HACKING SOCIAL Driving Visibility to Support Monitoring & Incident Response CSO – SOCIAL IS A TOP 5 CONCERN

CYBER ATTACK NO. 4: THREATS “Our online world is a social world led by , Twitter, LinkedIn or their country-popular counterparts. Social media threats usually arrive as a rogue friend or application install request…Many of today’s worst hacks started out as simple social media hacking. Don’t underestimate the potential.” SLIDE / 2 FORBES – TARGETED ATTACKS VIA SOCIAL

“The lovely and disarming ‘Mia Ash’ is a fictional female created by the highly- active hacker crew known as OilRig, which… SecureWorks believes is sponsored by the Iranian regime. In July 2016, Mia's puppeteers targeted a Deloitte cybersecurity employee, engaging him through [Facebook] in conversations about his job.” SLIDE / 3 CISCO – SOCIAL IS #1 SOURCE OF

“Facebook is now the #1 source of malware…Unsurprisingly, ‘social media’ saw the largest jump from last year’s report on the list of top 24 concerns; social is now ranked #3 overall…Facebook malware is just one example of this dangerous new confluence.”

SLIDE / 4 BUSINESS.COM – DON’T FORGET TO SECURE SOCIAL

“Businesses already know how important security and protection is in today’s digital world. However they often leave out social media not realizing how porous [social media] can be when it comes to hacks and breaches. There are several ways in which things can go wrong. ”

SLIDE / 5 SOCIAL & SOCIAL COLLABORATIO DIGITAL IMPACT BUSINESSES N IMPACT

83% 200 Million 80% Global organization’s use social Facebook Business Pages Alone! of global businesses use as key business platform enterprise collaboration 22.4% 61% More 97% IMPACT OF of total enterprise marketing than all “.coms” in the world of collaboration users service budgets spent on social in next 4 more clients SOCIAL, years DIGITAL & 28% COLLABORATI Employees use collaboration for ON $1.2B <1% data exfiltration Annual targeted social Currently have protection cost to organizations <12%

SLIDE / 6 Organization’s have visibility into data activity BUSINESS YESTERDAY ASSET PROTECTIO 1 2 3 ENDPOINT NETWORK EMAIL N INSIDE Laptops, PCs, HQ, Offices & Exchange, Lotus, THE Devices Datacenters FIREWALL

SLIDE / 7 SOCIAL MEDIA

MOBILE SOCIAL & SOCIAL WEB DIGITAL - BUSINESS TODAY THE NEW RISK VECTORS COLLABORATION

SLIDE / 8 1. Social is Everywhere 2. Hacking is Easy 3. Limited Visibility

• 1/3 people are on social • Easy to use; create a • Security Teams are not globally profile in minutes monitoring Social Media • 27% of all internet time • Low cost • Social Media Teams are is spent on social • Global scale; find any not trained to look for • 50% of Americans make target globally or use at security threats purchase decision w/ scale • 43% of Security Facebook • Build “trusted professionals listed • 83% of global org use relationships” social media as a top social as a ”key • End-to-end profiling & concern business platform” engagement platform WHAT WE KNOW

SLIDE / 9 1 More walled gardens, harder attribution

2 Business & personal blur, defense gets distributed

3 3 TRENDS AI hits social

SLIDE / 10 NEW YORK POST 1.8 Facebook accounts hacked every second; 600,000 every day

HARRIS POLL 2 in 3 social media users have had their accounts TACTIC #1: hijacked ACCOUNT HIJACKING

SLIDE / 11 ZEROFOX Instances of fraudulent accounts increased 11x in the past 24 months

ZEROFOX 38% of brand TACTIC #2: impersonations drive users FRAUDULENT to phishing pages ACCOUNTS

SLIDE / 12 KASPERSKY 7.57 million victims of social phishing annually

CISCO Facebook is the most common delivery mechanism for malware; the #1 way to breach the network

RSA TACTIC #3: Global cost of social media SOCIAL phishing is $1.2 billion PHISHING & MALWARE PONEMON $3.2 million to remediate web based malware

SLIDE / 13 CISCO Facebook is the most common delivery mechanism for malware; the #1 way to breach the network TACTIC #4: FBI Social Media complaints DIRECT on the rise, up to 92/day MESSAGE (32k/year) SCAMS & FRAUD

SLIDE / 14 IMPACT

• Bruteforce Password Attacks • Social Engineering Attacks • Physical Theft • Brand Damage • Competitive Intelligence • Social Account Compromise • Network Compromise

INFOWATCH Over 1500 data leaks occur every year and 72.8% are TACTIC #5: from insiders ACCIDENTAL INFORMATIO E & Y The average cost per record N LEAKAGE lost is $214, data breach is > $7M

SLIDE / 15 AIG 40,000 kidnap and ransom cases involving business travelers are reported annually

US STATE DEPT 70% of overseas kidnappings of US citizens TACTIC #6: goes unreported. PHYSICAL SECURITY

SLIDE / 16 ®

INFORMATION BRAND CORPORATE SECURITY RISKS SECURITY

SPOOFED DOMAIN BRAND PROTECTION SITUATIONAL AWARENESS

TARGETED PHISHING & EXPLOIT REPUTATION DAMAGE EXECUTIVE PROTECTION WHAT’S IMPORTANT COMPROMISED CREDENTIALS CUSTOMER ATTACKS EVENTS & TRAVEL THREATS TO YOU? INSIDER, DLP & COMPLIANCE COUNTERFEIT & PIRACY LOCATION PROTECTION

SLIDE / 17 LEGAL // HR // FINANCE // COMPLIANCE // RISK & FRAUD THE ONLY COMPLETE SOCIAL MEDIA AND DIGITAL PROTECTION PLATFORM BUILT FOR ENTERPRISES

PROTECT SAFEGUARD SECURE Corporate Social Media Business & Customer Employees & the Business Assets & Brands Engagement from Cyber & Physical Threats

SLIDESlide 18 18 SOCIAL – WEB – DOMAINS – MOBILE – DEEP/DARK WEB – COLLABORATION / / FOR #1 Targeted social media malware SECURITY is the #1 method for breaching an enterprise network • Reduce operational costs

• Reduce time to identify a threat 40% • Reduce time to investigate and clean 40% of enterprises have fallen victim to social media spearphishing attacks up an issue

• Increase the breadth of your defense- in-depth program THE VALUE 20% 1 in 5 businesses have been infected with malware sent via social media SLIDE 19 / TARGETED DATA INTELLIGENT ANALYSIS REMEDIATION & COLLECTION Artificial Intelligence Classifiers INTEGRATIONS SOCIAL MEDIA Out-of-the-box Rulesets Open Networks FoxThreats … AUTOMATED Closed Networks REMEDIATION … Automatically remove malicious content and Collaboration Networks profiles from the social … networks directly DEEP/DARK/WEB API API TLD Registrations SECURITY INTEGRATION … Integrate threat Bin & Dump Sites indicators into existing … security tools, empowering existing Custom Sites defense against digital MOBILE STORES attacks MANAGED … SERVICES NEWS/BLOGS/FORUMS Expert digital risk CUSTOM RULES & analysts provide END USER ACCOUNTS POLICIES 24x7x365 coverage Open/Closed Social Breach Notifications

SLIDESlide 20 20 / / DEFINE WHAT’S IMPORTANT

CREATE A POLICY

MONITOR SOCIAL CHANNELS ALERT ON RISKS HOW IT WORKS REMEDIATE MALICIOUS SLIDE 21 CONTENT / THE INDUSTRY’S ONLY COMPREHENSIVE COLLECTION OF SOCIAL MEDIA THREATS AND INDICATORS • ZeroFOX’s social media threat data and the ability to correlate social media incidents • Enable your security team throughout different phases of an attack • Prevent • Detect • Respond ZEROFOX • Recover THREAT FEED

SLIDE 22 / Three Pillars of Protection

Visibility Automation Remediation 1. Identify Social Media Footprint

2. Obtain “Verified Accounts”

3. Enable Two-Factor Authentication

4. Monitor for Spoofed & Impersonating Accounts

5. Identify Scams, Fraud, Money-flipping, and More by Monitoring Your Corporate and Brand Social Media Pages SOCIAL MEDIA 6. Monitor for signs of Social Media Account Hijacking SECURITY 7. Train Employees on Social Media Hygiene CHECKLIST 8. Incorporate Strategy for Social Media & Digital Threat

SLIDE / 24 Detection THANK YOU

www.zerofox.com