fishing for phishers...1.introduction 2.solution overview – cloud email security, amp, umbrella,...

48
Fishing for Phishers

Upload: others

Post on 04-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Fishing for Phishers

Page 2: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

AGENDA1.Introduction2.Solution Overview – Cloud Email Security, AMP,

Umbrella, Duo & TALOS3.Case Studies4.Demo – Email Security, Umbrella, AMP Integration5.Q&A6.Conclusion

Introduction Solution Overview Case Studies Demo Q&A Conclusion

Page 3: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Solution Overview:Cloud Email Security, AMP, Umbrella, Duo & TALOS

Our Speaker…

Wesley WongCybersecurity Specialist

Page 4: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A
Page 5: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Why fight phishing?Email is the #1 attack vector.

Page 6: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A
Page 7: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A
Page 8: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A
Page 9: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A
Page 10: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Myth: We’re too small.

Page 11: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Reality: Being small could make you a more attractive target.

Page 12: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Myth: We train our employees.

Page 13: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Reality: Humans make mistakes.

Page 14: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Myth: We have a Firewall.

Page 15: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Reality: Threats will get past your firewall.

Page 16: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Defense in Depth

Page 17: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

1. Stop phishing emails from reaching your user’s inbox. 2. Determine the safety of email attachments.3. Block users from reaching malicious websites. 4. Use multi-factor authentication.

5. Leverage a threat intelligence you can trust.

Layering a Phishing Solution

Page 18: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Cloud Email Security (CES)Stop phishing emails from reaching your user’s inbox.

Page 19: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

AMPDetermine the safety of email attachments.

Page 20: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A
Page 21: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A
Page 22: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

UmbrellaBlock users from reaching malicious websites.

Page 23: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

DuoUse multi-factor authentication.

Page 24: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

What is MFA?Combining something only you should know with something only you should have.

Page 25: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Why Cisco?Supreme threat intelligence and seamless security integration

Page 26: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

TALOSLeverage a threat intelligence you can trust.

Page 27: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

See More Block more Respond Faster

Our Threat Intelligence Advantage

Page 28: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

300+Full Time Threat Intel Researchers

MILLIONSOf Telemetry Agents

4Global Data Centers

1100+Threat Traps

100+Threat Intelligence Partners

THREAT INTEL

1.5 MILLIONDaily Malware Samples

600 BILLIONDaily Email Messages

16 BILLIONDaily Web Requests

Honeypots

Open Source Communities

Vulnerability Discovery (Internal)

Product Telemetry

Internet-Wide Scanning

20 BILLIONThreats Blocked

INTEL SHARING

Talos Intel Background

Customer Data Sharing Programs

Provider Coordination Program

Open Source Intel Sharing

3rd Party Programs (MAPP)

Industry Sharing Partnerships (ISACs)

500+Participants

Page 29: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

20B

Threats Blocked (Daily)

Symantec

Palo Alto

Check Point

Fortinet 972M

Trend Micro250M

Page 30: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

1.5MTrend Micro500K

Palo Alto

Check PointFortinet

Microsoft

Symantec1M

Unique Malware Samples (Daily)

Page 31: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Seamless integrationEngineering solutions that work together and talk to each other

Page 32: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

“By adopting a set of security platforms and tools that all work together versus disparate pieces that may actually conflict with each other, you get an amplification of security effectiveness, as well as simplification of management.”

Ben M. JohnsonCEO of Liberty Technologies

Page 33: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Case Studies

Page 34: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A
Page 35: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

“A certain individual who is interested in carrying out a targeted attack will look into employees’ personal information. Email addresses are easy to retrieve and use, and offer a direct door to sensitive data and the possibility of moving within our network from there.”Juan Gámez Torres, Senior Security Consultant

Page 36: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Indra’s CES with AMP Implementation

Challenges• Protect tens of thousands of endpoints

from malicious emails

• Prone to advanced, targeted attacks via email

Results• Forty percent of incoming emails

blocked due to suspicious characteristics

• Ability to tightly control outbound messages

• Expanded security visibility and awareness

Page 37: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

“Cisco Email Security helps us separate what is good from what is bad, what is spam from what is legitimate, and so on. The number of suspicious emails that make it to our mailboxes is very low.”Juan Gámez Torres, Senior Security Consultant

Page 38: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A
Page 39: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

“We knew that antivirus and firewalls weren’t enough to protect our clients.”Eric Rockwell, CIO

Page 40: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

CentrexIT’s Umbrella Integration

Challenge• Provide strong security in industries that

are subject to rigorous regulatory scrutiny.

Impact• 70% fewer malware related tickets

• Avoided tens of thousands of dollars in ransom costs

• Saved thousands of hours of cleaning and troubleshooting

• Created auditable security trails for compliance

Page 41: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A
Page 42: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Bird’s Duo Integration

Challenge• Protect sensitive information, such as

customer data, intellectual property, business plans and more

Result• Mitigated the risk of compromised

passwords and phishing attacks in the organization

Page 43: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Demo - Umbrella

Page 44: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Q&A

Page 45: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Before we go…

Page 46: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

Click the link in the chat for a free trial of Cisco

Umbrella!

Page 47: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A

We Appreciate Your

Feedback!

Please take a moment to let us know if this session met your needs and expectations. The confidential evaluation survey will open once the event window is closed.

Page 48: Fishing for Phishers...1.Introduction 2.Solution Overview – Cloud Email Security, AMP, Umbrella, Duo & TALOS 3.Case Studies 4.Demo – Email Security, Umbrella, AMP Integration 5.Q&A