Fraud & Breach Prevention Summit



The data stolen during a breach is used for many purposes, but especially for fraud. Security and fraud teams are working ever more closely together, both pre- and post-breach, to ensure that they are in the best possible position to defend, detect and respond. In this dual-track event intended for senior InfoSec and fraud professionals, we’ll focus on the latest fraud techniques and technologies, as well as a holistic, strategic approach to looking at the data breach problem that affects all industries. Feel free to switch between sessions in each track and network with your peers, as well as our speakers and sponsors, throughout the day.

 

Attendees also gain OnDemand access to all summit recordings and our curriculum of 400+ webinars after the Summit.

 

12:00pm – 1:00pm: Workshops Registration & Networking

 

1:00pm – 2:30pm: The New Wave of Fraud Analytics and AI

Fraud detection has long been a goal of big data analytics, but we’ve seen too many expensive deployment casualties along the way, leaving us with lakes of data and minimal successful fraud detection.

 

But today as data collection techniques develop and machine-learning capabilities are tuned to this use case, highly accurate data linkage and pattern detection solutions can be created to quickly identify fraudulent behavior amid the “noise” of authentic transactions.

 

Attend this session to learn how some forward-looking organizations are using advanced analytics tools to:

- Use the latest in multi-channel modeling and identification patterns technology to detect fraud;
- Pull actionable information from cognitive analysis and AI;
- Reduce the opportunity for cross-channel fraud;
- Cut response time between suspicious activity occurrence and detection;
- Take unstructured data and turn it into relevant information for decision-making and analysis.

 

2:30pm – 3:00pm: Break & Networking

 

3:00pm – 4:30pm: Breach Response Planning: Hammer Out Your Legal, Business and Technology Differences Before a Breach

 

Every mature enterprise understands the necessity of a maintaining a tested breach response plan. But it’s critical for the scope of that plan to go beyond technical operations, covering all interested parties, such as legal, finance and media relations, that may have greatly different priorities at crunch time.

 

Hear the perspectives of key stakeholders – the practitioners who represent legal, IT and business operations, and whose organizations have suffered severe data breaches. Learn from them:

- The roles each stakeholder plays in crafting and testing the plan;

- What changes when the breach is real and it’s time to put the plan in action;

- Lessons learned from their own breach experiences.

 

4:30pm – 5:00pm: Closing Remarks

 

5:00pm – 6:00pm: Dinner & Networking

Relevant Government Agencies

Dept of Commerce, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of Treasury, State Government, County Government, City Government, Municipal Government


This event has no exhibitor/sponsor opportunities


When
Tue-Wed, Jul 12-13, 2016, 9:00am - 5:00pm


Cost

Conference:  $595.00


Where
To Be Announced
Boston, MA
Get directions


Website
Click here to visit event website


Organizer
iSMG


Contact Event Organizer



Return to search results