SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Copyright © Wombat Security Technologies, Inc. 2008-2010
Jason Hong, PhD
Assoc. Prof, Carnegie Mellon University
CTO, Wombat Security Technologies
Protecting Organizations
from Phishing Scams
Copyright © Wombat Security Technologies, Inc. 2008-2010
Copyright © Wombat Security Technologies, Inc. 2008-2010
300 million spear phishing
emails are sent each day
-Cisco 2008 Annual Security Report
Copyright © Wombat Security Technologies, Inc. 2008-2010
Phishing Attacks are Pervasive
Phishing is a social engineering attack
Tricks users into sharing sensitive information
or installing malware
Used for identity theft, corporate espionage,
and theft of national secrets
Circumvents today’s security measures
Targets the person behind the keyboard
Works around encryption, two-factor, firewalls
Password reuse exacerbates problem, security
problem outside your perimeter can still affect you
Copyright © Wombat Security Technologies, Inc. 2008-2010
How Bad is Phishing?
Estimated ~0.4% of Internet users per year
fall for phishing attacks
Estimated $1B+ direct losses to consumers per year
Bank accounts, credit card fraud
Doesn’t include time wasted on recovery of funds,
restoring computers, emotional uncertainty
Growth rate of phishing is high
Over 45k+ reported unique sites / month
Social networking sites now major targets
Copyright © Wombat Security Technologies, Inc. 2008-2010
How Bad is Phishing?
Direct damage
Loss of sensitive customer data
Copyright © Wombat Security Technologies, Inc. 2008-2010
How Bad is Phishing?
Direct damage
Loss of sensitive customer data
Loss of intellectual property
Fraud
Attack on European carbon traders in early 2010,
close to $5m stolen in targeted phishing attack
Indirect damage can be high too
Damage to reputation, lost sales, etc
Response costs (call centers, recovery)
One bank estimated costs of $1M per phishing attack
Copyright © Wombat Security Technologies, Inc. 2008-2010
Spear-Phishing Attacks Rising
Type #1 – Uses info about your organization
This attack uses public information
Not immediately obvious it is an attack
Could be sent to military personnel at a base
Our data suggests around 50% of people
likely to fall for a good spear-phishing attack
General Clark is retiring next week,
click here to say whether you can
attend his retirement party
Copyright © Wombat Security Technologies, Inc. 2008-2010
Spear-Phishing Attacks Rising
Type #2 – Uses info about you specifically
Might use information from social networking sites,
corporate directories, or publicly available data
Thousands of high-ranking executives across the
country have been receiving e-mail messages this
week that appear to be official subpoenas from the
United States District Court in San Diego. Each
message includes the executive’s name, company
and phone number, and commands the recipient to
appear before a grand jury in a civil case.
-- New York Times Apr16 2008
Copyright © Wombat Security Technologies, Inc. 2008-2010
Protecting Your Users from Phish
Make it invisible
Email and web filters for your employees
Takedown providers for your customers
Better user interfaces
Better web browser interfaces
Train people
Most overlooked aspect of protection
More effective than people realize
Copyright © Wombat Security Technologies, Inc. 2008-2010
Problems with Traditional Security Training
All-day training sessions
Major disruption to work, no chance to practice skills,
not realistic b/c people aren’t attacked in a classroom
People don’t know they have a problem
Can’t go looking for the right information
Awareness campaigns don’t help
Telling people to watch out for phishing without
teaching meaningful skills to detect attacks is useless
Can also raise false positives (basically, raises
paranoia)
Traditional training is boring
Copyright © Wombat Security Technologies, Inc. 2008-2010
Embedded Training
Use simulated phishing attacks to train people
Teach people in the context they would be attacked
If a person falls for simulated phish, then show
intervention as to what just happened
Creates a “teachable moment”
However, doing embedded training right is
harder than it may seem
Copyright © Wombat Security Technologies, Inc. 2008-2010
Doing Embedded Training Right
Coordinating with Right Groups
US Dept of Justice sent hoax phishing email, but
didn’t notify the entity they were impersonating
Wasted lots of time and energy shutting it down
Anxiety for many days about safety of retirement
plans
One Air Force Base sent hoax phishing email
about Transformers 3 wanting to recruit
Spread a fairly large Internet rumor about the movie
Wasted lots of time and energy addressing rumors
Copyright © Wombat Security Technologies, Inc. 2008-2010
Doing Embedded Training Right
Psychological Costs
University of Indiana researchers sent hoax
phishing email to students and staff
“Some subjects called the experiment unethical,
inappropriate, illegal, unprofessional, fraudulent,
self-serving, and/or useless.”
“They called for the researchers … to be fired,
prosecuted, expelled, or otherwise reprimanded.”
“These reactions highlight that phishing not only has the
potential monetary costs associated with identity theft,
but also a significant psychological cost to victims.”
Copyright © Wombat Security Technologies, Inc. 2008-2010
Embedded Training with PhishGuru
Key differences:
Offer people immediate feedback and benefit (training)
Do so in fun, engaging, and memorable format
Key to effective training is learning science
Examines learning, retention, and transfer of skills
Example principles
Learning by doing
Immediate feedback
Conceptual-procedural
Personalization
Story-based agents
Reflection
Copyright © Wombat Security Technologies, Inc. 2008-2010
Copyright © Wombat Security Technologies, Inc. 2008-2010
Case Study #1
Canadian healthcare organization
Three-month embedded training campaign
190 employees
Security assessment and effective training in context
Copyright © Wombat Security Technologies, Inc. 2008-2010
Simulated Phishing Email
Copyright © Wombat Security Technologies, Inc. 2008-2010
Case Study
Copyright © Wombat Security Technologies, Inc. 2008-2010
Measurable Reduction in Falling for Phish
Viewed
Email
Only %
Viewed
Email and
Clicked Link % Employees
Campaign 1 20 10.53% 35 18.42% 190
Campaign 2 37 19.47% 23 12.11% 190
Campaign 3 7 3.70% 10 5.29% 189
Copyright © Wombat Security Technologies, Inc. 2008-2010
0 10 20 30 40
Campaign3
Campaign2
Campaign1
ViewedEmail and Clicked
Link
ViewedEmail Only
Copyright © Wombat Security Technologies, Inc. 2008-2010
Case Study 2
Tested with over 500 people over a month
1 simulated phish at beginning of month,
testing done at end of month
About 50% reduction in falling for phish
68 out of 85 surveyed said they recommend continuing
doing this sort of training in the future
“I really liked the idea of sending [organization] fake
phishing emails and then saying to them, essentially, HEY!
You could've just gotten scammed! You should
be more careful -- here's how....”
Copyright © Wombat Security Technologies, Inc. 2008-2010
Micro-Games for Cyber Security
Training doesn’t have to be boring
Training doesn’t have to take long either
Micro game format, play for short time
Two-thirds of Americans played
a video game in past six months
Not just young people
Average game player 35 years old
25% of people over 50 play games
Not just males
40% are women (casual games)
Copyright © Wombat Security Technologies, Inc. 2008-2010
Case Study 3
Tested Anti-Phishing Phil micro game with ~4500 people
Huge improvement by novices in identifying phishing URLs
Also dramatically lowered false positives
Copyright © Wombat Security Technologies, Inc. 2008-2010
False negatives for users who played Anti-Phishing Phil (“game condition”). False negatives are
situations where people incorrectly label a phishing site as legitimate. Novices saw the greatest
reduction in false negatives, and retained what they had learned.
Copyright © Wombat Security Technologies, Inc. 2008-2010
False positives for users who played the Anti-Phishing Phil game. False positives are situations
where people incorrectly label a legitimate site as phishing. Again, novices saw the greatest
improvement in reducing false positives, and retained what they had learned.
Copyright © Wombat Security Technologies, Inc. 2008-2010
Summary
Phishing scams on the rise
Spear-phishing are highly targeted phishing attacks
People are very susceptible to well-crafted phish
Today’s training can be boring and ineffective
Embedded training and micro games are an
effective alternative
Copyright © Wombat Security Technologies, Inc. 2008-2010
Thank you!
Thanks, PhishGuru.
Where can I learn
more?
Find more at
wombatsecurity.com
Anti-Phishing Phil white paper:
Cyber Security Training Game
Teaches People to Avoid Phishing
Attacks
PhishGuru white paper:
An Empirical Evaluation of
PhishGuru Training

Weitere ähnliche Inhalte

Was ist angesagt?

11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesPraetorian
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Deepa Devadas
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...sdavis532
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4Sarah K Miller
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING ijmvsc
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Beth Sallay
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18Symantec
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 

Was ist angesagt? (20)

11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4
 
Payment fraud
Payment fraudPayment fraud
Payment fraud
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 

Andere mochten auch

Home solar energy system
Home solar energy systemHome solar energy system
Home solar energy systemHellen Meyer
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 

Andere mochten auch (7)

Home solar energy system
Home solar energy systemHome solar energy system
Home solar energy system
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Ähnlich wie Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010

Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...Jason Hong
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingwardell henley
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Withum
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsLumension
 
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...Jason Hong
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Gradytomo006
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...IRJET Journal
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics WebinarTechSoup
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)Xola Adons
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 

Ähnlich wie Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010 (20)

Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_training
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware Trends
 
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Grady
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 

Kürzlich hochgeladen

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010

  • 1. Copyright © Wombat Security Technologies, Inc. 2008-2010 Jason Hong, PhD Assoc. Prof, Carnegie Mellon University CTO, Wombat Security Technologies Protecting Organizations from Phishing Scams
  • 2. Copyright © Wombat Security Technologies, Inc. 2008-2010
  • 3. Copyright © Wombat Security Technologies, Inc. 2008-2010 300 million spear phishing emails are sent each day -Cisco 2008 Annual Security Report
  • 4. Copyright © Wombat Security Technologies, Inc. 2008-2010 Phishing Attacks are Pervasive Phishing is a social engineering attack Tricks users into sharing sensitive information or installing malware Used for identity theft, corporate espionage, and theft of national secrets Circumvents today’s security measures Targets the person behind the keyboard Works around encryption, two-factor, firewalls Password reuse exacerbates problem, security problem outside your perimeter can still affect you
  • 5. Copyright © Wombat Security Technologies, Inc. 2008-2010 How Bad is Phishing? Estimated ~0.4% of Internet users per year fall for phishing attacks Estimated $1B+ direct losses to consumers per year Bank accounts, credit card fraud Doesn’t include time wasted on recovery of funds, restoring computers, emotional uncertainty Growth rate of phishing is high Over 45k+ reported unique sites / month Social networking sites now major targets
  • 6. Copyright © Wombat Security Technologies, Inc. 2008-2010 How Bad is Phishing? Direct damage Loss of sensitive customer data
  • 7. Copyright © Wombat Security Technologies, Inc. 2008-2010 How Bad is Phishing? Direct damage Loss of sensitive customer data Loss of intellectual property Fraud Attack on European carbon traders in early 2010, close to $5m stolen in targeted phishing attack Indirect damage can be high too Damage to reputation, lost sales, etc Response costs (call centers, recovery) One bank estimated costs of $1M per phishing attack
  • 8. Copyright © Wombat Security Technologies, Inc. 2008-2010 Spear-Phishing Attacks Rising Type #1 – Uses info about your organization This attack uses public information Not immediately obvious it is an attack Could be sent to military personnel at a base Our data suggests around 50% of people likely to fall for a good spear-phishing attack General Clark is retiring next week, click here to say whether you can attend his retirement party
  • 9. Copyright © Wombat Security Technologies, Inc. 2008-2010 Spear-Phishing Attacks Rising Type #2 – Uses info about you specifically Might use information from social networking sites, corporate directories, or publicly available data Thousands of high-ranking executives across the country have been receiving e-mail messages this week that appear to be official subpoenas from the United States District Court in San Diego. Each message includes the executive’s name, company and phone number, and commands the recipient to appear before a grand jury in a civil case. -- New York Times Apr16 2008
  • 10. Copyright © Wombat Security Technologies, Inc. 2008-2010 Protecting Your Users from Phish Make it invisible Email and web filters for your employees Takedown providers for your customers Better user interfaces Better web browser interfaces Train people Most overlooked aspect of protection More effective than people realize
  • 11. Copyright © Wombat Security Technologies, Inc. 2008-2010 Problems with Traditional Security Training All-day training sessions Major disruption to work, no chance to practice skills, not realistic b/c people aren’t attacked in a classroom People don’t know they have a problem Can’t go looking for the right information Awareness campaigns don’t help Telling people to watch out for phishing without teaching meaningful skills to detect attacks is useless Can also raise false positives (basically, raises paranoia) Traditional training is boring
  • 12. Copyright © Wombat Security Technologies, Inc. 2008-2010 Embedded Training Use simulated phishing attacks to train people Teach people in the context they would be attacked If a person falls for simulated phish, then show intervention as to what just happened Creates a “teachable moment” However, doing embedded training right is harder than it may seem
  • 13. Copyright © Wombat Security Technologies, Inc. 2008-2010 Doing Embedded Training Right Coordinating with Right Groups US Dept of Justice sent hoax phishing email, but didn’t notify the entity they were impersonating Wasted lots of time and energy shutting it down Anxiety for many days about safety of retirement plans One Air Force Base sent hoax phishing email about Transformers 3 wanting to recruit Spread a fairly large Internet rumor about the movie Wasted lots of time and energy addressing rumors
  • 14. Copyright © Wombat Security Technologies, Inc. 2008-2010 Doing Embedded Training Right Psychological Costs University of Indiana researchers sent hoax phishing email to students and staff “Some subjects called the experiment unethical, inappropriate, illegal, unprofessional, fraudulent, self-serving, and/or useless.” “They called for the researchers … to be fired, prosecuted, expelled, or otherwise reprimanded.” “These reactions highlight that phishing not only has the potential monetary costs associated with identity theft, but also a significant psychological cost to victims.”
  • 15. Copyright © Wombat Security Technologies, Inc. 2008-2010 Embedded Training with PhishGuru Key differences: Offer people immediate feedback and benefit (training) Do so in fun, engaging, and memorable format Key to effective training is learning science Examines learning, retention, and transfer of skills Example principles Learning by doing Immediate feedback Conceptual-procedural Personalization Story-based agents Reflection
  • 16. Copyright © Wombat Security Technologies, Inc. 2008-2010
  • 17. Copyright © Wombat Security Technologies, Inc. 2008-2010 Case Study #1 Canadian healthcare organization Three-month embedded training campaign 190 employees Security assessment and effective training in context
  • 18. Copyright © Wombat Security Technologies, Inc. 2008-2010 Simulated Phishing Email
  • 19. Copyright © Wombat Security Technologies, Inc. 2008-2010 Case Study
  • 20. Copyright © Wombat Security Technologies, Inc. 2008-2010 Measurable Reduction in Falling for Phish Viewed Email Only % Viewed Email and Clicked Link % Employees Campaign 1 20 10.53% 35 18.42% 190 Campaign 2 37 19.47% 23 12.11% 190 Campaign 3 7 3.70% 10 5.29% 189
  • 21. Copyright © Wombat Security Technologies, Inc. 2008-2010 0 10 20 30 40 Campaign3 Campaign2 Campaign1 ViewedEmail and Clicked Link ViewedEmail Only
  • 22. Copyright © Wombat Security Technologies, Inc. 2008-2010 Case Study 2 Tested with over 500 people over a month 1 simulated phish at beginning of month, testing done at end of month About 50% reduction in falling for phish 68 out of 85 surveyed said they recommend continuing doing this sort of training in the future “I really liked the idea of sending [organization] fake phishing emails and then saying to them, essentially, HEY! You could've just gotten scammed! You should be more careful -- here's how....”
  • 23. Copyright © Wombat Security Technologies, Inc. 2008-2010 Micro-Games for Cyber Security Training doesn’t have to be boring Training doesn’t have to take long either Micro game format, play for short time Two-thirds of Americans played a video game in past six months Not just young people Average game player 35 years old 25% of people over 50 play games Not just males 40% are women (casual games)
  • 24. Copyright © Wombat Security Technologies, Inc. 2008-2010 Case Study 3 Tested Anti-Phishing Phil micro game with ~4500 people Huge improvement by novices in identifying phishing URLs Also dramatically lowered false positives
  • 25. Copyright © Wombat Security Technologies, Inc. 2008-2010 False negatives for users who played Anti-Phishing Phil (“game condition”). False negatives are situations where people incorrectly label a phishing site as legitimate. Novices saw the greatest reduction in false negatives, and retained what they had learned.
  • 26. Copyright © Wombat Security Technologies, Inc. 2008-2010 False positives for users who played the Anti-Phishing Phil game. False positives are situations where people incorrectly label a legitimate site as phishing. Again, novices saw the greatest improvement in reducing false positives, and retained what they had learned.
  • 27. Copyright © Wombat Security Technologies, Inc. 2008-2010 Summary Phishing scams on the rise Spear-phishing are highly targeted phishing attacks People are very susceptible to well-crafted phish Today’s training can be boring and ineffective Embedded training and micro games are an effective alternative
  • 28. Copyright © Wombat Security Technologies, Inc. 2008-2010 Thank you! Thanks, PhishGuru. Where can I learn more? Find more at wombatsecurity.com Anti-Phishing Phil white paper: Cyber Security Training Game Teaches People to Avoid Phishing Attacks PhishGuru white paper: An Empirical Evaluation of PhishGuru Training

Hinweis der Redaktion

  1. Image from BusinessWeek Apr 2008 San Jose, Calif.-based Cisco's annual security study found that spam is growing quickly — nearly 200 billion spam messages are now sent each day, double the volume in 2007 — and that targeted attacks are also rising sharply. More than 0.4% of all spam sent in September were targeted attacks, Cisco found. That might sound low, but since 90% of all e-mails sent worldwide are spam, this means 800 million messages a day are attempts are spear phishing. A year ago, targeted attacks with personalized messages were less than 0.1% of all spam.
  2. Personalization Story-based agents Reflection
  3. http://wombatsecurity.com/file_download/6/PhishGuru%20White%20Paper.pdf http://wombatsecurity.com/file_download/8/Anti-Phishing%20Phil%20whitepaper.pdf