Data Breach Prevention and Response Summit , Events , Fraud Summit
CAPTURED: The Longevity of Stolen Data Until it's Sold on the Underground
Cyber threat actors are trans-national, well-funded and highly organized, they are utilizing leading-edge technology to attack merchants and stealing data at a large scale. Join us as we walk you through our research on what happens after the attacks. We will highlight when that stolen payment card data appears on the dark web and how long that data can linger before it is purchased by a criminal and used for fraudulent purchases and cash-out schemes.