On Demand Webinars

Webinar-Account-Registration-Fraud-CoverLeveraging Cybercrime Intelligence Data to Stop Fraud
Fraud prevention and security professionals can stay ahead by knowing the latest attack trends. View this webinar for an analysis of findings from the ThreatMetrix Cybercrime report. This front-line view of the global war against cybercrime is based on actual cybercrime attacks detected by the ThreatMetrix Global Trust Intelligence Network during real-time analysis and interdiction of attacks. This session will review data gathered from over 850 million monthly transactions, including findings from the recent Black Friday – Cyber Monday weekend.- View the Webinar Here

 

Webinar-Account-Registration-Fraud-CoverStopping Online Fraud During Peak Shopping Season
Fraudsters and organized cybercrime groups increase their attacks during peak shopping seasons, exploiting seasonally higher transaction volumes to avoid detection. Online businesses are challenged to prevent fraudulent transactions without adding friction that could impact revenue by deterring legitimate, trusted customers. Learn how you can stop payment fraud without adding friction during the next peak season.- View the Webinar Here

 

Webinar-Account-Registration-Fraud-CoverReducing Fraud Risk From Stolen Accounts
The recent revelation of a hacker stealing 1.2 billion username-password combinations is just the latest proof point of the increasing sophistication, scale and risk of payment fraud and account takeover attacks. Whether they are login credentials stolen by hackers or payment cards exposed in breaches, they will be used to defraud your business by gaining access to the accounts of your legitimate customers. This “summer of stolen credentials” may result in increased fraud risks to your business. - View the Webinar Here

 

Webinar-Account-Registration-Fraud-CoverPrevent Account Registration Fraud with Real Time, Layered Protection Strategies
Fraudulent account registration is an evolving threat, with cybercriminals using increasingly sophisticated methods to set up accounts with stolen and fictitious identities. Today’s businesses are challenged to determine if applicants are who they claim to be or are criminals preying on their business – all in real time, without negatively impacting customer experience. - View the Webinar Here

 

Preventing Payment Fraud and Building Customer Trust
As online shopping continues to grow, so does online payment fraud. With cybercriminals increasing their sophistication, financial institutions and other businesses need to trust legitimate, revenue producing customers, while preventing losses caused by fraudsters using stolen credit card data. And it all needs to happen in real time. - View the Webinar Here

 

Account Takeover Fraud – What You Should Know
Financial institutions continue to be troubled by account takeover attacks, and the problem is only getting worse. Breaches at retailers and banks have exposed customer information from millions of credit card accounts, while Heartbleed and breaches at social media sites have exposed the passwords of millions more.

Highly organized hackers and fraud rings buy and sell this data on the open market and use it to defraud you and your customers. Relying on a password to authenticate a user is not sufficient, but complicated and time-consuming authentication processes turn customers away. Today’s organizations need to stop fraud without impacting trusted customers, and do it in real time. - View the Webinar Here

 

Webinar-Mobile-Fraud-May2014-CoverMobile Cybercrime Prevention: Why You Need New Defenses
The increased use of mobile devices for online business has created a new target for fraudsters and cybercriminals. Smartphones, tablets and mobile apps are exploited by cybercriminals to launch account takeover, payment fraud and fictitious account creation attacks that can cost revenue, damage brand reputation and compromise critical data.

Just as smartphones and tablets differ from laptops and desktop computers, preventing mobile fraud and cybercrime requires new methods and technologies to detect attempted attacks in real time and protect against them. - View the Webinar Here

 

Webinar-Account-Takeover-CoverAccount Takeover: Why Payment Fraud Protection is Not Enough
Fraudulent account takeover attacks continue to increase. Data breaches and Heartbleed have exposed millions of credit cards and login credentials, delivering a bounty of data that organized fraudsters and hackers are using to compromise accounts, increasing the risk of lost revenue and exposure of your business’s sensitive data. - View the Webinar Here

 

Webinar-Credit-Card-Data-Breaches-CoverThe Cost to E-Commerce from Credit Card Data Breaches
Credit card breaches both large and small are increasing in frequency. Even if your business is not the direct victim of a breach, you may bear the cost through increased fraud losses and chargeback fees. Whether the card data is collected by hacking into a database or by placing a skimmer on an in-store card reader, the compromised card data is sold on the open market to fraudsters who make purchases on your site. - View the Webinar Here

 

Webinar-PaymentFraud-PreventATO-CoverBeyond Payment Fraud: Preventing Account Takeover
Fraudsters and hackers have developed highly sophisticated attacks to gain access to your customers’ accounts. First created to bypass the high security of online banking, these attacks now target e-commerce sites where trusted customers’ credit card and checking accounts can be used to buy goods and services that are quickly converted to cash. - View the Webinar Here

 

Webinar-Mobile-Banking-Fraud-Jan2014Protecting Against Mobile Banking Fraud
The phenomenal growth of mobile banking continues, with consumers expecting instant, secure access wherever they may be. Sales of smartphones and tablets have left laptops in the dust. Fraudsters, hackers and organized cybercrime groups exploit this channel to takeover accounts from trusted customers and create fraudulent accounts using stolen identity information. - View the Webinar Here

 

PaymentFraud-CustomerFriction-CoverHow to Stop Online Payment Fraud Without Adding Friction
Online payment fraud resulted in billions of dollars in losses last year. Stopping fraud without impacting the experience for trusted customers is the goal in organizations where any measure that adds to customer friction is a non-starter. - View the Webinar Here

 

Webinar-Gift-Card-Fraud-Dec2013-CoverPhotoGift Card Fraud – What It Is and How It Works
Online purchases of gift cards – both electronic certificates and physical cards – are among the most frequent targets of fraudsters. Popular with legitimate customers to simplify shopping, the ease of transferring gift cards and merchandise purchased with these cards makes them an equally popular fraud channel. - View the Webinar Here

 

ATO-Mobile-Threats-CoverAccount Takeover and the Rise of Mobile Threats
As consumers embrace mobile as their platform of choice for online shopping and banking, the threats from account takeover and malicious malware increase. E-Commerce and financial services organizations require comprehensive strategies that protect against attacks targeting their websites, mobile sites and mobile apps. - View the Webinar Here

 

Webinar-Fraud-Trends-CoverLatest Fraud Trends and How to Prevent Them
Keeping up with fraudsters is a constant challenge. While you’re working to stop their latest threat, cybercriminals are developing a new type of attack. They target one site after another, moving from banks to stores more quickly than ever before. If you could share threat intelligence from thousands of sites in real time, you can stay ahead. - View the Webinar Here

 

Payment Fraud CoverDetecting Payment Fraud from Mobile Apps & Browsers
As companies and consumers increasingly conduct business using multiple devices, cross-channel payment fraud is trending up for cybercriminals. Detecting these attacks requires a solution that protects you in real time whether the visitor is using a browser from a laptop or smartphone, or is using a mobile app. - View the Webinar Here

 

Cross Channel CoverDetecting Cross-Channel Fraud and Multi-Vector Attacks
Financial institutions face increased threats from cross-channel fraud attacks. Sophisticated attacks relying on stolen accounts, malware, social engineering and identity spoofing are difficult to detect until it is too late. Learn how to analyze the activities of legitimate customers and bad actors in real time. - View the Webinar Here

 

Cover ImageMobile Cybercrime: Protecting Your Business and Your Customers From Attacks
Mobile device usage is the fastest growing trend in online business. Sophisticated attacks against mobile business from fraudsters and hackers are also growing rapidly, using mobile devices to commit payment fraud and launch criminal attacks. Protecting against these attacks requires real-time analysis of persona and behavioral data to separate trusted customers from malicious cybercriminals. - View the Webinar Here

 

ATO CoverAccount Takeover Prevention: Maximize Revenue & Customer Satisfaction
Account takeover attacks are a rapidly growing threat to banks, e-merchants and other online businesses. Companies must implement anti-takeover strategies that stop cybercriminals without negatively impacting customer satisfaction and revenue. To combat account takeover fraud while continuing to increase revenues, advanced protection measures that do not increase customer friction are required. - View the Webinar Here

 

WebinarIdentity Spoofing from Malware: The Increasing Threat to Financial Institutions
Threats from spoofed identities and fictitious account creation are an increasing problem for financial institutions. Giving a customer an online account lets them in your front door, but cyber-criminals use false identities to get inside and defraud you and your valued customers. Financial institutions must separate fraudsters from legitimate customers in real time by identifying known problems and suspicious activity, using knowledge of each individual’s devices, preferences and previous activity. - View the Webinar Here