Proofpoint, Inc.