2020 phishing attack landscape and industry benchmarking
play

2020 Phishing Attack Landscape and Industry Benchmarking The data - PowerPoint PPT Presentation

2020 Phishing Attack Landscape and Industry Benchmarking The data you need to know Perry Carpenter Joanna Huisman Chief Evangelist & Strategy Officer SVP Strategic Insights & Research KnowBe4, Inc. KnowBe4, Inc. Perry Carpenter


  1. 2020 Phishing Attack Landscape and Industry Benchmarking The data you need to know Perry Carpenter Joanna Huisman Chief Evangelist & Strategy Officer SVP Strategic Insights & Research KnowBe4, Inc. KnowBe4, Inc.

  2. Perry Carpenter Chief Evangelist & Strategy Officer KnowBe4, Inc. Joanna Huisman SVP Strategic Insights & Research KnowBe4, Inc.

  3. About KnowBe4 • The world’s most popular integrated new-school Security Awareness Training and Simulated Phishing platform, over 32,000 customers worldwide • Founded in 2010 • Recognized as a Leader in the Gartner Magic Quadrant for Computer-Based Training (CBT) with the highest and furthest overall industry position for ability to execute About KnowBe4 and completeness of vision. • Recognized as a Leader in the Forrester Wave for Security Awareness and Training Solutions with the highest overall industry position. • Our mission is to train your employees to make smarter security decisions so you can create a human firewall as an effective last line of defense when all security software fails… Which it will! 3 3

  4. The question every executive asks…

  5. 1. The phishing problem 2. Phishing benchmark data by industry Agenda 3. International phishing benchmark data by region 4. Actionable tips to create your “human firewall” 5

  6. 1. The phishing problem 2. Phishing benchmark data by industry Agenda 3. International phishing benchmark data by region 4. Actionable tips to create your “human firewall” 6

  7. Cybercriminals rely on phishing because it works… 2019 Phishing By Industry Benchmarking Report A C C O R D I N G T O V E R I Z O N ' S P 2 H 0 I 1 S 9 H D I A N T G A W B A R S E A T C H H E # I N 1 V T E H S R T L E I G I N A T A K A T E I O D C N T T O I O R E S N P O U O C S R I T A E , L D E I N N G S I U N E C E C R E I S N S G F U A L N D B M R E A A L C W H A E S R E A T T A C K S . INTRODUCTION Every security leader faces the same conundrum: even as they increase their investment in sophisticated security orchestration, between effective technology and clever attack methodologies. Yet An organization’s PPP indicates how many of their employees are there’s an overlooked layer that can radically reduce an likely to fall for a social engineering or phishing scam. These are organization’s vulnerability: the employees who might be fooled into opening a file infected with malware or transferring company funds to a fraudulent offshore bank account. A high PPP indicates greater risk, as it According to Verizon’s 2019 Data Breach Investigation Report, points to a higher number of staff who typically fall for these phishing was the #1 threat action used in successful breaches scams. A low PPP is optimal, as it indicates the staff is linked to social engineering and malware attacks. These criminals security-savvy and understands how to recognize and shut down successfully evade an organization’s security controls by using clever phishing and social engineering tactics that often rely on The overall Phish-prone percentage offers even more value when methods are designed to persuade staff to take steps that provide placed in context. After seeing their number, many leaders ask questions such as “How does my organization compare to others?” and “What can we do to reduce our Phish-prone percentage?” Each organization’s employee susceptibility to these phishing attacks is known as their Phish-prone™ percentage (PPP). By 7 KnowBe4, the world’s largest Security Awareness Training and translating their risk into measurable terms, leaders can quantify Simulated Phishing platform, has helped organizations reduce their breach likelihood and adopt training that reduces their their vulnerability by training their staff to recognize and respond human attack surface. appropriately to common scams. To help companies evaluate their PPP and understand the implications of their ranking, KnowBe4 conducts an annual study to provide definitive phish-prone benchmarking across industries. Categorized by industry vertical, organization size, and the amount or frequency of security awareness training, the study reveals patterns that can light the way to a stronger and safer future.

  8. the Cyber Kill Chain Attackers generally follow these steps to compromise an organization 8 http://www.lockheedmartin.com/us/what-we-do/aerospace-defense/cyber/cyber-kill-chain.html

  9. 1. The phishing problem 2. Phishing benchmark data by industry Agenda 3. International phishing benchmark data by region 4. Actionable tips to create your “human firewall” 9

  10. All 17,000 customers were using the KnowBe4 platform according to the recommended best practices for a new-school security awareness approach: • Running an initial baseline test • Training their users through realistic on- demand, interactive training • Frequent simulated testing at least once a month to reinforce the training 10

  11. Three-Phases of Measurement 1 Phase One: If you haven’t trained your users and you send a phishing attack, what is the initial resulting PPP? To do this, we monitored employee susceptibility to an initial baseline simulated phishing security test. From that established set of users, we look at any time a user has failed a simulated phishing security test prior to having completed any training. 2 Phase Two: What is the resulting PPP after your users complete training and receive simulated phishing security tests within 90 days after training? We answered this question by finding when users completed their first training event and look for all simulated phishing security events up to 90 days after that training is completed 3 Phase Three: What is the final resulting PPP after your users take ongoing training and monthly simulated phishing tests? We measured security awareness skills after 12 months or more of ongoing training and simulated phishing security tests and look for users that completed training at least one year ago and take the performance results on their very last phishing test. 11

  12. RISKY BUSINESS 12

  13. Benchmark Phish- prone Percentage by Industry 13

  14. Results Within 90 Days of Testing 14

  15. Results after 1 Year+ of Ongoing Training 15

  16. Security Awareness + Frequent simulated phishing training = Drastically improved phishing resiliency The Results are in: and they are dramatic 16

  17. Our Behavior-Based Approach Works Organizations across these specific industries improved their failure rate by 88% after 12 months of combined security awareness training and simulated phishing using KnowBe4. (Based on weighted averages across all organization sizes. Percentages rounded. 17

  18. Putting the results into perspective 18

  19. 1. The phishing problem 2. Phishing benchmark data by industry Agenda 3. International phishing benchmark data by region 4. Actionable tips to create your “human firewall” 19

  20. 2020 International Results 20

  21. - Africa - 81.9% Improvement 21

  22. - UK&I - 82.4% Improvement 22

  23. - Europe - Incomplete data set, yet trending favorably as expected 23

  24. - APAC - 78.7% Improvement 24

  25. 1. The phishing problem 2. Phishing benchmark data by industry Agenda 3. International phishing benchmark data by region 4. Actionable tips to create your “human firewall” 25

  26. People are a critical layer within the fabric of our Security Programs 26

  27. Security Awareness and Secure Behavior are NOT the Same Thing Traditional awareness programs fail to account for the knowledge-intention- behavior gap …

  28. Th There re are re Th Thre ree Realiti ties of of Se Securit ity A Awareness What your Just because I’m If you try to work employees do is way aware doesn’t mean against human more important than that I care . nature, you will fail . what they know .

  29. Train by Simulating the Steps taken by Attackers Upon Click Pre-Click Activities Post-Click Activities Weaponization Exploitation Command & Control Reconnaissance Delivery Installation Act on Objectives Simulate targeted and Discover your attack surface Understand the impact of breach opportunistic attack types 29

  30. • Understand the types of email subjects that will realistically test your users susceptibility to phishing. Bait the hook! • Know the types of ‘in the wild’ phishing scams that are occurring so that you can work to inoculate your users! 30

  31. -- effective phishing lures -- Greed Curiosity Self Interest Money Urgency Fear Helpfulness Hunger 31

  32. Plan like a Marketer. Test like an Attacker. 32

  33. • Humans are the de-facto top choice for cybercriminals seeking to gain access into an organization. • Security Awareness and frequent simulated social engineering testing is a proven method to dramatically slash Final Thoughts your organization’s phish prone percentage. • Effectively managing this problem requires ongoing due diligence, but it can be done and it isn’t difficult. We’re here to help. 33

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend