Ripped from today's headlines in which company after company is reporting breaches of their information security, this session will provide a fresh perspective on some tried and true information security practices. While companies rush to spend dollars on improved technologies and contracting with third parties to...
Collecting security and fraud related data from multiple sources can often just result in creating a very large pool of unrelated facts. But, begin to add context to that data and you now have information. Triangulate multiple pieces of information together and you can create intelligence.
This session will answer...
You have identified the attack now it's time to react. How do you effectively respond, remediate, recover and potentially retaliate to the threat? This session will discuss how your organization can leverage the actionable intelligence gained from all the previous defense phases of threat indicators, analytics,...
See the startling results of meticulous analysis of hundreds of real-life insider attacks and learn about new technologies that are able to detect the anomalous behavior patterns often before fraud occurs.
The analysis results clearly indicate that, contrary to the majority of headlines, stealthy insiders pose a...
Part 1 - Fraud Ecosystem
In June this year, the "Ronald Reagan" batch of credit cards (potentially those stolen from P.F. Chang's) joined the "Barbarossa" batch from Target in becoming publicly available for purchase. These cards were featured on the popular Rescator card shop (stolen card data marketplace), which...
How is technology evolving to analyze multiple and massive streams of data in real time to detect fraudulent activity? The NSA has pioneered data collection techniques at a staggering scale, potentially monitoring all activity for an entire country. Facebook has pioneered adversarial machine learning fraud detection...
Traditionally, big data, analytics and visualization tools have been used after the fact to analyze fraud and security breaches. In this session, we will demonstrate the proactive use of these technologies to help prevent these attacks from occurring in the first place.
Leveraging findings from massive scale,...
Part1: Creating Actionable Intelligence, the Advances in Threat Information Exchange
Collecting security- and fraud-related data from multiple sources can often just result in creating a very large pool of unrelated facts. But begin to add context to that data and you now have information. Triangulate multiple pieces...
Fraud Ecosystem
In June this year the "Ronald Reagan" batch of credit cards (potentially those stolen from PF Chang's) joined the "Barbarossa" batch from Target in becoming publicly available for purchase. Featured on the popular Rescator card shop (stolen card data marketplace), with advanced features like money...
Real-time, customer-centric fraud prevention starts with transforming fraud management into an area of competitive advantage. Innovations in analytics and the ability to respond in real-time are now allowing financial services organizations to effectively address various fraud issues across their products and at the...
No single security solution is enough to defend against today's multifaceted exploits. So it's time for a new holistic and cooperative approach to information security, says Bob Hansmann of Websense.
Warning from the U.K. Information Commissioner's Office: Businesses that work with big data must ensure they still comply with EU data protection regulations, especially when it comes to keeping personal information private.
Big data has been the recent buzz in security circles, but what are organizations missing by overlooking the power of "small data?" Verizon's Jay Jacobs discusses how to get the most from data analytics.
To detect and deter today's threats, security teams need new and dynamic data analytics capabilities. Haiyan Song of Splunk discusses the analytics-enabled SOC and how to improve incident response.
French IT services company Atos has announced its intention to purchase Bull, an enterprise data firm, to enhance its cybersecurity and big data offerings. The deal is worth $844 million, or 620 million euros.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.