Cyber criminals are constantly upgrading their technology to perform more sophisticated, widespread attacks. Preventing breaches and account takeover begins with understanding how criminals operate. This presentation will guide guests through the criminal’s timeline and methods, as well as explain why existing prevention products aren’t providing the protection organizations think. More interestingly, we will demonstrate how this same data can be used to find criminals true identities! Learn how law enforcement hunts threat actors and how their tactics can be applied to corporate protection.
1) Understand the linkage between data exposed in third-party breaches and the perpetration of fraud by criminals
2) Gain insight into what works, and more importantly, what doesn't work and why in the mitigation of breaches and account takeover threat
3) Learn how to turn the tables on criminals by leveraging the breadcrumbs they leave behind in third-party breaches to feed investigations