Key Trends in Payments Intelligence - Machine Learning for Fraud Prevention

Bank information security

Banks can drive real value to their fraud prevention strategies with machine learning and analytics if they cut through the hype. Machine learning can be made intuitive and available directly to fraud experts. A multi-faceted strategy can turn fraud prevention expertise into a revenue generator for the business. Register for this webinar and join Marc Trepanier, Principal Fraud Consultant at ACI Worldwide, and leading industry analyst Julie Conroy of Aite Group as they discuss real-life use cases that demonstrate how banks can: Improve data management control costs while reducing the compliance and regulatory risks.
Watch Now

Spotlight

Answer the Demand for Certified Professionals Prepping for an (ISC)² credential, like the CISSP, is a big commitment. Maybe you’ve started, but life got in the way of your goal… We get it. That’s why we created the (ISC)² Exam Action Plan to help keep you on track for success. Because we need talented, skilled people like you w

OTHER ON-DEMAND WEBINARS

2019 Vulnerability Management Predictions

Nopsec

Michelangelo Sidagni, CTO and Parag Baxi, VP of Product Management, discussed customer comments from 2018. They covered vulnerability management complaints, requests, wishes and hopes. They have set some goals for the vulnerability management market for 2019 and discussed those goals on this webinar! Michelangelo & Parag Covered: Vulnerability scanning goals. Determining asset value. Attack Predictions: when will a vulnerability become dangerous? Vulnerability categorization. Remediation Goals.
Watch Now

Transform Security and Risk Into a Business Function: A Panel Discussion

Gartner

As organizations and governments race towards digital transformation, they expose themselves to a variety of risks that traditional information and cybersecurity practices are not accustomed to encountering. In the face of technology evolution, regulatory complexity, an increasing threat landscape and limited resources, will security and risk leaders be able to align to the ambitious goals set by their business leaders? In this unique complimentary live video discussion, 4 leading Gartner security & risk experts debate how the nature of risks are evolving and what you can do to transform security and risk into a business function.
Watch Now

Top 5 Reasons Hackers Want Your Employees’ Mobile Devices

Zimperium

While most organizations are realizing that they need to protect their employees’ mobile devices in order to protect confidential corporate data, some companies try to remain blissfully naive to the hacking opportunities smartphones and tablets present. Given the ever-growing use of mobile devices and the number of mobile cyberattacks, companies can no longer plead ignorance to these mobile threats.
Watch Now

Thinking Like a Cyber Attacker: Strategies for Defense

Veracode

Increasingly, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren’t overlooking key vulnerabilities? In this Dark Reading webinar, experts discuss methods for testing your security’s mettle by thinking like your adversary.
Watch Now

Spotlight

Answer the Demand for Certified Professionals Prepping for an (ISC)² credential, like the CISSP, is a big commitment. Maybe you’ve started, but life got in the way of your goal… We get it. That’s why we created the (ISC)² Exam Action Plan to help keep you on track for success. Because we need talented, skilled people like you w

resources