0% found this document useful (0 votes)
76 views29 pages

PSAT Presentation

This document discusses running an effective security awareness program. It notes that the vast majority of ransomware and business email compromise attacks start with email. It also notes that 85% of data loss incidents involve a human element. The document promotes a people-centric security platform to deliver applications that protect against and respond to risks like email threats, data loss, insider threats, and web security. It discusses email security and compliance solutions as well as security awareness training challenges such as lacking visibility into vulnerable users and knowledge gaps, limited time to train users, and not knowing if the security awareness program is performing well.

Uploaded by

muhammad harits
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views29 pages

PSAT Presentation

This document discusses running an effective security awareness program. It notes that the vast majority of ransomware and business email compromise attacks start with email. It also notes that 85% of data loss incidents involve a human element. The document promotes a people-centric security platform to deliver applications that protect against and respond to risks like email threats, data loss, insider threats, and web security. It discusses email security and compliance solutions as well as security awareness training challenges such as lacking visibility into vulnerable users and knowledge gaps, limited time to train users, and not knowing if the security awareness program is performing well.

Uploaded by

muhammad harits
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

Running an Effective Security

Awareness Program
TOP 3 CYBERSECURITY RISKS: ALL PEOPLE-CENTRIC

Ransomware Arrival Protocol

Vast majority of ransomware


attacks start with email
— research
Email Everything
Else

BEC losses exceed all other


cybersecurity losses combined BEC
All
Others

— data for 791,790 incidents

Web
99% of data loss incidents are

85%
human-driven Cloud
Email
— proofpoint data across 3,000 organizations USB

INVOLVED A HUMAN
ELEMENT
PEOPLE-CENTRIC SECURITY PLATFORM
ARCHITECTURE
Deliver applications to protect and respond to risks
Email TRAP Security Cloud Email Insider
Data Loss Web
Threat Response Awareness Account Fraud Threat
Prevention Security
APPLICATIONS Protection Engine Training Defense Defense Management

NEXUS PEOPLE RISK EXPLORER

Threat Detection Ensemble


Supplier Emerging Unified Data
TAP Static / ML: Cred Access Risk Threats User Classification
ML: Supernova 3PA Intel Intel Activity (ML + Static)
SHARED SERVICES Sandbox Phish Risk

NEXUS THREAT GRAPH

Apply theCloud
Inbound/Outbound mostAPI effective
Hybrid analysis
Lightweight techniques
Browser Cloud Ecosystem
CORE ARCHITECTURE Email Connectors Connectors Connectors
Endpoint
Isolation Proxy integrations
Agent

Connect to where threats and data loss can be detected and mitigated
Security and Compliance Solutions

4
Email Security & Compliance

Email Protection Email Targeted Attack Protection


Continuity
Dynamic Anti-Spam Impostor/ Attachment SaaS
URL Defense URL Isolation Dashboard
Inbound Reputation Anti-Virus DMARC Defense Defense

DDOS Spam / Virus BEC / BEC / URL File-based EAC detection Phishing People-centric
Phish / Bulk Content Insp Content Insp scanning threats protection threat intel

Cloud Account Email Fraud Defense Security Archiving Internal Mail Threat Email Server
Defense Awareness Defense Response
Email Auth Domain Brand Training Auto Pull
(DMARC) Discover Defense
Email Account
Compromise (EAC) Domain Lookalike Display Name Phishing Sim. & PreserveInternal
and discover
Mail Sandbox and monitor Automatic message
detection and response Spoofing Domains Spoofing Abuse/attack Inbox mgmt. communications
sandboxing and mon. internal email retrieval

Information Protection
Internal
Email
Email DLP Secure Share
Encryption

Confidentiality Exfiltration & Confidentiality


Compliance
Outbound Premium Services

Proofpoint, Inc. - Confidential and Proprietary 5


Security Awareness
Training

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 6
Advancing Security Awareness: Where are you?

Compliance
Awareness

Behavior

Culture

Non-existent

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 7
Challenge: Lacking Visibility into Vulnerable
Users and Knowledge Gaps

53%
Know what phishing is
99%
Have a SAT Program

41%
Conduct phishing
simulation tests
© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary Source: State of the Phish Report, Proofpoint, 2022
8
Challenge: Limited Time to Train.
Hard to Keep Users Engaged

75% of
organizations have
2 hours or less to
make an impact

Data from Proofpoint 2022 State of the Phish Report

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 9
Challenge: Don’t Know if the Program is Performing

Fewer clicks on More people reporting Higher reported email Benchmark against
malicious links suspicious email accuracy rate your industry peers

• Only 41% track click rate of phishing test


• Less than 41% track reporting rate

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 10
How Proofpoint Security
Awareness Can Help

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary
ACE Framework

Change
Assess Behavior Evaluate

Automation Behavioral
Reinforcement
Threats & Knowledge, skills & Measure Adjust
Risks culture Adaptive Learning Change Incentives &
Consequences

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 12
Why Proofpoint Security Awareness?

Threat-Driven Content Tailored Education


Realistic phishing simulations and Adaptive learning to drive
threat-driven education & alerts sustained behavior change
Expand and
Scale

Threat Detection Better Visibility


Quickly identify malicious user- CISO Dashboard to level-up
reported messages your program’s visibility

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 13
Security Insights are in our DNA

#1 deployed solution of the F100, F1000, G2000

7,100+ Enterprise Customers 110,000+ SMB Customers 120+ world’s largest ISPs
16M+ cloud Global threat research and 400M+ domains
2B+ daily emails 6K+ IDS sensors
accounts data science teams monitored

46k+ apps in Deployed at key


26B+ URLs 12 detection engines (static,
catalog ML, behavior, etc.) internet backbones
86k+ social
400K+ daily unique media accounts
120M+ 2K+ cloud Tracking 100+
attachments tenants threat actors malware samples

Real-life phishing Threat-driven education Proofpoint threat intel and


Simulations based on the latest attacks detection stack

Insight into real email & Threat alerts to Insight into real impact of
people vulnerability communicate to users user behavior change

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 14
ACE Framework

• What users KNOW


Change
Assess • What users DO
Behavior Evaluate
• What users BELIEVE

Automation Behavioral
Reinforcement
Measure Adjust
Adaptive Learning Change Incentives &
Consequences

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 15
Assess: What Users KNOW
Knowledge Assessments:
“I like the combination of training, knowledge assessments
and mock phishing attacks. This enables training based on Accurately identify user knowledge gaps
need and training that focuses on weaknesses.” with assessments based on threat intel

Administer assessments that align


directly to specific adaptive learning
framework domains and different levels of
difficulty

Designed to be concise and precise;


easy for users to fit into schedule

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 16
Assess: What Users DO

Phishing Simulations:
 Determine how users will react when
faced with phishing emails, in a safe
environment

Real-life, customizable templates seen


by Proofpoint threat intel

Randomly-schedule and include


multiple templates per campaign

Optionally auto-enroll users who fail “The templates used are incredible. They look like
into training module(s) of your choice real phishing we have seen, and statistics are
provided for the average compromise rate.”
© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 17
Assess: Uncover Top Clickers and
Most Attacked Users in the Real World

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 18
Assess: What Users BELIEVE

Culture Assessments:
Learn how your users feel and what they
believe about your security program

Increase motivation to complete through


short, anonymous questionnaire

Identify what the areas of weakness are to


determine what to change

Impact user motivation and behavior change

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 19
Integrated with Proofpoint
Assess: Identify Risky Users and Quantify Threat Protection Platform

Human Risk
Nexus People Risk Explorer
(NPRE)

 Uncover risky users and departments


by evaluating their vulnerability, attack
index, and privilege

 Prioritize security efforts and focus on


real risk of the organization

 Provide recommended security


controls that reduce risk score
accordingly

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 20
ACE Framework

Change
Assess Behavior Evaluate

Threats & Knowledge, skills & Measure Adjust


Risks culture
• Tailored education Change Incentives &
Consequences
• Reinforce positive behavior

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 21
Tailored Education to Drive Motivation

Adaptive Learning Framework


 Provide learners with education at the right
level of difficulty (Beginner – Advanced) and
across key security domains
 Engage users with relevant training that
motivates them to put learning into practice

Microlearning
People
 Each module lasts < 3 minutes
 Overcome limited time to train- training across
key domains can be completed within an hour
 Focused on specific topics and outcomes

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 22
Integrated with Proofpoint
Threat-Guided Education Threat Protection Platform

Very Attacked People and Top


Clickers from TAP
Automatically enabled for assessments or
education
 See specific threat types for laser-
focused education tracks

“I felt we had a fairly mature program but this has


really launched us into the next level.

We’ve been able to immediately show the value.”

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 23
Interactive and Engaging Content

 Make training relevant to users with timely


threat-driven content
 Variety and assortment of content, from
corporate to edgy, choose-your-own-
adventure, and more
 Engage global audience with subtitle and
voiceover in their own language
 Educate users with specific curriculum
learning paths (NIST and ISO frameworks)

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 24
Reinforce Positive Security Habits

“In the Moment” & Real-world


Education
 Our Teachable Moment provides “just-in-time”
education when users fall for a phishing simulation

 Alert users with live action modules that highlight


the latest threats and attack tactics

Integrated with Proofpoint Threat Protection Platform

Email Warning Tags


 Improve user reporting rates and accuracy by
providing contextual nudges
 Reinforce positive reporting behavior by making it
easier for users to report

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 25
ACE Framework

Change
Assess Behavior Evaluate

Automation Behavioral
Reinforcement • CISO Dashboard
Threats & Knowledge, skills &
Risks culture Adaptive Learning
• Real-Time Reports

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 26
CISO Dashboard: C-Level Visibility, Admin Actionability
 Communicate security
awareness results to get
buy-in

 Benchmark and act on


areas needing
improvement

 Get visibility into


vulnerability and
participation in your
security programs

Integrated VAP data from TAP

27

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary
Real-time Reporting for Administrators

 Quickly see progress and


provide updates

 Dig deeper into


assignments, behavior

 Ensure completion of
assessments and training

 Take action directly from


the report

© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 28
© 2022 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 29

You might also like