people make the best exploits - cyber security...

13
1 © 2016 Proofpoint, Inc. PEOPLE MAKE THE BEST EXPLOITS Ryan Kalember SVP Cybersecurity Strategy

Upload: others

Post on 22-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PEOPLE MAKE THE BEST EXPLOITS - Cyber Security Summitcybersummitusa.com/.../2017/05/proofpointdallas.pdf · social engineering, not vulnerabilities Mobile, social, SaaS threats ramp

1 © 2016 Proofpoint, Inc.

PEOPLE MAKE THE BEST EXPLOITSRyan KalemberSVP Cybersecurity Strategy

Page 2: PEOPLE MAKE THE BEST EXPLOITS - Cyber Security Summitcybersummitusa.com/.../2017/05/proofpointdallas.pdf · social engineering, not vulnerabilities Mobile, social, SaaS threats ramp

9 © 2016 Proofpoint, Inc.

Attacks Increasingly Target Individuals, Not Infrastructure

Threats use social engineering, not vulnerabilities

Mobile, social, SaaS threats ramp and evolve

BEC/impostor email fraud becomes

board-level issue

$3.1B

22,143Organizations victimized in the

US alone

Direct losses since January 2015, up 1,300% year over year

Source: FBI

150%Increase in social media phishing

RATs become common in mobile apps

99%+Rely on user to run malicious

code

74%Malicious links are credential

phishing

Page 3: PEOPLE MAKE THE BEST EXPLOITS - Cyber Security Summitcybersummitusa.com/.../2017/05/proofpointdallas.pdf · social engineering, not vulnerabilities Mobile, social, SaaS threats ramp

10 © 2016 Proofpoint, Inc.

Network62%

Endpoint18%

Email8%

Web 12%

Source: Gartner (2017 forecast)

IT Security Industry

90%+of sophisticated attacks

target people, largely via email

Source: Verizon DBIR, Trend Micro, FEYE, etc.

Other

Attack Vectors

But Industry Is Not Aligned with the Threats

Page 4: PEOPLE MAKE THE BEST EXPLOITS - Cyber Security Summitcybersummitusa.com/.../2017/05/proofpointdallas.pdf · social engineering, not vulnerabilities Mobile, social, SaaS threats ramp

11 © 2016 Proofpoint, Inc.

Page 5: PEOPLE MAKE THE BEST EXPLOITS - Cyber Security Summitcybersummitusa.com/.../2017/05/proofpointdallas.pdf · social engineering, not vulnerabilities Mobile, social, SaaS threats ramp

12 © 2016 Proofpoint, Inc.

Page 6: PEOPLE MAKE THE BEST EXPLOITS - Cyber Security Summitcybersummitusa.com/.../2017/05/proofpointdallas.pdf · social engineering, not vulnerabilities Mobile, social, SaaS threats ramp

13 © 2016 Proofpoint, Inc.

Page 7: PEOPLE MAKE THE BEST EXPLOITS - Cyber Security Summitcybersummitusa.com/.../2017/05/proofpointdallas.pdf · social engineering, not vulnerabilities Mobile, social, SaaS threats ramp

14 © 2016 Proofpoint, Inc.

Page 8: PEOPLE MAKE THE BEST EXPLOITS - Cyber Security Summitcybersummitusa.com/.../2017/05/proofpointdallas.pdf · social engineering, not vulnerabilities Mobile, social, SaaS threats ramp

15 © 2016 Proofpoint, Inc.

Page 9: PEOPLE MAKE THE BEST EXPLOITS - Cyber Security Summitcybersummitusa.com/.../2017/05/proofpointdallas.pdf · social engineering, not vulnerabilities Mobile, social, SaaS threats ramp

16 © 2016 Proofpoint, Inc.

Page 10: PEOPLE MAKE THE BEST EXPLOITS - Cyber Security Summitcybersummitusa.com/.../2017/05/proofpointdallas.pdf · social engineering, not vulnerabilities Mobile, social, SaaS threats ramp

17 © 2016 Proofpoint, Inc.

Page 11: PEOPLE MAKE THE BEST EXPLOITS - Cyber Security Summitcybersummitusa.com/.../2017/05/proofpointdallas.pdf · social engineering, not vulnerabilities Mobile, social, SaaS threats ramp

18 © 2016 Proofpoint, Inc.

Effective Security: Be Where the Threat/Data Is

SaaS

$

Page 12: PEOPLE MAKE THE BEST EXPLOITS - Cyber Security Summitcybersummitusa.com/.../2017/05/proofpointdallas.pdf · social engineering, not vulnerabilities Mobile, social, SaaS threats ramp

19 © 2016 Proofpoint, Inc.

Recon Weaponize Deliver Exploit InstallCommand

&Control

Action

Effective Security: Better Protection at Delivery

• Better to stop attack before damage

• Better chance of detection

• Better intel and context for actors, campaigns

• Target already clicked, attacker has foothold

• Detection challenging, especially for malware-free attacks

• Difficult to put attack in context and link to campaign/actor

Recon/gateway effectiveness vs 90%+ of threats Rapid improvement in security posture

Page 13: PEOPLE MAKE THE BEST EXPLOITS - Cyber Security Summitcybersummitusa.com/.../2017/05/proofpointdallas.pdf · social engineering, not vulnerabilities Mobile, social, SaaS threats ramp

20 © 2016 Proofpoint, Inc.

Proofpoint at a Glance

~50%of the

Fortune 100

5000+enterprisecustomers

90%+renewal

rate

1B+messages

processed daily

8straight years of MQ leadership

40M+mobile apps

scanned

300K+daily malware

samples

100+threat ops and research team

strategic ecosystem integrations

~20%revenue invested

in R&D

LEADING CUSTOMERS DEEP SECURITY DNA

500B+ node threat

graph

UNIQUE VISIBILITY ENTERPRISE CLASS