Man vs Machine: Fraudologists’ Guide to Defeating Attacks


Tuesday, March 22 • On-Demand

What is this webinar about?

Long gone are the days of the solo fraudster working from a laptop, handpicking victims. Nowadays, fraud is controlled by organized criminals with vast resources who invest heavily in the technology they use for their attacks. Why would hackers manually test out stolen credit cards one by one when they can set up a program to test thousands of them in minutes?

Fraud teams need to understand their enemies and combine technology and a strong management strategy to defeat todays threats.

In this webinar, we will analyze the latest tactics and technology used to combat different types of attacks, including emulators, credential stuffing, cloud phones, app cloners, proxies, hooks, jailbreaks, and more.




Sponsored By:
DataVisor 3-10 webinar-headshots.png

DataVisor 3-9 webinar-square.png

In this webinar, we will be discussing the following areas:

  • How to spot activities and traffic and differentiate them from legitimate users.
  • How to design strategies to stop fraud attacks in financial services, ecommerce, social media, and more.
  • How to use technology to prevent future attacks by bad actors.
  • Why traditional online fraud protection systems fail to stop advanced fraud attacks.

Watch