Consumer or Fraudster: Balancing Fraud Losses and the Customer Experience

WEBINAR

Consumer or Fraudster: Balancing Fraud Losses and the Customer Experience

Person at laptop

As consumers, we rely on our digital identities more than ever. Our online behavior (like reusing passwords and downloading malicious attachments) puts us at risk of fraud, but things outside our control – including data breaches that expose our personal information – do the same. Fraudsters are the beneficiaries of our leaked personal data, exploring all avenues to impersonate us for their gain. 

As cybercriminals become more sophisticated with their tactics, enterprises with even the most robust fraud prevention programs will continue to have difficulty distinguishing legitimate consumers from cybercriminals.

So is your user a consumer or fraudster? A lack of confidence in the answer puts your bottom line in harm’s way, as synthetic identities, account takeover, and online fraud jeopardize your enterprise.

In this webinar, experts from SpyCloud & Aite-Novarica have a candid conversation about the latest trends in fraud and what organizations can do to protect themselves while balancing losses and the customer experience:

  • Direct insights into the latest fraud tactics and avenues
  • The scale and impact of leaked consumer PII that aids new account fraud and synthetic identity construction
  • Real-life examples from the front lines in the fight against fraud
  • Best practices on how organizations can level the playing field with fraudsters
  • Proactive approaches for negating rising fraud trends

View the Webinar

Presenter Information

Trace Fooshee, Aite-Novarica

Trace Fooshée, Strategic Advisor in Aite-Novarica’s Fraud & AML Practice

Trace Fooshée is a senior advisor in Aite-Novarica Group’s Fraud & AML practice, covering a variety of topics related to fraud and identity since April of 2019. Mr. Fooshée’s background includes more than four years of experience as a management consultant for EY and Deloitte and more than 11 years with SunTrust Bank where he served in a variety of roles but most recently as Head of Fraud Strategy.

Pattie Dillon – Anti-Fraud Product Manager, SpyCloud

Pattie Dillon’s passion for fraud prevention and risk mitigation began in 2002 at her firm Etalinc, LLC, where she pioneered the development and creation of a privacy-oriented online IDresponse age verification and identity verification SaaS platform. Her previous roles as President of Veratad Technologies and Director at Wolfe had her focused on reducing fraud and compliance risk and combating gift card fraud. These roles led her to work with Merchants and Law Enforcement to track criminal activity. Now at SpyCloud, Pattie is the Anti-Fraud Product Manager. Her focus is developing creative and innovative ways to fight fraud with SpyCloud’s leading-edge products and networking with others in an effort to build a safer internet through collaboration and knowledge sharing.

Pete Barker, SpyCloud

Pete Barker – Director of Fraud and Identity, SpyCloud

Pete has spent over 25 years in the fraud and investigations space most recently as the Director of Fraud and Identity for SpyCloud. Prior to SpyCloud, Pete held the position of Senior Manager of Digital Loss Prevention at Dick’s Sporting Goods where he put the ecommerce fraud department on the map when he and his team won the 2018 North American Fraud Awards. He has spoken at several MRC events either in person or virtually. He has a proven track record of achieving goals, implementing and managing strategies that drive profitability, lower costs and prevent fraud.

A few of our happy customers:

The SpyCloud Difference

SpyCloud solutions are backed by the world’s most current and comprehensive repository of recaptured data from breaches, malware-infected devices, and other underground sources – with billions of exposed credentials and PII. It’s the same data that fraudsters use, but we make it actionable to prevent account takeover, ransomware attacks, and online fraud.

Our goal is to help organizations to protect themselves from criminal activity and disrupt criminals’ ability to profit from stolen data.

stat-blocks-stacked

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.

The Ransomware/Stolen Credentials Connection

WEBINAR

The Ransomware/Stolen Credentials Connection

ransomware-stolen-credentials-webinar

Ransomware attacks are on the rise, and no industry or company is off-limits. For criminals, it’s a short and clear path from obtaining a stolen account credential to penetrating a network and demanding millions in ransom. For victims, the result is massive business disruption, negative press, brand damage, and an expensive, time-consuming remediation process.

But ransomware only works if cybercriminals have access to your network. The majority of these attacks stem from stolen credentials, and taking back control starts with proactive measures to negate their value.

In this on-demand webinar, we break down the ransomware ecosystem, adversary groups’ latest tactics, and strategies to mitigate your risk and avoid paying millions to ransomware gangs.

You’ll learn:

  • How ransomware operators select their targets and work with other players in the ecosystem to efficiently exploit vulnerabilities
  • Common entry points to corporate networks and the order of operations for attacks, including where stolen credentials come into play
  • Necessary proactive defenses that reduce the risk of attacks while negating bad habits like password reuse

There’s no room for error when it comes to ransomware. This webinar demystifies these insidious attacks and shows you how to reduce your exposure.

Want more info? Check out our blog:
One for the Money, Two for the Show, $4.4M for the Ransomware Gang That Used AT0

With recovery costs averaging $1.85M, we took a deeper look at the crisis-level ransomware threat by analyzing some recent attacks that originated from stolen credentials.

Read more

View the Webinar

The Ransomware/Stolen Credentials Connection

Presenter Info

CW Walker – Manager, Solutions Architects

CW Walker started his career in government as a threat intelligence analyst. His passion is understanding the stories that can be told through collection and analysis of interesting data. He has lead teams of solutions engineers at multiple threat intelligence companies and currently supports SpyCloud’s technical GTM efforts.

A few of our happy customers:

The SpyCloud Difference

Stolen credentials – obtained through breaches and malware-infected devices – are a criminal’s all-access pass to your systems. So take them out of the equation. SpyCloud offers early detection and continuous visibility of exposed credentials and negates this threat vector immediately. The effort and cost of recovery from ransomware (not to mention the negative press attention) far outweigh the effort and cost associated with proactive prevention.

SpyCloud acts as a ransomware “early warning system” for hundreds of global enterprises, including half of the Fortune 10.

Laptop with SpyCloud

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.