logo

NJP

New playbooks for the automation of phishing response - Game changers.

Import · Jun 10, 2020 · video

hello everybody here is an update on new playbook animations that have been made available to help service now say cops customers accelerate the response to use a reported fishing incidents these play books are available on developer tools now calm as part of the share portal these play books are the repeat detection playbook for automated fishing response and the email domain spoof detection playbook for automated fishing response these are available for our customers to download as update sets and take advantage off let's take a quick look at what these play books are about the repeat detection playbook enables incident responders to identify matching or similar fishing incidents they have responded to in the past the match is based on two sets of characteristics the first is on observables in the incident such as the message ID email subject and the sender's email address and the second is on the uniqueness of the match on suspect fishing domain the suspect attachments in the email and the closeness of the email body match this PlayBook has been built as a flow using flow designer and can be triggered to run automatically the PlayBook also includes the ability to provide information back to the analyst on results of the match and the accuracy of the match a quick walk through of this playbook itself you can see that the repeat detection logic is available as a sub flow the logic can be invoked hammer flow from a playback flow and the results are available for the analyst to see in the security and record the email spoof detection playbook enables Incident Response Teams to be on the alert for any potential spoofing attempt on trusted branch that may be going on as part of the incoming submission the clever looks to find a similarity match between the sender's email domain and any observable deemed as a trusted domain by the organization this PlayBook has also been built as a flow using flow designer and can be triggered to run automatically the PlayBook also includes the ability to alert the analysts when a possible spoofing attempt has been uncovered let's take a quick look at this playbook the spoof detection logic again is available as a subfloor the logic can be invoked from a playbook flow and the analyst is alerted on any potential spoofing attempt through a security tag please be on the lookout for an announcement coming soon on the community portal for a webinar where we will be demonstrating these playbooks in action and help answer questions thank you you you

View original source

https://www.youtube.com/watch?v=mxbeRSry2VQ