13
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Embed Size (px)

Citation preview

Page 1: Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Strong Security for Your Weak Link:

Implementing People-Centric Security

Jennifer Cheng, Director of Product Marketing

Page 2: Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 2

Current security tools are ineffective at stopping even commodity threats, let alone targeted attacks.

.03%

Dridex

.02%

Dyre

?

Targeted

Today’s security tools are failing.

Page 3: Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 3

Advanced threats target the way people work.

Source: Verizon DBIR.

>90%of targeted

attacks start with email

<10%start from web,

social and other sources

100%of targeted

attacksaffect people

Page 4: Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 4

People are creating more data to protect.

Average user creates 2TB of data/year

Humans create up to 80% of an

organization’s total data

Typical attack surface up 44X

Source: IDC.

Page 5: Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 5

The way people work is changing.

Cloud

Endpoints

Networks

Page 6: Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 6

Is the way you work being used against you?

MobileSocial Media

Email

Customer Service and

Support

Brand Engagement

Applications

Personal and Corporate Data

Web Authentication

Employee Identity

Page 7: Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 7

What is your social media security risk?

Account Takeover

Fraudulent Accounts Malware

“Troll” Content

Spam

Page 8: Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 8

Are your mobile apps leaking data?

“75% of all mobile security breaches will be through apps”

(Gartner IT Infrastructure & Operations Management Summit 2014)

Page 9: Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 9

Key Findings of The Human Factor 2015

On average, users click 1-in-25 malicious links in phish

66% of clicks occur within 24 hours after the message is received

Peak delivery times are during business hours

1-in-5 clicks on malicious links occur off the network

Attackers adapt faster than users can be educated

Page 10: Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 10

Can you tell when you’re being attacked?

Page 11: Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 11

Stopping Advanced Threats

Know bad actors and tools across the attack chain, updating the

defenses continuously.

Be in the flow of the attack channels to provide

comprehensive protection.

Stop attacks everywhere people use the target channel, on

network or off, on any device.

See Everything Correlate Everything Protect Everywhere

ACTIONINSIGHT

Page 12: Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 12

The Right Approach:

1. Stop advanced threats before they get to people

2. Protect the information people create to reduce the attack surface and compliance risk

3. Enable your people to respond quickly when things go wrong

Page 13: Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 13

proofpointNext-generation cybersecurity to protect the way people work today