Part 1 - Fraud Ecosystem
In June this year, the "Ronald Reagan" batch of credit cards (potentially those stolen from P.F. Chang's) joined the "Barbarossa" batch from Target in becoming publicly available for purchase. These cards were featured on the popular Rescator card shop (stolen card data marketplace), which...
How is technology evolving to analyze multiple and massive streams of data in real time to detect fraudulent activity? The NSA has pioneered data collection techniques at a staggering scale, potentially monitoring all activity for an entire country. Facebook has pioneered adversarial machine learning fraud detection...
Traditionally, big data, analytics and visualization tools have been used after the fact to analyze fraud and security breaches. In this session, we will demonstrate the proactive use of these technologies to help prevent these attacks from occurring in the first place.
Leveraging findings from massive scale,...
Part1: Creating Actionable Intelligence, the Advances in Threat Information Exchange
Collecting security- and fraud-related data from multiple sources can often just result in creating a very large pool of unrelated facts. But begin to add context to that data and you now have information. Triangulate multiple pieces...
Fraud Ecosystem
In June this year the "Ronald Reagan" batch of credit cards (potentially those stolen from PF Chang's) joined the "Barbarossa" batch from Target in becoming publicly available for purchase. Featured on the popular Rescator card shop (stolen card data marketplace), with advanced features like money...
Real-time, customer-centric fraud prevention starts with transforming fraud management into an area of competitive advantage. Innovations in analytics and the ability to respond in real-time are now allowing financial services organizations to effectively address various fraud issues across their products and at the...
No single security solution is enough to defend against today's multifaceted exploits. So it's time for a new holistic and cooperative approach to information security, says Bob Hansmann of Websense.
Warning from the U.K. Information Commissioner's Office: Businesses that work with big data must ensure they still comply with EU data protection regulations, especially when it comes to keeping personal information private.
Big data has been the recent buzz in security circles, but what are organizations missing by overlooking the power of "small data?" Verizon's Jay Jacobs discusses how to get the most from data analytics.
To detect and deter today's threats, security teams need new and dynamic data analytics capabilities. Haiyan Song of Splunk discusses the analytics-enabled SOC and how to improve incident response.
French IT services company Atos has announced its intention to purchase Bull, an enterprise data firm, to enhance its cybersecurity and big data offerings. The deal is worth $844 million, or 620 million euros.
Fraud Summit - Chicago 2014 - Banking institutions face sophisticated fraud threats from multiple channels simultaneously, and traditional device and application controls are insufficient to provide security. Enter the concept of context-aware security, which leverages big data analytics among multiple layers of...
Timely analysis of data residing in an organization's information systems is a critical element of IT security, say Haiyan Song and Joe Goldberg of the security firm Splunk.
A White House working group exploring big data and privacy has proposed that Congress enact a national data breach notification law and strengthen the government's role in cybersecurity.
Fraud Summit - San Francisco 2014 - Banking institutions create and store volumes of data, but integrating and applying that information in a meaningful way has proved challenging. Register for this session to learn first-hand from bit data and analytics experts:
How big data is being used to analyze and detect...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.