THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through email trust

Similar documents
Evaluating DMARC Effectiveness for the Financial Services Industry

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Curbing Threats & Spear Phishing The Promise & Results with DMARC

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Cyber Security: Confronting the Threat

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

THE DMARC GUIDE. Understanding DMARC for Securing

Managing cyber risks with insurance

Who s Doing the Hacking?

DMARC and your.bank Domain. September 2015 v

Sponsored by. A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Aggressive and Persistent: Using Frameworks to Defend Against Cyber Attacks

Security Summit. Protecting Taxpayers from Identity Theft Tax Refund Fraud

The Path Ahead for Security Leaders

Seamus Reilly Director EY Information Security Cyber Security

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

A strategic approach to fraud

the challenge our mission our advisors

Middle Class Economics: Cybersecurity Updated August 7, 2015

THE THREE Es OF MODERN SECURITY FOR PHISHING

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks

REPORT. Next steps in cyber security

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015

Achieving customer loyalty with customer analytics

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

A New Way For ers To Defend Themselves Against Fraud

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

How To Manage Risk On A Scada System

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

A Primer on Cyber Threat Intelligence

A NEW APPROACH TO CYBER SECURITY

Fraud Threat Intelligence

NATIONAL CYBER SECURITY AWARENESS MONTH

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

Into the cybersecurity breach

Five Strategies for Increasing the ROI of Marketing Events

WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper

October 24, Mitigating Legal and Business Risks of Cyber Breaches

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

A Quick Guide to Social Customer Service: Measure, Refine & Scale

CYBER SECURITY, A GROWING CIO PRIORITY

RETHINKING CYBER SECURITY Changing the Business Conversation

WHITE PAPER. Attack the Attacker HOW A MANAGED SECURITY SERVICE IMPROVES EFFICIENCY AND SAVES COST

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

How to Spot and Combat a Phishing Attack Webinar

Internet Reputation Management Guidelines Building a Roadmap for Continued Success

4.5% 2014 Digital Marketing Optimization Survey results > 4.5% Top lessons learned from the leaders

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

Top Fraud Trends Facing Financial Institutions

Examining the Evolving Cyber Insurance Marketplace

SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014

Fraud Solution for Financial Services

What Directors need to know about Cybersecurity?

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Microsoft s cybersecurity commitment

Leveraging Network and Vulnerability metrics Using RedSeal

WRITTEN TESTIMONY OF

THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED

AUTOMATED PENETRATION TESTING PRODUCTS

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

WHITEPAPER. V12 Group West Front Street, Suite 410 Red Bank, NJ

4How Marketing Leaders Can Take Control of Data for Better

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

Transcription:

THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX How to create a thriving business through email trust

FORWARD Today the role of the CISO is evolving rapidly. Gone are the days of the CISO as primarily a technologist and reactive fire fighter. In the current threat environment CISOs need to build relationships with other C-suite executives, positioning security as a business & financial risk area worthy of continuous board level attention, and advocating proactive investments to mitigate security risks before the bad news hits. Agari s solution is a great example of this type of proactive investment. A quick security win which mitigates brand risk, protects customers from harm by email cyber-criminals, and positively impacts the top line. Steve Katz World s first Chief Information Security Officer Former CISO at Citigroup and JP Morgan Owner, Security Risk Solutions

TAB LE O F CO NTE NTS INTRODUCTION THIS GUIDE IS FOR YOU 1 NEW CHALLENGES FOR THE SECURITY EXECUTIVE 3 AGARI YOUR STRATEGIC PARTNER 5 CONCLUSION 8

1 INTRODUCTION THIS GUIDE IS FOR YOU Email delivers revenue to your business. It brings customers, improves loyalty, and reduces customer acquisition costs. Protecting company email is a critical security initiative. Hundreds of companies are victimized by cyber criminals every month through email scams, fraud, and phishing.the cost to these companies reaches into the billions of dollars and has a powerful effect on their brand reputation. Agari understands the pressures you face as security becomes even more important in your company. We also know how important your specific technical and leadership skills are to assessing and managing your changing business environment. However, increasing importance placed on information management, risk management, brand protection, partner-relationship management, and other business functions will move you further away from your technical role and into the wider business spotlight. CISOs can play a significant role in transforming security from a set of technologies designed to protect business operations (which is inherently an internally focused approach) to cybersecurity as an important part of the organization s overall value chain 1 MAKE BRAND PROTECTION A CORE MISSION OF THE SECURITY TEAM. Forrester Research 1 1 Forrester Research. Twelve Recommendations for your Security Program in 2015. March 12, 2015. 1 THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX

1 INTRODUCTION THIS GUIDE IS FOR YOU The security executive function is evolving to include business objectives related to privacy, centralized global compliance responsibility, and mastering data analytics, data retention, and even knowledge management all revolving around information risk management practices. Your position will have newfound visibility and responsibility. You will be asked to make security decisions to protect your company and deliver positive ROI, profitability, and sustainability. You and your company will both benefit as the focus of your role moves from technology to exercising the business skills and relationships necessary to truly add value to your company and its customers. The security executive position is evolving into that of a business manager specializing in change management with refined information security skills. These skills are necessary to maintain efficient, reliable security processes for your company, as a security breach can mean a loss of revenue and may give your competition an advantage. A major security breach is now considered to be one of the highest business risks facing companies today. Agari created this guide for you the security champion. We recognize that a critical part of the security executive s business acumen is having a secure, trusted email channel as a core component of a company s risk management strategy. 1 2 THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX

2 NEW CHALLENGES FOR THE SECURITY EXECUTIVE With a strong, secure risk management system in place, you re able to deliver maximum value to stakeholders. But tenacious cyber criminals still stand in your way, looking to harness your brand recognition for their own personal gain. Cyber criminals continue to abuse legitimate companies through a combination of tactics ranging from forged and spoofed emails, look-alike domains and phishing sites to social media hacks, and brand jacking through fraudulent and malicious mobile applications. Various technologies have been developed to alleviate the widespread problem of email phishing, but only a few solutions have warranted the time, money, and effort to actually justify their implementation. Cybercrime continues to escalate, frustrating businesses and impacting their reputations, brands, and ultimately, customers trust. 42% BAD CUSTOMER EXPERIENCES CAUSE DECREASES IN BOTH USER TRUST AND ACTIVITY. OVER 42% ARE LESS LIKELY TO INTERACT WITH A BRAND AFTER BEING PHISHED OR SPOOFED. (CloudMark)» Phishing increased 700% from 2008-2012 67% of those attacks targeted financial and payment service companies. (DMARC)» Bad customer experiences cause decreases in both user trust and activity. Over 42% are less likely to interact with a brand after being phished or spoofed. (CloudMark)» The Online Trust Alliance found that as much as 90% of some companies emails are spoofed, yet only 26% of these companies use any form of email authentication. 3 THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX

2 NEW CHALLENGES FOR THE SECURITY EXECUTIVE» A successful attack on 500 customers can cost a company up to $1.4 million (Cisco Systems)» Email attacks are becoming increasingly sophisticated making it more difficult to detect and prevent. In fact, 97% of people globally cannot identify a phishing email. (Intel Security) These threats aren t just security concerns they re business concerns. In fact, the number of business emails sent and received per day will grow 13% annually over the next four years to reach more than 143 billion by the end of 2016 (Radicati Group). You have the opportunity to convey these threats to your company s senior management and align yourself with other leading security executives who are solving these problems. YOU HAVE THE OPPORTUNITY TO CONVEY THESE THREATS TO YOUR COMPANY S SENIOR MANAGEMENT. 4 THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX

3 AGARI YOUR STRATEGIC PARTNER As a security executive, you ll benefit from having a strategic partner like Agari that can add value from day one, and can assist you in becoming the security expert your company needs in this changing business environment. Agari is the only enterprise-ready solution with a proven record in the cyber-security industry for companies looking to establish a trusted email channel. Agari will always prioritize reducing risk within your email ecosystem. This facilitates protecting your company s brand and reputation, while positively impacting revenue. Agari exclusively focuses on solving the email security problem and we nail it, which makes us your perfect security partner. A partnership with Agari can positively impact the relationships the security executive has with the rest of the executive team supporting them in their areas of responsibility. Together with Agari, you can help:» CEOs concentrate on returning shareholder value by driving business growth. By partnering with Agari, you can create a trusted email channel that assists in developing more meaningful, lasting customer relationships. Keeping your company s data, network and customers secure from attacks will allow your CEO to stay focused on growing the business.. 5 THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX

3 AGARI YOUR STRATEGIC PARTNER FOCUSING ON BRAND PROTECTION WILL ALLOW S&R PROFESSIONALS TO GAIN THE SUPPORT OF THEIR CHIEF MARKETING OFFICERS» CIOs conserve security resources. By working in tandem with your CIO, you can ensure staff member time is leveraged in the most efficient manner possible, by letting Agari manage the security of your outbound email channel. That way, you can redeploy resources to other important projects while Agari works with you to provide accurate and actionable intelligence to make your security team more effective.» CMOs develop and implement successful marketing campaigns to increase brand growth and brand equity. Agari ensures that your marketing team is in charge of your brand s first impression to customers, not cyber criminals. Understanding and communicating the benefits of a trusted email channel with your CMO will empower them with the knowledge that their marketing dollars are well spent. With Agari Customer Protect, you will retain customers, increase existing customers share of wallet, and be able to acquire new customers at lower costs. (CMOS), RAISE THE PROFILE OF THE SECURITY TEAM, AND INCREASE THE FIRM S ATTENTION ON SECURITY MEASURES THAT HELP AVOID BRAND-DAMAGING EVENTS SUCH AS DATA BREACHES, SOCIAL MEDIA HACKS, AND CYBER ESPIONAGE. Forrester Research 2 2 Forrester Research. Twelve Recommendations for your Security Program in 2015. March 12, 2015. 6 THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX

3 AGARI YOUR STRATEGIC PARTNER» CLOs minimize lawsuits and keep legal expenses down. A strong understanding of compliance and government regulations surrounding your industry will help you work closely with your CLO to meet shared objectives. Agari Customer Protect allows you to do more to proactively protect your customers while minimizing potential risk from lawsuits, in the wake of targeted cyber attacks and data breaches.» CFOs maintain a secure, consistent business environment, which facilitates budget preservation. Agari can minimize some of the unexpected costs that result from a targeted attack or campaign that has damaged a company s brand. Some of these potential unexpected costs include: increase in customer service spend, security triage, and public relations fallout post-breach. Deployment of solutions such as Agari can also reduce a company s cyber insurance premiums. 7 THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX

4 CONCLUSION Internally focused cyber defense is not enough...the standard security model needs to change from one of compliance meeting basic standards for data protection to one that engenders trust among the customer base. Protecting customers, their data, and their experience should be the security function s No. 1 priority. 3 Your career path and job requirements are evolving and will look very different in the near future. Opportunities abound for the security executive who is willing to be a business leader. You have the skills and expertise to take advantage of them by adding unprecedented value for your company. Learn more about how Agari Customer Protect has partnered with other security executives at Fortune 500 companies here. 3 Forrester Research. CISOs Need To Add Customer Obsession To Their Job Description. September 4, 2015. 8 THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX

LEARN MORE www.agari.com info@agari.com North America +1 (650) 627 7667 Europe +44 (0)20 8973 2600