SlideShare una empresa de Scribd logo
1 de 11
Phishing Education




BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM




    About: BrandProtect

■   Toronto based company, founded 2001
■   Award winning proprietary Technology
■   Certified by F.I.R.S.T.
      – Forum for Incident Response Security Teams

■   Microsoft partner
      – Phishing filter data provider for IE




    BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM



Identity Theft Attack Management Services


■   Rapid response service to deal with all forms of identity theft attacks
      – Phishing, Vishing, SMShing, Pharming and Malware
■   Best in class detection practices
      – Includes 24x7 response to abuse mail from customers
■   Support for employee education:
      – Incident response guidelines and simulated attack education
■   Support for customers
      – Browser plug-ins to protect against attacks from fraudulent websites
■   Secure Portal with enhanced functionality for workflow management
      – Case management, incident details, trending and reporting capability
■   Best practices from BrandProtect client and partner community
      – Access to threat alerts, insights and solution sharing with peers




    BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM




           SpearPhishing – A growing problem

■   > 15,000 corporate victims in 15 months
■   Victim Losses have
    exceeded $100,000

■ Recent         Victims
     – Salesforce.com
     – Critical infrastructure
       at large energy company




           BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM



Conventional Measures For Employee Education


•   Brown Bag Sessions

•   Security Posters

•   Email Blasts




    BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM




    A Better Way

Mock Phishing Exercises

■   Emulate real phishing attacks

■   Train subjects by example

■   Measure susceptibility



    BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM




           A better way

■ Web-based platform that facilitates the execution of mock
  phishing exercises and user awareness training
■ Easy Setup
■ Real Metrics*
■ Targeted Awareness Training


* We do NOT collect or store passwords. Only detect if they were entered




           BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM



Case Study: Measuring Improvement




BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM




         Targeted Awareness Training

    Employees found to be susceptible can immediately be
    redirected to:

•   Internal corporate training websites
•   Built-in educational message
•   Educational comic strip
•   Generic message non-indicative of the underlying activity




          BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM




    Common reasons for implementation

■ To make it part of annual security audit and training
■ To help employees to not get infected at work/home
■ To help employees explain phishing to customers
      – “Train the trainers”




    BDProtect Inc. 2009 CONFIDENTIAL
The leader in internet reputation managementTM




More Information




BDProtect Inc. 2009 CONFIDENTIAL

Más contenido relacionado

La actualidad más candente

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingTIKAJ
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-securityMarya Sholevar
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginnersSamvel Gevorgyan
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackMark Mair
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 

La actualidad más candente (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
How To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and TrainingHow To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and Training
 
51 phishing attacks
51 phishing attacks51 phishing attacks
51 phishing attacks
 
51 phishing attacks
51 phishing attacks51 phishing attacks
51 phishing attacks
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginners
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing Attack
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 

Destacado

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
OW2 JOnAS Use CAse, OW2con11, Nov 24-25, Paris
OW2 JOnAS Use CAse, OW2con11, Nov 24-25, ParisOW2 JOnAS Use CAse, OW2con11, Nov 24-25, Paris
OW2 JOnAS Use CAse, OW2con11, Nov 24-25, ParisOW2
 
KASSI Open Source Research Project, OW2con11, Nov 24-25, Paris
KASSI Open Source Research Project, OW2con11, Nov 24-25, ParisKASSI Open Source Research Project, OW2con11, Nov 24-25, Paris
KASSI Open Source Research Project, OW2con11, Nov 24-25, ParisOW2
 
OW2con'14- erOCCI, a scalable, model-based REST API framework
OW2con'14- erOCCI, a scalable, model-based REST API frameworkOW2con'14- erOCCI, a scalable, model-based REST API framework
OW2con'14- erOCCI, a scalable, model-based REST API frameworkOW2
 
OW2con'14 - Keynote from Microsoft
OW2con'14 - Keynote from MicrosoftOW2con'14 - Keynote from Microsoft
OW2con'14 - Keynote from MicrosoftOW2
 
CLIF as a Service: Distributed performance testing in continuous integration...
CLIF as a Service:  Distributed performance testing in continuous integration...CLIF as a Service:  Distributed performance testing in continuous integration...
CLIF as a Service: Distributed performance testing in continuous integration...OW2
 
Mystery Salamanca
Mystery SalamancaMystery Salamanca
Mystery Salamancaalfcoltrane
 
LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora.
 LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora. LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora.
LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora.OW2
 
Open Source Innovation Factory, OW2con11, Nov 24-25, 2011, Paris
Open Source Innovation Factory, OW2con11, Nov 24-25, 2011, ParisOpen Source Innovation Factory, OW2con11, Nov 24-25, 2011, Paris
Open Source Innovation Factory, OW2con11, Nov 24-25, 2011, ParisOW2
 
カマコンバレー @YOKOHAMA Future Session 150421
カマコンバレー @YOKOHAMA Future Session 150421カマコンバレー @YOKOHAMA Future Session 150421
カマコンバレー @YOKOHAMA Future Session 150421Kanshin!, Inc.
 
Social media knockdown
Social media knockdownSocial media knockdown
Social media knockdowntellem
 
Chapter 1 presentation
Chapter 1 presentationChapter 1 presentation
Chapter 1 presentationdphil002
 
"Odpowiedzialne dziennikarstwo"
"Odpowiedzialne dziennikarstwo" "Odpowiedzialne dziennikarstwo"
"Odpowiedzialne dziennikarstwo" Ciszewski MSL
 

Destacado (20)

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
OW2 JOnAS Use CAse, OW2con11, Nov 24-25, Paris
OW2 JOnAS Use CAse, OW2con11, Nov 24-25, ParisOW2 JOnAS Use CAse, OW2con11, Nov 24-25, Paris
OW2 JOnAS Use CAse, OW2con11, Nov 24-25, Paris
 
KASSI Open Source Research Project, OW2con11, Nov 24-25, Paris
KASSI Open Source Research Project, OW2con11, Nov 24-25, ParisKASSI Open Source Research Project, OW2con11, Nov 24-25, Paris
KASSI Open Source Research Project, OW2con11, Nov 24-25, Paris
 
OW2con'14- erOCCI, a scalable, model-based REST API framework
OW2con'14- erOCCI, a scalable, model-based REST API frameworkOW2con'14- erOCCI, a scalable, model-based REST API framework
OW2con'14- erOCCI, a scalable, model-based REST API framework
 
OW2con'14 - Keynote from Microsoft
OW2con'14 - Keynote from MicrosoftOW2con'14 - Keynote from Microsoft
OW2con'14 - Keynote from Microsoft
 
Life21
Life21Life21
Life21
 
Project Progress
Project ProgressProject Progress
Project Progress
 
CLIF as a Service: Distributed performance testing in continuous integration...
CLIF as a Service:  Distributed performance testing in continuous integration...CLIF as a Service:  Distributed performance testing in continuous integration...
CLIF as a Service: Distributed performance testing in continuous integration...
 
Mystery Salamanca
Mystery SalamancaMystery Salamanca
Mystery Salamanca
 
LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora.
 LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora. LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora.
LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora.
 
Ppt ch 16
Ppt ch 16Ppt ch 16
Ppt ch 16
 
Open Source Innovation Factory, OW2con11, Nov 24-25, 2011, Paris
Open Source Innovation Factory, OW2con11, Nov 24-25, 2011, ParisOpen Source Innovation Factory, OW2con11, Nov 24-25, 2011, Paris
Open Source Innovation Factory, OW2con11, Nov 24-25, 2011, Paris
 
カマコンバレー @YOKOHAMA Future Session 150421
カマコンバレー @YOKOHAMA Future Session 150421カマコンバレー @YOKOHAMA Future Session 150421
カマコンバレー @YOKOHAMA Future Session 150421
 
Chubby
ChubbyChubby
Chubby
 
7. Por qué leer a los clásicos
7. Por qué leer a los clásicos7. Por qué leer a los clásicos
7. Por qué leer a los clásicos
 
Social media knockdown
Social media knockdownSocial media knockdown
Social media knockdown
 
Por qué leer a los clásicos, de
Por qué leer a los clásicos, dePor qué leer a los clásicos, de
Por qué leer a los clásicos, de
 
Chapter 1 presentation
Chapter 1 presentationChapter 1 presentation
Chapter 1 presentation
 
We Were
We WereWe Were
We Were
 
"Odpowiedzialne dziennikarstwo"
"Odpowiedzialne dziennikarstwo" "Odpowiedzialne dziennikarstwo"
"Odpowiedzialne dziennikarstwo"
 

Similar a Phishing Education Mock Exercises

Brand Protect Services
Brand Protect ServicesBrand Protect Services
Brand Protect ServicesDavid Hughes
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsEnterprise Management Associates
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers Precisely
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Sal Abramo
 
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...Enterprise Management Associates
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Enterprise Management Associates
 
Customer Success and Security Technology
Customer Success and Security TechnologyCustomer Success and Security Technology
Customer Success and Security TechnologyGainsight
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000finance40
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber WarfareSwapnil Jagtap
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxKENNEDY GITHAIGA
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 

Similar a Phishing Education Mock Exercises (20)

Brand Protect Services
Brand Protect ServicesBrand Protect Services
Brand Protect Services
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
 
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
 
Securing the Digital Enterprise
Securing the Digital EnterpriseSecuring the Digital Enterprise
Securing the Digital Enterprise
 
Customer Success and Security Technology
Customer Success and Security TechnologyCustomer Success and Security Technology
Customer Success and Security Technology
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptx
 
Passwordless Authentication
Passwordless AuthenticationPasswordless Authentication
Passwordless Authentication
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 

Último

Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 

Último (20)

VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 

Phishing Education Mock Exercises

  • 2. The leader in internet reputation managementTM About: BrandProtect ■ Toronto based company, founded 2001 ■ Award winning proprietary Technology ■ Certified by F.I.R.S.T. – Forum for Incident Response Security Teams ■ Microsoft partner – Phishing filter data provider for IE BDProtect Inc. 2009 CONFIDENTIAL
  • 3. The leader in internet reputation managementTM Identity Theft Attack Management Services ■ Rapid response service to deal with all forms of identity theft attacks – Phishing, Vishing, SMShing, Pharming and Malware ■ Best in class detection practices – Includes 24x7 response to abuse mail from customers ■ Support for employee education: – Incident response guidelines and simulated attack education ■ Support for customers – Browser plug-ins to protect against attacks from fraudulent websites ■ Secure Portal with enhanced functionality for workflow management – Case management, incident details, trending and reporting capability ■ Best practices from BrandProtect client and partner community – Access to threat alerts, insights and solution sharing with peers BDProtect Inc. 2009 CONFIDENTIAL
  • 4. The leader in internet reputation managementTM SpearPhishing – A growing problem ■ > 15,000 corporate victims in 15 months ■ Victim Losses have exceeded $100,000 ■ Recent Victims – Salesforce.com – Critical infrastructure at large energy company BDProtect Inc. 2009 CONFIDENTIAL
  • 5. The leader in internet reputation managementTM Conventional Measures For Employee Education • Brown Bag Sessions • Security Posters • Email Blasts BDProtect Inc. 2009 CONFIDENTIAL
  • 6. The leader in internet reputation managementTM A Better Way Mock Phishing Exercises ■ Emulate real phishing attacks ■ Train subjects by example ■ Measure susceptibility BDProtect Inc. 2009 CONFIDENTIAL
  • 7. The leader in internet reputation managementTM A better way ■ Web-based platform that facilitates the execution of mock phishing exercises and user awareness training ■ Easy Setup ■ Real Metrics* ■ Targeted Awareness Training * We do NOT collect or store passwords. Only detect if they were entered BDProtect Inc. 2009 CONFIDENTIAL
  • 8. The leader in internet reputation managementTM Case Study: Measuring Improvement BDProtect Inc. 2009 CONFIDENTIAL
  • 9. The leader in internet reputation managementTM Targeted Awareness Training Employees found to be susceptible can immediately be redirected to: • Internal corporate training websites • Built-in educational message • Educational comic strip • Generic message non-indicative of the underlying activity BDProtect Inc. 2009 CONFIDENTIAL
  • 10. The leader in internet reputation managementTM Common reasons for implementation ■ To make it part of annual security audit and training ■ To help employees to not get infected at work/home ■ To help employees explain phishing to customers – “Train the trainers” BDProtect Inc. 2009 CONFIDENTIAL
  • 11. The leader in internet reputation managementTM More Information BDProtect Inc. 2009 CONFIDENTIAL