The Lazarus Heist, Geoff White
Award-winning investigative journalist and author, Geoff White, will share his insights from his extensive reporting on the world of cybercrime including highlights from hit podcast, The Lazarus Heist.
The Lazarus Heist, Geoff White
Award-winning investigative journalist and author, Geoff White, will share his insights from his extensive reporting on the world of cybercrime including highlights from hit podcast, The Lazarus Heist.
Attack Deep Dive: New Account Fraud & Bonus Abuse
Fraudsters utilize automation at scale to open new accounts in order to take advantage of promotional or bonus offers meant to attract new customers. In this session, we'll discuss how fraudsters pull off and monetize new account attacks and how to stop them.
The State of Fraud 2021: A Data Deep Dive
Insights and analysis of attack trends across user touchpoints, using data from the Arkose Labs Global Network and Merchant Risk Council's 2021 Fraud Survey.
Keynote: Fighting Global Cybercrime
No cyberattack is committed alone, to successfully execute an attack requires a coordinated effort involving different parties across the globe. In this session, the U.N.'s head of global cybersecurity will discuss the worldwide interconnected cybercrime ecosystem, how it works and what businesses can do to fight back.
Navigating the Convergence of Fraud, Identity & Infosec
Approaches for improving businesses' risk posture and helping user experience, by consolidating technologies and data insights across fraud prevention, consumer identity management, and website security.
Fraud and Account Security in the Digital Native Era
This panel will explore key issues in user security, fraud and safety in the age of digital-first and mobile-only businesses catering for a growing generation of digital-native consumers. It will discuss account security, evolving privacy mandates, and UX demands across payments, entertainment, travel and finance.
The Future of Fraud: Diversification of Attack Types
As attacks across digital touchpoints constantly evolve and become more innovative, this panel will look at some of the latest fraud trends and how businesses can best defend themselves and their consumers.
Machine vs The Machine: The Evolving Role of AI in Fraud
AI is just as vital for fraudsters launching attacks as it it for businessses looking to stop it. This panel will discuss how fraudsters use AI and ML and how businesses can best deploy this technology in the fight against cybercrime.
Overcoming The Business-IT Security Divide
Often, lines of business units and IT/Security departments work in separate silos, but with coordinated attacks on digital businesses becoming more frequent and more severe, it is critical that businesses and security work in concert.
Attack Deep Dive: ATO & Credential Stuffing
5% of all digital traffic is a credential stuffing attack. These attacks are a bane to both businesses and consumers alike, as fraudsters use compromised credentials to compromise accounts, commit downstream fraud and continue the cybercrime cycle of success. In this masterclass, we will examine how fraudsters pull off these attacks successfully, and how by understanding this, businesses can effectively stop them.
A Day in the Life of a Fraudster: Attack Tools Live Demo
Fraudsters get up every day and go to work to make money, just like anyone else. This is an in-depth look at the tools they use on a daily basis and how they go about creating and launching attacks.
CISO Panel: Enterprise-Wide Security and Fraud Prevention Trends
CISOs from prominent organizations will discuss how the latest trends in fraud and account security affect their overall security posture and tips for keeping large consumer-facing enterprises secure.
Fintech Fraud and the Rise of Buy Now Pay Later
BNPL is one of the hottest subsectors of financial services, having become a $100 billion industry in 2021. However, where there is money, there will always be fraudsters. In this session, learn how fraudsters attack BNPL platforms, and how to effectively stop attacks without ruining the seamless user experience BNPL has become known for
The Business Leader's Guide to Bots
Bots are everywhere on the internet; some perform benign functions like search engine bots that crawl the web for content. However, bots are often put to malicious use by fraudsters to commit attacks at scale in a cost effective manner.
Securing the Next Stage in the Digital Payments Revolution
Payments and digital distribution models are innovating rapidly, with some even predicting a cashless world by the decade's end. In this session, we will discuss the most impactful trends and how to ensure that digital payments are safe and secure.
Enhancing UX with Fraud and Identity Initiatives
Security measures need not harm user experience. This session will discuss the art of creating sophisticated fraud and identity measures that could actually increase both UX and security.
Dynamic Enforcement: The Missing RBA-MFA Link
As attacks get more and more sneaky, increasing volumes of user activity falls in a gray area between “trusted” and “fraudulent” traffic. How do merchants test and verify true intent, without resorting to out-of-band authentication - which can kill conversion rates and cost a ton?
Innovation Panel: Managing Risk During Digital Transformation
Innovation is key for businesses to remain relevant in today's digital world - for both young disruptors and large enterprises going through digital transformation. Panelists will discuss how risk management can be baked into innovation from the outset to secure success.
Abusive Language and Spam on P2P Channels
P2P platforms rely heavily on user trust to remain relevant. However, that trust is eroded when bad actors send spam and phishing messages to good users on these platforms. Here's how to make sure your platform is free from malicious content.
Closing Keynote with Troy Hunt
With the amount of data breaches and hacks that have occurred, it's safe to say everyone's personal information is compromised. In this session, Troy Hunt, founder of the popular site Have I been Pwned?, will discuss in detail just how wide-reaching the problem is, and what we can do in response.