Break the Fraud Lifecycle

David Mattos of Easy Solutions on Strategies to Fight Fraud
Break the Fraud Lifecycle

Fraudsters continually find new ways to attack, but too many organizations rely on old, unsuccessful methods to detect and prevent fraud. This is the premise, says David Mattos, VP Sales, with Easy Solutions.

It's time to break the traditional fraud lifecycle and explore new strategies for fighting these ever-evolving crimes, Mattos says.

In a video interview recorded at RSA 2014, Mattos discusses:

  • Why current anti-fraud strategies are ineffective;
  • The potential pitfalls of regulatory compliance;
  • How to break the fraud lifecycle.

Mattos brings more than 20 years of senior sales technology leadership to Easy Solutions, along with a deep understanding of how to drive incremental revenue through direct sales, the channel, and strategic alliances. As Vice President of Sales for the US and Canada, he is responsible for the effectiveness of the company's direct sales force, finding and securing new channel and partnership opportunities, and defining sales strategies that fuel growth and new opportunities for Easy Solutions' portfolio of advanced fraud prevention solutions.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.