Training

Events , Fraud Management & Cybercrime , Fraud Summit

Identities - A Journey from Anonymous Bitcoin Fraud to Managing Verified Authentication

Identities - A Journey from Anonymous Bitcoin Fraud to Managing Verified Authentication

Part 1: Bitcoin Fraud - The Perfect Crime

Bitcoin, a next-generation crypto-currency whose origin is shrouded in mystery, is receiving growing attention from cybercriminals and is perhaps the largest real-world testing lab for the effects of trust on consumer and business demand. This fascinating presentation will demonstrate how Bitcoins are acquired and exchange hands, and show how Bitcoin digital wallets can be easily compromised.

Part II: Do They Know Who You Are? Musings on Identity & Authentication

Whether mobile, at work or at leisure, our digital footprint has increased many folds over the last ten years, and with the average person having 26 password-protected accounts but only five different passwords, it is no wonder that ID theft represented 60% of all UK fraud in 2013. Join this session as we take a fast paced tour of the current industry landscape and provide answers to the questions many organizations are grappling with.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Background

Part 1: Bitcoin Fraud - The Perfect Crime

Banking institutions that are considering whether to accept virtual currencies, such as Bitcoin, and possibly integrate them into their offerings must keep track of the latest developments and be aware of key risks, including potential use of the currencies for money-laundering schemes.

This presentation will demonstrate how Bitcoins are acquired and exchange hands, and show how Bitcoin digital wallets can be easily compromised. We'll also see:

  • What sort of malware targets Bitcoin, and is two-factor authentication enough?
  • Why is the Bitcoin economy a better target than online banking?
  • What can we learn from it when considering other next-generation payment schemes?

Part II: Do They Know Who You Are? Musings on Identity & Authentication

By the end of 2015, more than 75 percent of U.S. employees (and more than 1.3B workers worldwide) will routinely work remotely. This growth in mobile workforce means that criminals will phish, spoof, skim, packet sniff and key log their way into even more sensitive information.

The result?

  • ID theft represented 60 percent of all UK fraud in 2013.
  • 'Synthetic' ID theft is emerging as fastest-growing type of consumer fraud.
  • The use of stolen credentials was found in 31% of the breaches while phishing was used in 18 percent.

This presentation will provide answers to the following questions:

  • What are the current trends for identity and authentication?
  • How can the tensions between generating income and managing fraud be addressed?
  • What predictions can we make for effectively managing identities in the next few years?
  • What pitfalls should be avoided?

This session was recorded during the 2014 Fraud Summit London. Additional recordings include:

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.