Training

Next-Generation Technologies & Secure Development , Threat Intelligence

The Secret Fraud Eco-System and How to Put Threat Intelligence to Work

The Secret Fraud Eco-System and How to Put Threat Intelligence to Work

Fraud Summit - Chicago 2014 - What becomes of customer account information once it is stolen by fraudsters? It enters a sophisticated underground economy, where account names and numbers are sold openly in the criminal marketplace. Underground market trends often yield clues to undiscovered breaches or targets. Join this session to learn:

See Also: Protecting Australia’s Vital Energy Grid with Stronger Security Culture

  • How this underground economy works;
  • What threat intelligence can be gleaned from the marketplace;
  • How merchants and financial institutions can better protect their assets.

Background

The Target data breach brought so much to light - the evolving threats to merchants and point-of-sale systems, as well as the thriving underground economy that is in part fueled by trafficking of stolen payment card data.

But what are the key components of this underground economy, and why are they so difficult to monitor, much less stop?

Trusteer, an IBM company, has conducted fresh research into the global threat landscape, and in this session - recorded at the 2014 Chicago Fraud Summit - George Tubin shares the latest findings about card forums, market trends and evolving threats.

And then, from the banking institution's perspective, Mitch Zahler of HSBC shows how to leverage available threat intelligence to make real-time decisions in response to security threats and incidents.

Gain insight into this underground economy and how you can leverage threat intelligence to improve your anti-fraud defenses.

ISMG's Fraud Summits are one-day events focused exclusively on the top fraud trends impacting organizations and the mitigation strategies to overcome those challenges.

All 2014 Fraud Summit Chicago recordings:

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.