Fraud Management & Cybercrime , Fraud Risk Management , Video

New Approaches to Fighting Fraud

Mary Writz of ForgeRock on the Convergence of Identity and Fraud
Mary Writz, vice president, product management, ForgeRock

The intersection of fraud and identity has never been more important, says Mary Writz, vice president of product management at ForgeRock. "The fraud team has a really great capacity to look at data, manage cases and think about new use cases," she says, "and the identity team has the ability to put them in predictive mode, preventive mode and real time. So them coming together is really powerful."

Writz also says it's essential to have a strategic goal across both domains and to consider how to handle budgets and metrics across the two teams.

In a video interview with Information Security Media Group, Writz discusses:

  • The blurring lines between fraud and identity;
  • The challenges of fraud and identity coming together;
  • Techniques to balance friction with risk when fighting fraud.

Writz is charged with delivering products and solutions that solve digital identity challenges. She has 19 years of experience in the field of cybersecurity. Prior to ForgeRock, she held product and leadership positions at Hewlett Packard and IBM in domains such as threat detection, machine learning, penetration testing, security intelligence, distributed denial of service, and targeted attack protection.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.