Security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries, and over 16 million consumers in the US were victims of identity theft or fraud in the past year. Learning to onboard new data at the speed of the business will ensure your fraud team can...
Despite increasing investment in cyber security tools, there has been a significant increase in in data breaches, compliance violations and their related costs, specifically those relating to insider threats: accidental loss, misdirected content, and the malicious insider. These types of incidents contribute up to 80%...
Businesses remain plagued with weak, reused, old, and potentially-compromised credentials, and every password is a potential entryway to the business that needs to be properly protected and managed. While technology can help address these issues, it is critical to address people and processes first to improve the...
This talk covers the professional practice of cybersecurity risk management considered from the perspective of enterprise governance and operational risk management. It will encompass cybersecurity risk classification and assessment. Concepts include: cybersecurity risk identification, classification, measurement,...
For years now, leading-edge security thought leaders have called for organizations to shift from a conventional "peacetime" view of cybersecurity to more of a wartime mindset - acknowledging and responding to the aggressive tactics of global adversaries. It is time, then, for enterprises to shift from conventional to...
Financial fraud can be notoriously hard to detect and easy to cover up. But does blockchain technology with its distributed digital ledger now offer a new tool to help organizations reduce risk and prevent fraud? Which key business and technical factors will help blockchain scale for the large enterprise? Attend this...
Brett Johnson, referred to by the United States Secret Service as "The Original Internet Godfather" has been a central figure in the cybercrime world for almost 20 years. He founded and was the leader of Counterfeitlibrary.com and Shadowcrew.com. Working alongside the top cyber criminals of our time, he helped design,...
Protecting customers and company resources in the cloud is a constant struggle and balancing act. Fraudsters are aided by new techniques and technologies while unknowing customers support their efforts. In this session, fraud prevention experts from Amazon Web Services will outline the compromise problem and discuss...
Stolen data is one thing - the consequences are obvious. But what if data is not stolen or leaked, but rather altered? What could be the damage? Diana Kelley of Microsoft discusses the emerging topic of data integrity and how to preserve it.
Join this session, as Kelley discusses:
How and where data can be altered -...
Given current, turbulent conversations around physical and cybersecurity, it's hard to get an exact pulse on the state of the industry and where to start shoring up corporate processes to protect information. But with business and personal safety on the line, it's become increasingly important to be able to identify...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.