SlideShare a Scribd company logo
Using Return Path Data to Protect Your Brand
Security Breakout Session
Brian Westnedge, Sr. Director of Client Services
Agenda
•  Email fraud trends and impact
•  The power of data: email threat intelligence
•  The Return Path Data Cloud
•  Tactics used by cybercriminals today
•  Unite against email fraud: tips for defending your customers, brand, and
bottom line
•  Questions
Email Fraud Trends
& Impact
Email Delivers Business Value…
Increases
Customer Loyalty
Boosts
Revenue
Reduces
Operating Costs
…But Its Impact Is Being Eroded
5 out of 6 big
companies
are targeted with
phishing attacks
Phishing costs brands
worldwide $4.5 billion
each year
RSA identifies
a phishing attack
every minute
Email fraud has
up to a 45%
conversion rate
Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm
$4.5 B 1 MIN 5/6 45%
Phishing Leads To – Revenue Losses
•  Reduced trust in brand:
•  Subscribers don’t know what to trust
•  Reduced effectiveness of email
•  ISPs don’t know what to trust
Customers are 42% less likely to
interact with a brand after being
phished or spoofed.
Phishing Leads To – Unwanted Media Attention
“If you boil the jobs down of IT security
professionals, they are ultimately tasked with
protecting the brand… If you have a breach,
research suggests that 60% of your customers will
think about moving and 30% actually do.”
Bryan Littlefair
Global Chief Information Security Officer
Aviva
Phishing Leads To – Remediation Costs
Fraud Losses Malware Infection Investigation Remediation
Can You Spot a
Spoof?
Anatomy Of A
Phishing Email
to: You <you@yourdomain.com>
from: Phishing Company <phishingcompany@spoof.com>
subject: Unauthorized login attempt
Dear Customer,
We have recieved noticed that you have recently
attempted to login to your account from an unauthorized
device.
As a saftey measure, please visit the link below to
update your login details now:
http://www.phishingemail.com/updatedetails.asp
Once you have updated your details your account will be
secure from further unauthorized login attempts.
Thanks,
The Phishing Team
1 attachment
Making an email
look legitimate by
spoofing the
company name in
the “Display Name”
field.
Tricking email
servers into
delivering the email
to the inbox by
spoofing the
“envelope from”
address hidden in
the technical header
of the email.
Including logos,
company terms,
and urgent
language in the body
of the email.
Making an email
appear to come from
a brand by using a
legitimate company
domain, or a domain
that looks like it in
the “from” field.
Creating convincing
subject lines to drive
recipients to open
the message.
Including links to
malicious websites
that prompt users to
give up
credentials
Including
attachments
containing malicious
content.
From: service@paypal.com <paypal@service.com>
From: PayPal <paypal@e.paypal.co.uk>
The Power of the
Right Data
Knowledge Is Your Best Defense
•  We know there is no silver bullet.
•  But defense starts with understanding.
•  Data is the key to that understanding.
Breadth, Depth, and Speed
Contactually Molto ParibusGetAirHelp
Message Finder UnsubscriberOrganizer
EMAIL THREAT
DATA
· Consumer inbox data
· Email delivery data
· Authentication results
· Message level data
· SPAM trap & complaints data
EMAIL THREAT
INTELLIGENCE
· Domain-spoofing alerts
· Brand-spoofing intelligence
· Suspicious activity map
· Fraudcaster URL feed
· Sender Score: IP reputation
Email Fraud: Primary Attack Vectors
Domain Spoofing
(from domains owned by the brand)
Brand Spoofing
(from domains outside the brand’s control)
phish@company.com company@phish.com
30% of Attacks Spoof Domains You Own
30% Domain
Spoofing
•  Active Emailing Domains
•  Non-Sending Domains
•  Defensively-Registered
Domains
70% Brand
Spoofing
•  Cousin Domains
•  Display Name Spoofing
•  Subject Line Spoofing
•  Email Account Spoofing
Source: Return Path / APWG White Paper, 2014
Unite Against
Email Fraud
Tips for defending your customers, your brand, and
your bottom line.
Leading Companies Fighting Email Fraud
DMARC (Domain-based Message Authentication Reporting &
Conformance):
•  Technical specification created to help reduce the potential for email-
based abuse (www.dmarc.org)
•  Prevents domain-based spoofing by blocking fraudulent activity
appearing to come from domains under your control
•  Provides threat reporting mechanism (aggregate and forensic data)
#1: Authenticate Your Email
“Simply put, the DMARC standard works.
In a blended approach to fight email fraud, DMARC
represents the cornerstone of technical controls
that commercial senders can implement today to
rebuild trust and retake the email channel for
legitimate brands and consumers.”
Edward Tucker
Head of Cyber Security
Her Majesty’s Revenue & Customs
•  Addressing the 70% of email attacks that spoof your brand using
domains your company does not own requires email threat
intelligence.
•  Get visibility into all types of email threats targeting you today.
#2: Leverage Email Threat Intelligence
•  The reality is, some attacks are always going to get through.
•  The more prepared your customers are, the better.
•  Create an educational website
•  Include anti-fraud language within your legitimate email
•  In the event of an attack, warn your customers immediately
#3: Educate Your Customers
•  Engage with Brand Protection teams to make the business case.
•  Create a sense of urgency.
•  Communicate the risks that result from not taking action:
•  Email fraud destroys brand reputation and erodes customer loyalty
•  Email fraud thwarts email marketing effectiveness
•  Email fraud negatively impacts revenue
#4: Raise Awareness with Top Executives
Learn More
www.returnpath.com/StopEmailFraud
Twitter: @StopEmailFraud
New: Download the Email Threat
Intelligence report at
bit.ly/EmailThreatIntel

More Related Content

PDF
Email Optimization Suite Product Overview
PDF
The Hidden Metrics of Email Deliverability Webinar
PDF
CASL One Year Later
PDF
Stemming the Fall of Email Deliverability
PDF
Understanding Gmail Deliverability
PDF
How to keep_your_lists_clean_and_improve_deliverability
PPTX
Webinar: Total Engagement Marketing
PDF
Return Path Academy on 7 September 2016
Email Optimization Suite Product Overview
The Hidden Metrics of Email Deliverability Webinar
CASL One Year Later
Stemming the Fall of Email Deliverability
Understanding Gmail Deliverability
How to keep_your_lists_clean_and_improve_deliverability
Webinar: Total Engagement Marketing
Return Path Academy on 7 September 2016

What's hot (16)

PPTX
Their Inbox, Your Responsibility
PPTX
Email marketing
PDF
TOP 5 EMAIL MARKETING MISTAKES
PPT
Vision 6 David Smerdon Evolve Your Email Marketing
PPTX
Building a World Class Email Preference Centre
PDF
Email Marketing and MailChimp
PPTX
Key Email Marketing Actions 2010
PPSX
Perfect Your Email Marketing
PPT
Welcome Email Best Practices Silverpop
PPTX
Aloha Welcome Email & Unsubscribe Best Practices
PPTX
Busting out of the junk folder: Dale Langley
PPTX
Return Path World Tour Keynote - San Francisco
PPTX
eDataSource Sponsored Lunch Presentation
PDF
Email Marketing Best Practices
PPT
Power of Relationships
PPT
Adma 2009 Vision 6 David Smerdon
Their Inbox, Your Responsibility
Email marketing
TOP 5 EMAIL MARKETING MISTAKES
Vision 6 David Smerdon Evolve Your Email Marketing
Building a World Class Email Preference Centre
Email Marketing and MailChimp
Key Email Marketing Actions 2010
Perfect Your Email Marketing
Welcome Email Best Practices Silverpop
Aloha Welcome Email & Unsubscribe Best Practices
Busting out of the junk folder: Dale Langley
Return Path World Tour Keynote - San Francisco
eDataSource Sponsored Lunch Presentation
Email Marketing Best Practices
Power of Relationships
Adma 2009 Vision 6 David Smerdon
Ad

Viewers also liked (12)

PDF
Newsletter 01 12-2015(38-22) (1)
PPT
Advanced Manufacturing Careers
PDF
InternDesignDay_0823
PPTX
Surrealismo
PPT
How to remove net.portalsepeti.com pop up
PDF
Bulletin cacds 15_10-2015(35-19)
PPTX
Return Path World Tour Keynote - New York
PDF
Antes do cinema
PPTX
Resident Retention Rehab - The Cure For Reluctant Renewals
PPTX
Lecture 3
PPTX
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...
Newsletter 01 12-2015(38-22) (1)
Advanced Manufacturing Careers
InternDesignDay_0823
Surrealismo
How to remove net.portalsepeti.com pop up
Bulletin cacds 15_10-2015(35-19)
Return Path World Tour Keynote - New York
Antes do cinema
Resident Retention Rehab - The Cure For Reluctant Renewals
Lecture 3
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...
Ad

Similar to Using Return Path Data to Protect Your Brand: Security Breakout Session - LA (20)

PDF
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
PDF
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
PPTX
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
PDF
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
PPTX
How Cybercriminals Cheat Email Authentication
PDF
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
PDF
Infographic: How to Prevent Email Fraud with DMARC
PDF
Marketing Cloud - Partner Office Hour (August 18, 2015)
PDF
Email threat detection and mitigation
PPTX
IS Presetation.pptx
PPTX
StayVigilantProtectYourEmailAccount.pptx
PDF
A guide to email spoofing
PPT
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
PDF
Is this a scam.pdf
PPT
Protecting Users from Fraud
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
PDF
phishing facts be aware and do not take the bait
PDF
PHISHING PROTECTION
PPTX
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
PPTX
PHISHING ATTACKS. _. _.pptx[]
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
How Cybercriminals Cheat Email Authentication
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
Infographic: How to Prevent Email Fraud with DMARC
Marketing Cloud - Partner Office Hour (August 18, 2015)
Email threat detection and mitigation
IS Presetation.pptx
StayVigilantProtectYourEmailAccount.pptx
A guide to email spoofing
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
Is this a scam.pdf
Protecting Users from Fraud
Phishing Scams: 8 Helpful Tips to Keep You Safe
phishing facts be aware and do not take the bait
PHISHING PROTECTION
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
PHISHING ATTACKS. _. _.pptx[]

More from Return Path (17)

PPTX
Green Eggs & Spam
PPTX
Return Path World Tour Keynote - Sao Paulo
PPTX
Return Path World Tour Keynote - Sydney
PPTX
Return Path World Tour Keynote - Paris
PPTX
World Tour Keynote Presentation - London
PDF
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
PDF
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
PDF
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
PDF
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
PDF
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
PDF
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
PDF
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
PPTX
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
PPTX
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
PDF
Increase Open Rates by Sending at the Best Time
PPTX
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
PPTX
Little Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao Paulo
Green Eggs & Spam
Return Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sydney
Return Path World Tour Keynote - Paris
World Tour Keynote Presentation - London
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Increase Open Rates by Sending at the Best Time
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao Paulo

Recently uploaded (20)

PPTX
Business Acumen Training GuidePresentation.pptx
PPTX
1_Introduction to advance data techniques.pptx
PPTX
IB Computer Science - Internal Assessment.pptx
PDF
Fluorescence-microscope_Botany_detailed content
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PPT
ISS -ESG Data flows What is ESG and HowHow
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PDF
Mega Projects Data Mega Projects Data
PDF
.pdf is not working space design for the following data for the following dat...
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPTX
Introduction to Knowledge Engineering Part 1
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPT
Miokarditis (Inflamasi pada Otot Jantung)
Business Acumen Training GuidePresentation.pptx
1_Introduction to advance data techniques.pptx
IB Computer Science - Internal Assessment.pptx
Fluorescence-microscope_Botany_detailed content
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
ISS -ESG Data flows What is ESG and HowHow
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
Mega Projects Data Mega Projects Data
.pdf is not working space design for the following data for the following dat...
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
IBA_Chapter_11_Slides_Final_Accessible.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Galatica Smart Energy Infrastructure Startup Pitch Deck
Clinical guidelines as a resource for EBP(1).pdf
Introduction to Knowledge Engineering Part 1
Business Ppt On Nestle.pptx huunnnhhgfvu
Acceptance and paychological effects of mandatory extra coach I classes.pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Miokarditis (Inflamasi pada Otot Jantung)

Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

  • 1. Using Return Path Data to Protect Your Brand Security Breakout Session Brian Westnedge, Sr. Director of Client Services
  • 2. Agenda •  Email fraud trends and impact •  The power of data: email threat intelligence •  The Return Path Data Cloud •  Tactics used by cybercriminals today •  Unite against email fraud: tips for defending your customers, brand, and bottom line •  Questions
  • 4. Email Delivers Business Value… Increases Customer Loyalty Boosts Revenue Reduces Operating Costs
  • 5. …But Its Impact Is Being Eroded 5 out of 6 big companies are targeted with phishing attacks Phishing costs brands worldwide $4.5 billion each year RSA identifies a phishing attack every minute Email fraud has up to a 45% conversion rate Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm $4.5 B 1 MIN 5/6 45%
  • 6. Phishing Leads To – Revenue Losses •  Reduced trust in brand: •  Subscribers don’t know what to trust •  Reduced effectiveness of email •  ISPs don’t know what to trust Customers are 42% less likely to interact with a brand after being phished or spoofed.
  • 7. Phishing Leads To – Unwanted Media Attention
  • 8. “If you boil the jobs down of IT security professionals, they are ultimately tasked with protecting the brand… If you have a breach, research suggests that 60% of your customers will think about moving and 30% actually do.” Bryan Littlefair Global Chief Information Security Officer Aviva
  • 9. Phishing Leads To – Remediation Costs Fraud Losses Malware Infection Investigation Remediation
  • 10. Can You Spot a Spoof?
  • 11. Anatomy Of A Phishing Email to: You <you@yourdomain.com> from: Phishing Company <phishingcompany@spoof.com> subject: Unauthorized login attempt Dear Customer, We have recieved noticed that you have recently attempted to login to your account from an unauthorized device. As a saftey measure, please visit the link below to update your login details now: http://www.phishingemail.com/updatedetails.asp Once you have updated your details your account will be secure from further unauthorized login attempts. Thanks, The Phishing Team 1 attachment Making an email look legitimate by spoofing the company name in the “Display Name” field. Tricking email servers into delivering the email to the inbox by spoofing the “envelope from” address hidden in the technical header of the email. Including logos, company terms, and urgent language in the body of the email. Making an email appear to come from a brand by using a legitimate company domain, or a domain that looks like it in the “from” field. Creating convincing subject lines to drive recipients to open the message. Including links to malicious websites that prompt users to give up credentials Including attachments containing malicious content.
  • 12. From: service@paypal.com <paypal@service.com> From: PayPal <paypal@e.paypal.co.uk>
  • 13. The Power of the Right Data
  • 14. Knowledge Is Your Best Defense •  We know there is no silver bullet. •  But defense starts with understanding. •  Data is the key to that understanding.
  • 15. Breadth, Depth, and Speed Contactually Molto ParibusGetAirHelp Message Finder UnsubscriberOrganizer
  • 16. EMAIL THREAT DATA · Consumer inbox data · Email delivery data · Authentication results · Message level data · SPAM trap & complaints data EMAIL THREAT INTELLIGENCE · Domain-spoofing alerts · Brand-spoofing intelligence · Suspicious activity map · Fraudcaster URL feed · Sender Score: IP reputation
  • 17. Email Fraud: Primary Attack Vectors Domain Spoofing (from domains owned by the brand) Brand Spoofing (from domains outside the brand’s control) phish@company.com company@phish.com
  • 18. 30% of Attacks Spoof Domains You Own 30% Domain Spoofing •  Active Emailing Domains •  Non-Sending Domains •  Defensively-Registered Domains 70% Brand Spoofing •  Cousin Domains •  Display Name Spoofing •  Subject Line Spoofing •  Email Account Spoofing Source: Return Path / APWG White Paper, 2014
  • 19. Unite Against Email Fraud Tips for defending your customers, your brand, and your bottom line.
  • 21. DMARC (Domain-based Message Authentication Reporting & Conformance): •  Technical specification created to help reduce the potential for email- based abuse (www.dmarc.org) •  Prevents domain-based spoofing by blocking fraudulent activity appearing to come from domains under your control •  Provides threat reporting mechanism (aggregate and forensic data) #1: Authenticate Your Email
  • 22. “Simply put, the DMARC standard works. In a blended approach to fight email fraud, DMARC represents the cornerstone of technical controls that commercial senders can implement today to rebuild trust and retake the email channel for legitimate brands and consumers.” Edward Tucker Head of Cyber Security Her Majesty’s Revenue & Customs
  • 23. •  Addressing the 70% of email attacks that spoof your brand using domains your company does not own requires email threat intelligence. •  Get visibility into all types of email threats targeting you today. #2: Leverage Email Threat Intelligence
  • 24. •  The reality is, some attacks are always going to get through. •  The more prepared your customers are, the better. •  Create an educational website •  Include anti-fraud language within your legitimate email •  In the event of an attack, warn your customers immediately #3: Educate Your Customers
  • 25. •  Engage with Brand Protection teams to make the business case. •  Create a sense of urgency. •  Communicate the risks that result from not taking action: •  Email fraud destroys brand reputation and erodes customer loyalty •  Email fraud thwarts email marketing effectiveness •  Email fraud negatively impacts revenue #4: Raise Awareness with Top Executives
  • 26. Learn More www.returnpath.com/StopEmailFraud Twitter: @StopEmailFraud New: Download the Email Threat Intelligence report at bit.ly/EmailThreatIntel