Training

Next-Generation Technologies & Secure Development , Threat Intelligence

Threat Intelligence & the Underground Eco-System

Threat Intelligence & the Underground Eco-System

Fraud Summit - San Francisco 2014 - What becomes of customer account information once it is stolen by fraudsters? It enters a sophisticated underground economy, where account names and numbers are sold openly in the criminal marketplace. Underground market trends often yield clues to undiscovered breaches or targets. Join this session, recorded at the 2014 San Francisco Fraud Summit, to learn from a top fraud researcher and a banking/security leader:

See Also: OnDemand | Gen AI and Secure Code: Mitigating Risks and Maximizing Rewards with Checkmarx and Mobb

  • How this underground economy works;
  • What threat intelligence can be gleaned from the marketplace;
  • How merchants and financial institutions can better protect their assets.

Background

The Target data breach brought so much to light - the evolving threats to merchants and point-of-sale systems, as well as the thriving underground economy that is in part fueled by trafficking of stolen payment card data.

But what are the key components of this underground economy, and why are they so difficult to monitor, much less stop?

Trusteer, an IBM company, has conducted fresh research into the global threat landscape, and in this session - recorded at the 2014 Chicago Fraud Summit - George Tubin shares the latest findings about card forums, market trends and evolving threats.

And then, from the banking institution's perspective, Mitch Zahler of HSBC shows how to leverage available threat intelligence to make real-time decisions in response to security threats and incidents.

Gain insight into this underground economy and how you can leverage threat intelligence to improve your anti-fraud defenses.

All 2014 Fraud Summit San Francisco recordings:

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.