ed rowley - people make the best exploits: roadmapping your security investment in line with the...

21
1 © 2016 Proofpoint, PEOPLE MAKE THE BEST EXPLOITS: Mapping your security spending in line with the current security landscape

Upload: executive-leaders-network

Post on 15-Apr-2017

83 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

1 © 2016 Proofpoint, Inc.

PEOPLE MAKE THE BEST EXPLOITS:Mapping your security spending in line with the current security landscape

Page 2: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

2 © 2016 Proofpoint, Inc.

Page 3: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

3 © 2016 Proofpoint, Inc.

The Exploit: Ambassador Harriman

Page 4: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

4 © 2016 Proofpoint, Inc.

The Great Seal

Page 5: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

5 © 2016 Proofpoint, Inc.

The Thing

Page 6: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

6 © 2016 Proofpoint, Inc.

How most organizations think they are attacked

Page 7: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

7 © 2016 Proofpoint, Inc.

Network 55%

Endpoint 21%

Email10%

Web 15%

55% on protecting

the network

IT Security Spending in 2015

Page 8: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

8 © 2016 Proofpoint, Inc.

How the bad guys actually attack you

Page 9: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

9 © 2016 Proofpoint, Inc.

Cyberattacks Target the Human FactorAttacks like ransomware use

social engineering, not vulnerabilities

Credential phishing continues to evolve, scale

BEC/CEO fraudrunning rampant

99.7%Malicious docs

use macros

98%Malware links require user to

install

$2.3B

17,642Organizations victimized in

the US alone

Direct losses since January 2015, up 270% year over year

Source: FBI

Page 10: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

10 © 2016 Proofpoint, Inc.

Challenge: Persistent, Customized, Randomized AttacksMassive Infrastructure Large Scale Randomization

Overwhelming ScaleMass Personalization

Attacks launched and optimized daily

Automated, customized simultaneous attacks on thousands of individuals Hundreds of millions of messages per day

Tens of thousands of unique pieces of obfuscated malware

Hundreds of thousands of IPs, thousands of compromised sites

Page 11: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

11 © 2016 Proofpoint, Inc.

Mapping to Maturity Model

proofpoint nexus threat graph

Protect and

Detect Attacks

Respond Quickly

www

100101000101

Reduce Attack

Surface

Hunt

Internally

90%+

Hunt

Externally

1-5% 1-5% 5-10%

Page 12: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

12 © 2016 Proofpoint, Inc.

Working Across the Ecosystem to Deliver Better Security

IAMEndpoint

SIEM

MobileSocial

Network

Database

Email

proofpoint nexus

Page 13: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

13 © 2016 Proofpoint, Inc.

The Power of the Threat Graph

Page 14: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

14 © 2016 Proofpoint, Inc.

The Power of the Threat Graph

Start with a URL

Page 15: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

15 © 2016 Proofpoint, Inc.

The Power of the Threat Graph

Pivot to Forensics

Page 16: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

16 © 2016 Proofpoint, Inc.

The Power of the Threat Graph

Link to Campaign

Page 17: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

17 © 2016 Proofpoint, Inc.

The Power of the Threat Graph

Attribute to Actor

Page 18: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

18 © 2016 Proofpoint, Inc.

The Power of the Threat Graph

Find Related Posts/Emails

Page 19: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

19 © 2016 Proofpoint, Inc.

The Power of the Threat GraphIdentify Compromised

Account Owner

Page 20: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

20 © 2016 Proofpoint, Inc.

Threat Discover – see how your users have been targeted

Page 21: Ed Rowley - People Make the Best Exploits: Roadmapping your security investment in line with the emerging threat landscape (#ExecLN Event)

21 © 2016 Proofpoint, Inc.

The Right Approach:1. Stop advanced threats before they get to people

2. Protect the information people create to reduce the attack surface and compliance risk

3. Enable your people to respond quickly when things go wrong

4. Educate Users

To run a report showing how your users have been targeted by malicious email campaigns, please visit the Proofpoint booth or

send an email to [email protected] or [email protected]