How AAA and The Auto Club Group Protect the Information Highway with Abnormal

November 29, 2021

At Abnormal, our customers have always been our biggest priority. Customer obsession is one of our five company values, and we live this every single day as we provide the best email security protection available for the hundreds of companies who entrust us to protect their mailboxes. With customers from the Fortune 1000 to small non-profit organizations, Abnormal is dedicated to ensuring that they have an amazing experience, while blocking the malicious emails that could derail businesses.

So when Gopal Padinjaruveetil, Chief Information Security Officer of AAA’s Auto Club Group (ACG), approached us to talk about Abnormal in Interface Magazine, we jumped at the opportunity to support him. As CISO of ACG, Padinjaruveetil is responsible for taking the organization into the digital age and providing a way for customers to trust the organization as they drive on the information superhighway.

Understanding the Cybersecurity Challenge

As Padinjaruveetil states in the Interface article, “If cybercrime was a country whose wealth was measured through GDP, it would be the third richest country in the world. It’s now a ten-trillion dollar business that has overtaken the global drug trade. Meanwhile, organizations are investing just $150mn per year into cyber innovation. We as an industry need to do something to reduce this fast-increasing gap.”

Blog interface cover

This focus on cybercrime is why The Auto Club Group has partnered with leading cybersecurity companies across multiple areas—working with companies who share the same vision to deliver strategic benefits beyond the normal vendor-customer relationship. He has found that in his partnerships with OpenText, Netskpoke, and Abnormal Security. He dives into these relationships within the article, explaining why he chose these organizations over competitors.

When it comes to Abnormal, Padinjaruveetil was concerned about the prevalence of email threats, with 97% of attacks originating from social engineering or credential phishing and its resultant malware. With business email compromise and related attacks costing organizations billions each year, it became clear that ACG needed to protect its end users from the type of attacks that were bypassing native security controls. “Abnormal Security helped us to detect malicious communications and quarantine them before they can become a primary attack weapon.”

Blog interface abnormal

And because Abnormal uses a combination of identity, relationships, and behavior to understand normal communications—and then block abnormal communications—the platform can stop the most dangerous threats Padinjaruveetil sees. “Without Abnormal Security, our end users would still be receiving these malicious attacks and interacting with them, potentially costing us financial losses and reputational damage.”

Moving the CISO Role into the Future

As part of Padinjaruveetil’s role, he is responsible not only for the security of his organization, but also for the recruitment of future leaders and moving his role forward. As he states in the magazine, “We’re seeing the evolution of a modern CISO’s role much more into an executive cyber risk advisory role, and as a future risk manager communicating at board level about emerging technologies.”

This is the case across the entire cyber risk landscape, as he must be prepared to discuss all types of threats impacting the employees, partners, and customers of ACG. It’s why he finds vendors who can help him on this journey—not only protecting the organization, but also helping him understand the threat and explain it to the Board of Advisors, executive leadership team, and employees around the world.

Ultimately, Padinjaruveetil believes that the role of the CISO is to empower people and keep them safe as they drive down the information highway. Here at Abnormal, we’re excited to be on that journey with him, as we continue to keep The Auto Club Group safe from email-based cyber attacks.
Read more of Padinjaruveetil’s thoughts as CISO in the Interface Magazine article.

Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 06 21 22 Threat Intel blog
Executives are no longer the go-to impersonated party in business email compromise (BEC) attacks. Now, threat actors are opting to impersonate vendors instead.
Read More
B 06 7 22 Disentangling ML Pipelines Blog
Learn how explicitly modeling dependencies in a machine learning pipeline can vastly reduce its complexity and make it behave like a tower of Legos: easy to change, and hard to break.
Read More
B 04 07 22 SEG
As enterprises across the world struggle to stop modern email attacks, it begs the question: how are these attacks evading traditional solutions like SEGs?
Read More
Enhanced Remediation Blog Cover
The most effective way to manage spam and graymail is to leverage a cloud-native, API-based architecture to understand identity, behavior, and content patterns.
Read More
B 05 16 22 VP of Recruiting
We are thrilled to announce the addition of Mary Price, our new Vice President of Talent. Mary will support our continued investment in the next generation of talent here at Abnormal.
Read More
B 06 01 22 Stripe Phishing
In this sophisticated credential phishing attack, the threat actor created a duplicate version of Stripe’s entire website.
Read More
B Podcast Engineering9
In episode 9 of Abnormal Engineering Stories, Dan sits down with Mukund Narasimhan to discuss his perspective on productionizing machine learning.
Read More
B 05 31 22 RSA Conference
Attending RSA Conference 2022? So is Abnormal! We’d love to see you at the event.
Read More
B 05 27 22 Active Ransomware Groups
Here’s an in-depth analysis of the 62 most prominent ransomware groups and their activities since January 2020.
Read More
B 05 24 22 ESI Season 1 Recap Blog
The first season of Enterprise Software Innovators (ESI) has come to a close. While the ESI team is hard at work on season two, here’s a recap of some season one highlights.
Read More
B 05 13 22 Hiring Experience
Abnormal Security is committed to offering an exceptional experience for candidates and employees. Hear about our recruiting and onboarding firsthand from three Abnormal employees.
Read More
B 05 11 22 Scaling Out Redis
As we’ve scaled our customer base, the size of our datasets has also grown. With our rapid expansion, we were on track to hit the data storage limit of our Redis server in two months, so we needed to figure out a way to scale beyond this—and fast!
Read More