January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary...

22
January 29, 2019 Protecting Against Advanced Email Threats Beyond the Nigerian Prince Scam

Transcript of January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary...

Page 1: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

January 29, 2019

Protecting Against Advanced Email ThreatsBeyond the Nigerian Prince Scam

Page 2: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

2

“Phishing” is Many Things, Not One

> Requires different tools / strategies to combat

> Constantly evolving attack patterns easily bypass threat intel-based defenses

>Most dangerous:ѱ Impersonationsѱ Business Services spoofingѱ Credential Theft

Copyright © 2019 GreatHorn

Page 3: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

3

Common Characteristics of a Phishing Email

Trusted Sender

Urgency

Response Required

Copyright © 2019 GreatHorn

Page 4: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

Copyright © 2019 GreatHorn - GreatHorn Confidential 4

Sophisticated Attacks Look Real

1 in 25 people click on any given phishing attack

Page 5: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

5

Phishing Tactics & Countermeasures

Technical Tactics

> Display name spoof

> Email address spoof

> Branding

> Domain look-alikes

> URL obfuscation

Countermeasures> Check authentication

> Verify sending email addresses against known email addresses

> Review header dataѱ Reply toѱ Return Pathѱ IP Addressѱ Sending Domain

> Confirm destination URLs

Challenge: Users can’t / won’t review email metadata

Copyright © 2019 GreatHorn

Page 6: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

Threat Intelligence

Prescriptive Policies

Strict Authentication

Legacy Phishing Defenses Are Unrealistic

Incoming Email Inbox

Trash

Copyright © 2019 GreatHorn - GreatHorn Confidential 6

Page 7: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

Copyright © 2019 GreatHorn 7

Defense In Depth Hides Legacy Email Security Failings

Security Awareness training

Binary Good/Bad Email Security

Endpoint Tools

Multi-Factor Authentication

Tools that prevent attack or engagement with attack

Web Application Firewall

Threat Intel Email Security

Tools that reduce impact of an engaged attack

Page 8: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

Today's Threats Bypass Legacy Email Security

1 in 5security professionals

have to take direct remediation action at least weekly

8Copyright © 2019 GreatHorn - GreatHorn Confidential

1 in

25people click on any given phishing attack

Page 9: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

Copyright © 2019 GreatHorn 9

Email Security Failings Have Become More Prominent

Security Awareness training

Binary Good/Bad Email Security

Endpoint Tools

Multi-Factor Authentication

Web Application Firewall

Threat Intel Email Security

Tools that prevent attack or engagement with attack

Tools that reduce impact of an engaged attack

Page 10: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

End Users are Not the "Weakest Link"

Legacy Way

Modern Approach

>Mitigate user risk (Quarantine, quarantine, quarantine)

> Provide end users with the context and tools they need to positively contribute to email security efforts

Page 11: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

So...What Can We Do?

Practical Approaches to Stop Phishing

Copyright © 2018 GreatHorn - GreatHorn Confidential 11

Page 12: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

Processes

Technology

People

Copyright © 2019 GreatHorn 12

Email Security Lifecycle is More Than Just Tech

Page 13: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

13

Evaluate Business Processes with Phishing in Mind

Copyright © 2019 GreatHorn

Work with high risk teams to minimize risk

Develop internal communication processes for sharing incident information

Finance – How are wire transfers authorized?

HR / Execs – How do different classes of confidential information get communicated?

How do executive teams communicate urgent requests?

Who has access to what data? Who has access to which systems?

Protects against phishing attacks that target financial risk & information theft

Page 14: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

Copyright © 2019 GreatHorn - GreatHorn Confidential 14

Page 15: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

15

Engage End Users at Point of Risk

Copyright © 2019 GreatHorn

Ensure that security controls balance risk and business agility

Provide accessible tools for users to easily judge email authenticity

Invest in context-based tools to reinforce business processes and security hygiene habits

Develop program for users to participate in security improvements – phish reporting, etc.

Automate integration of user feedback email security

Protects against social engineering techniques

Page 16: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

Copyright © 2019 GreatHorn - GreatHorn Confidential 16

Provide Users with Context to Make Better Decisions

Page 17: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

17

Technology as Both Enablement and Enforcement

Copyright © 2019 GreatHorn

Assess existing threat detection tools against phishing threats

Is multi-factor authentication enabled across all apps?

Provide users real-time security context within email

Implement a feedback mechanism to determine effectiveness / accuracy of email security

Evaluate existing incident response processes / tools against ideal time-to-remediation goals

Align technology capabilities against business process / user feedback needs

Determine whether customizations are required to meet your organization’s risk profile / tolerance

Protects against phishing and enforces other areas

Page 18: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

Copyright © 2018 GreatHorn - GreatHorn Confidential 18

Use Technology to Simplify Manual Tasks

Page 19: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

A Comprehensive Approach

People

Business Process

Technology

Page 20: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

Copyright © 2019 GreatHorn 20

Next Steps

> Evaluate your risk against biggest threatsѱ Which tactics / goals make you most vulnerable?

> Prioritize core areas (brand reputation, business process, people, technology) based on analysis

> Create an integrated plan for each risk areaѱ E.g. Protecting against wire transfer fraud involves:

− Business process changes

− User training

− Making DMARC / authentication / header data accessible / understandable to end users− Contextualized warnings

Page 21: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

GreatHorn simplifies email security by automating threat detection, defense, and incident response.Security teams using GreatHorn not only gain enterprise-class protection against both sophisticated phishing attacks and traditional threats, they also reduce complexity, manual remediation time, and negative impact on business operations.

Copyright © 2019 GreatHorn - GreatHorn Confidential 21

Page 22: January 29, 2019 Protecting Against Advanced Email Threats Slides/Protecting-Advanced... · Binary Good/Bad Email Security Endpoint Tools Multi-Factor Authentication Web Application

Questions?

Copyright © 2019 GreatHorn - GreatHorn Confidential 22