The Secret Fraud Eco-System and How to Put Threat Intelligence to Work
Fraud Summit - Chicago 2014 - What becomes of customer account information once it is stolen by fraudsters? It enters a sophisticated underground economy, where account names and numbers are sold openly in the criminal marketplace. Underground market trends often yield clues to undiscovered breaches or targets. Join this session to learn:
See Also: Effective Cyber Threat Hunting Requires an Actor and Incident Centric Approach
- How this underground economy works;
- What threat intelligence can be gleaned from the marketplace;
- How merchants and financial institutions can better protect their assets.
The Target data breach brought so much to light - the evolving threats to merchants and point-of-sale systems, as well as the thriving underground economy that is in part fueled by trafficking of stolen payment card data.
But what are the key components of this underground economy, and why are they so difficult to monitor, much less stop?
Trusteer, an IBM company, has conducted fresh research into the global threat landscape, and in this session - recorded at the 2014 Chicago Fraud Summit - George Tubin shares the latest findings about card forums, market trends and evolving threats.
And then, from the banking institution's perspective, Mitch Zahler of HSBC shows how to leverage available threat intelligence to make real-time decisions in response to security threats and incidents.
Gain insight into this underground economy and how you can leverage threat intelligence to improve your anti-fraud defenses.
ISMG's Fraud Summits are one-day events focused exclusively on the top fraud trends impacting organizations and the mitigation strategies to overcome those challenges.
All 2014 Fraud Summit Chicago recordings:
You might also be interested in …