How AAA and The Auto Club Group Protect the Information Highway with Abnormal

November 29, 2021

At Abnormal, our customers have always been our biggest priority. Customer obsession is one of our five company values, and we live this every single day as we provide the best email security protection available for the hundreds of companies who entrust us to protect their mailboxes. With customers from the Fortune 1000 to small non-profit organizations, Abnormal is dedicated to ensuring that they have an amazing experience, while blocking the malicious emails that could derail businesses.

So when Gopal Padinjaruveetil, Chief Information Security Officer of AAA’s Auto Club Group (ACG), approached us to talk about Abnormal in Interface Magazine, we jumped at the opportunity to support him. As CISO of ACG, Padinjaruveetil is responsible for taking the organization into the digital age and providing a way for customers to trust the organization as they drive on the information superhighway.

Understanding the Cybersecurity Challenge

As Padinjaruveetil states in the Interface article, “If cybercrime was a country whose wealth was measured through GDP, it would be the third richest country in the world. It’s now a ten-trillion dollar business that has overtaken the global drug trade. Meanwhile, organizations are investing just $150mn per year into cyber innovation. We as an industry need to do something to reduce this fast-increasing gap.”

Blog interface cover

This focus on cybercrime is why The Auto Club Group has partnered with leading cybersecurity companies across multiple areas—working with companies who share the same vision to deliver strategic benefits beyond the normal vendor-customer relationship. He has found that in his partnerships with OpenText, Netskpoke, and Abnormal Security. He dives into these relationships within the article, explaining why he chose these organizations over competitors.

When it comes to Abnormal, Padinjaruveetil was concerned about the prevalence of email threats, with 97% of attacks originating from social engineering or credential phishing and its resultant malware. With business email compromise and related attacks costing organizations billions each year, it became clear that ACG needed to protect its end users from the type of attacks that were bypassing native security controls. “Abnormal Security helped us to detect malicious communications and quarantine them before they can become a primary attack weapon.”

Blog interface abnormal

And because Abnormal uses a combination of identity, relationships, and behavior to understand normal communications—and then block abnormal communications—the platform can stop the most dangerous threats Padinjaruveetil sees. “Without Abnormal Security, our end users would still be receiving these malicious attacks and interacting with them, potentially costing us financial losses and reputational damage.”

Moving the CISO Role into the Future

As part of Padinjaruveetil’s role, he is responsible not only for the security of his organization, but also for the recruitment of future leaders and moving his role forward. As he states in the magazine, “We’re seeing the evolution of a modern CISO’s role much more into an executive cyber risk advisory role, and as a future risk manager communicating at board level about emerging technologies.”

This is the case across the entire cyber risk landscape, as he must be prepared to discuss all types of threats impacting the employees, partners, and customers of ACG. It’s why he finds vendors who can help him on this journey—not only protecting the organization, but also helping him understand the threat and explain it to the Board of Advisors, executive leadership team, and employees around the world.

Ultimately, Padinjaruveetil believes that the role of the CISO is to empower people and keep them safe as they drive down the information highway. Here at Abnormal, we’re excited to be on that journey with him, as we continue to keep The Auto Club Group safe from email-based cyber attacks.
Read more of Padinjaruveetil’s thoughts as CISO in the Interface Magazine article.

Related Posts

Blog customer communications leads to product innovation
Learn how customers have influenced the latest round of product enhancements to better protect your organization from email-borne threats.
Read More
Blog attack detection efficacy cover
Abnormal’s relentless pursuit of innovation significantly improves the detection efficacy of hidden payloads in emails by an additional 5%.
Read More
Blog mnru cover
Estimating both the time and cost to complete a task has been a continual challenge for engineering teams as long as I’ve been working in industry. Coordinating the complex interactions and execution task sequencing across multiple tasks and people is a complex, ever-evolving challenge, and one that most teams struggle with daily.
Read More
Blog what do phishing emails cover
Phishing attacks are on the rise; the FBI reports that such attacks cost $54 billion in 2020, and phishing complaints increased by a whopping 110% from 2019 to 2020. If you're one of the many people targeted by a phishing email, you're not alone.
Read More
Blog holiday scams cover
We've arrived at that time of year—a time for reflection and celebration and spending time with family, and also that time of year where the cyber grinches hope to spoil the holiday fun.
Read More
Log4j email blog cover
Over the last few days, Abnormal has successfully blocked multiple attempts by attackers to deliver emails similar to these to our customers’ unsuspecting end users.
Read More
Blog securitry privacy cover
Customers place tremendous trust in Abnormal to protect them from the full spectrum of attacks when they provide us access to the email stored in Microsoft 365 or Google Workspace. To that end, we’re focused on protecting your data and building your trust.
Read More
Blog podcast role cto
Tim Tully, Partner at Menlo Ventures, grew up in Silicon Valley, where a love for coding was kindled in him. Tim is a technologist to the core, which innately led him to become an elite technical leader at companies like Splunk and Yahoo.
Read More
Blog canadian visa cover
Abnormal Security recently identified a scam aimed at the Canadian electronic travel authorization (eTA) program, which bears a striking resemblance to a long-standing fraud scheme described in our post from several weeks ago targeting TSA travel program applicants.
Read More
Automate abuse mailbox cover
Managing and monitoring an Abuse Mailbox can be a significant pain point for IT security teams, particularly large organizations with thousands of employees.
Read More
Blog calendar invite attack cover
Meeting invites are one of the most common types of emails sent today, so it should come as no surprise that attackers have found a way to manipulate them. Scores of recipients that utilize Abnormal Security recently received emails that contained a .ics attachment—an invitation file commonly used to populate online calendar applications with meeting and event information.
Read More
Blog saving memory python cover
At a hyper-growth startup, a solution from six months ago will unfortunately no longer scale. The business is growing rapidly, and this traffic to this service in particular was growing at an unprecedented rate. We hit a point where it needed re-architecting to support 10x the current scale.
Read More