ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz

Click here to load reader

Upload: north-texas-chapter-of-the-issa

Post on 24-Jan-2018

31 views

Category:

Internet


4 download

TRANSCRIPT

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Email Security Growing in threats, quickening in pace

    Erez Haimowicz

    Enablement and Security

    Mimecast

    11-10-17

    NTXISSA.orgNTXISSA.orgNTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Email: The Ultimate App

    With demanding business and user requirements

    24 X 7 Email Availability

    ContinuousMission-critical Mobile

    .2

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Cyber Resilience

    The technology that provides the best possible multi-layered

    protection

    MULTILAYERED SECURITY

    A solution that allows you to continue to work while the issue

    is resolved

    CONTINUITY

    The knowledge that no matter what, you can get back to the

    last known good state

    REMEDIATION

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Countdown to a breach

    Verizon 2016 Data Breach Investigations Report (DBIR)

    100 Seconds average time-to-first-click

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    91% of all incidents start with a phish

    Wired

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    You can no longer stand in front of your board and say that you wont have an attack.

    As we all know, its now a case of when.

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    What those attacking look like

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Your company

    is at risk if

    you.. You have certain letters in your domain name You accept resumes on your website

    You have a team of people in finance

    You have a profile

    Your life is deemed interesting enough to be on

    Your company is at RISK if you

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Do You Have a Page Like This On Your Website?

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Real life examples with email

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Imagine being able to stop EVERY malicious file

    We all know the risks

    Trust your users not to click?

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Who Says Attacks Need to Involve Malware?

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Compromised AccountsStolen User Credentials

    Utilize Corp Web mail to spread attack internally or externally to partners/customers

    Careless UsersSending sensitive data internally such as projects and PII

    Oops, sent it to the wrong Michael

    Malicious InsidersPurposely distributing malware or malicious URLs

    Internal threats!

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Flawed - The technology23% open the phish & click

    Confidetial |

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    To run an attack

    You dont even need to know how to code

    Source: Forbes.com - "Ransomware As A Service Being Offered For

    $39 On The Dark Net" 7/15/16

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    AND to bypass sandboxes.

    FUD (Fully Undetectable) Crypting Services to avoid AV detection

    AND to bypass sandboxes

    FUD (Fully Undetectable) Crypting Services to avoid AV Detection

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Confidential |

    At Risk - The human firewall11% open the phish & run the attachment

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    HEY STRANGERS - Please send me files

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Click to View Dupe

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    You cant fix stupid

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Whatever we do, theyre still around and getting creative

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    Your business

    needs a cyber resilience strategy

    ARCHIVING

    SECURITY

    CONTINUITY

    NTXISSA.orgNTXISSA.org

  • NTXISSA Cyber Security Conference November 10-11, 2017 @NTXISSA #NTXISSACSC5

    29

    Thank you

    NTXISSA.orgNTXISSA.org