This document provides an agenda and schedule for the Cybercrime Prevention Summit 2015 event. The summit will take place from October 7-9 at various locations and will include general sessions, panels, and presentations on topics related to cybercrime prevention and digital identity. The schedule outlines the daily timing of activities like breakfast, presentations, breaks, and meals. It also provides short bios of some of the featured speakers at the event.
ThreatMetrix ARRC 2016 presentation by Ted EganKen Lam
ThreatMetrix® is the market-leading cloud solution for authenticating digital personas and transactions on the Internet.
ThreatMetrix analyzes more than 15 billion transactions annually, from 30,000 websites across 4,000 companies globally through the Digital Identity Network. ThreatMetrix secures businesses and end users against account takeover, payment fraud and fraudulent account registrations resulting from malware and data breaches. Key benefits include an improved customer experience, reduced friction, revenue gain, and lower fraud and operational costs.
Digital Identities within the ThreatMetrix Digital Identity Network show a pattern of trusted behavior by incorporating anonymized non-regulated personal information such as user name, password and email address with device identifiers, connection and location characteristics. At the same time ThreatMetrix profiles all devices accessing a website (desktops, laptops, smartphones, or tablets), to identify the presence of malware or other anomalies that might indicate a high-risk transaction. High risk anomalies can be easily identified and flagged for review or automatic rejection. Businesses can confidently detect transactions, including:
Payments From Legitimate Users – Confidently approve transactions from legitimate, trusted users; streamlining their online experience and reducing unnecessary friction.
Transactions From Cybercriminals – Reject transactions from known fraudsters, or bots carrying out credit card testing. Detect multiple identities using a single device, mismatches between identity and location, devices disguising their true locations, and other indicators of identity theft.
MITM or MITB Malware – Avoid accepting transactions from devices compromised by malware. Use page fingerprinting to detect compromised sessions that may be redirecting or altering transaction information in flight.
As more and more data is received by companies every second it is vital for them to protect their customers at the highest level. Even the biggest tech giants did not avoid the failure: Google, Facebook
But there is another field that receives tremendous amounts of very private information - hotels
Let's discover how Marriott has overcame one of the biggest data 'leakages' in the history
Or it hasn't?
Intelligence-Driven Fraud Prevention
This RSA white paper discusses the need for new, intelligence-based approaches to manage fraud across digital channels.
Cyber Defense for SMBs offers guidance to help small and medium-sized businesses identify the most cost-effective best practices to help improve their business’s cybersecurity posture. Published by the Florida Center For Cybersecurity and written by cybersecurity experts from academia, private industry, government and the military.
California has always been a king of innovation - from the earliest ventures in filmmaking to today’s Silicon Valley technologies. So it's not surprising that California has been at the vanguard of cybersecurity, being the first state to enact a breach data notification law in 2003.
Laws don't stop cybercriminals, though - and California has seen a sharp rise in breaches the last 4 years, according to The California Data Breach Report. Consider these chilling realities:
• There were 657 data breaches involving more than 500 records from 2012-2015 - impacting a total of more than 49 million records of Californians.
• In 2012, 2.6 million records were impacted; by 2015, that number rose to 24 million.
• Nearly 3 out of 5 California residents were victims of a data breach last year.
According to the report, every industry is affected: schools, hospitals, restaurants, retailers, banks, hotels, government agencies and more. Any of them can suffer severe consequences, such as brand damage, class action lawsuits, lost business and regulatory fines. Their users and consumers see their social security numbers, payment card data, medical information, driver's license numbers and other personal data fall into criminal hands; according to Javelin Strategy & Research, 67 percent of 2014 breach victims in the U.S. were also victims of fraud.
ThreatMetrix ARRC 2016 presentation by Ted EganKen Lam
ThreatMetrix® is the market-leading cloud solution for authenticating digital personas and transactions on the Internet.
ThreatMetrix analyzes more than 15 billion transactions annually, from 30,000 websites across 4,000 companies globally through the Digital Identity Network. ThreatMetrix secures businesses and end users against account takeover, payment fraud and fraudulent account registrations resulting from malware and data breaches. Key benefits include an improved customer experience, reduced friction, revenue gain, and lower fraud and operational costs.
Digital Identities within the ThreatMetrix Digital Identity Network show a pattern of trusted behavior by incorporating anonymized non-regulated personal information such as user name, password and email address with device identifiers, connection and location characteristics. At the same time ThreatMetrix profiles all devices accessing a website (desktops, laptops, smartphones, or tablets), to identify the presence of malware or other anomalies that might indicate a high-risk transaction. High risk anomalies can be easily identified and flagged for review or automatic rejection. Businesses can confidently detect transactions, including:
Payments From Legitimate Users – Confidently approve transactions from legitimate, trusted users; streamlining their online experience and reducing unnecessary friction.
Transactions From Cybercriminals – Reject transactions from known fraudsters, or bots carrying out credit card testing. Detect multiple identities using a single device, mismatches between identity and location, devices disguising their true locations, and other indicators of identity theft.
MITM or MITB Malware – Avoid accepting transactions from devices compromised by malware. Use page fingerprinting to detect compromised sessions that may be redirecting or altering transaction information in flight.
As more and more data is received by companies every second it is vital for them to protect their customers at the highest level. Even the biggest tech giants did not avoid the failure: Google, Facebook
But there is another field that receives tremendous amounts of very private information - hotels
Let's discover how Marriott has overcame one of the biggest data 'leakages' in the history
Or it hasn't?
Intelligence-Driven Fraud Prevention
This RSA white paper discusses the need for new, intelligence-based approaches to manage fraud across digital channels.
Cyber Defense for SMBs offers guidance to help small and medium-sized businesses identify the most cost-effective best practices to help improve their business’s cybersecurity posture. Published by the Florida Center For Cybersecurity and written by cybersecurity experts from academia, private industry, government and the military.
California has always been a king of innovation - from the earliest ventures in filmmaking to today’s Silicon Valley technologies. So it's not surprising that California has been at the vanguard of cybersecurity, being the first state to enact a breach data notification law in 2003.
Laws don't stop cybercriminals, though - and California has seen a sharp rise in breaches the last 4 years, according to The California Data Breach Report. Consider these chilling realities:
• There were 657 data breaches involving more than 500 records from 2012-2015 - impacting a total of more than 49 million records of Californians.
• In 2012, 2.6 million records were impacted; by 2015, that number rose to 24 million.
• Nearly 3 out of 5 California residents were victims of a data breach last year.
According to the report, every industry is affected: schools, hospitals, restaurants, retailers, banks, hotels, government agencies and more. Any of them can suffer severe consequences, such as brand damage, class action lawsuits, lost business and regulatory fines. Their users and consumers see their social security numbers, payment card data, medical information, driver's license numbers and other personal data fall into criminal hands; according to Javelin Strategy & Research, 67 percent of 2014 breach victims in the U.S. were also victims of fraud.
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
The Money 2.0 Conference dives into the latest market trends, enterprise risk management strategies, regulatory changes, and FinTech developments in the rapidly-evolving finance and insurance landscape. A three-day conference, it will delve into crucial topics such as the role of blockchain in banking, cybersecurity, digital forensics, spam identification; it will also review investments in emerging markets, money scam and fraud detection, retirement savings, and much more.
Listen to top-notch speakers from well-known organizations who will share their valuable insights and break down the latest developments so that you learn how to manage and grow your wealth in a secure manner! Join us on 18th-20th March 2022 in Dubai, UAE and on April 11th-13th 2022 in Las Vegas, USA.
MTBiz is for you if you are looking for contemporary information on business, economy and especially on banking industry of Bangladesh. You would also find periodical information on Global Economy and Commodity Markets.
Accenture re-organizing-todays-cyber-threatsLapman Lee ✔
Banks are facing an urgent need to bring fraud risk management and IT security—two historic silos—more closely together to combat mounting data security and cyber threats.
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows
Our client received an email from a known attack group demanding a large sum of money to prevent a denial-of-service attack on their website.
Learn more at https://resources.digitalshadows.com/
Latin america cyber security market,symantec market share internet security,m...Ashish Chauhan
Get Ken Research Latest report on Brazil Cyber Security Market which covers Cyber Crimes Losses in Brazil,Future Endpoint Security Market,Symantec Market Share Internet Security,Avast Total Security Competition,McAfee Antivirus Market Share,Trustwave Competition Antivirus,Latin America Cyber Security Market,Cybercrime in Brazil
Cyber Claims: GDPR and business email compromise drive greater frequenciesΔρ. Γιώργος K. Κασάπης
Business email compromise (BEC) has overtaken ransomware and data breach by hackers as the main driver of AIG EMEA cyber claims, according to the latest cyber claims statistics.
Nearly a quarter of reported incidents in 2018 were due to business email compromise (BEC), up significantly from 11% in 2017. Ransomware, data breach by hackers and data breach due to employee negligence were the other main breach types in 2018.
Balancing Security and Customer ExperienceTransUnion
Using Device Insight to Balance Fraud Prevention and Customer Experience
Today, your customer’s device has become their proxy for a large percentage of their online retail and banking activity. By using insight from those devices, you can reduce risk and ensure a smooth experience along the entire customer journey.
In this webinar, you’ll learn from Max Anhoury, our VP of Global partnerships, about:
* Today’s fraud and security trends
* What a fraud ring looks like
* The evolving online experience with EMV
* How to create frictionless security across the consumer journey
Configuration File of Trojan Targets OrganizationDigital Shadows
With Digital Shadows SearchLight™, the IT security manager of a bank discovered a configuration file that indicated a banking trojan was targeting their customers.
Learn more at https://resources.digitalshadows.com/
One afternoon. Nine pitches. Who will get your 'investment'?
Enter the CyberDen and take your place in the dragon's seat. We're sending in eight leading cyber security vendors who will pitch their solutions to try and pique your interest.
We've rounded up some of the biggest names in the industry and exciting new players to provide you with an informative and relaxed afternoon. The RSA Vaults act as the perfect setting to make you feel like you're stepping in the den. You can then vote to 'invest' in the pitches that impress you or excite your interest.
Social business organizations, especially those in regulated industries, now know they must take privacy and data security seriously to gain consumer trust, but many don’t know how to begin implementing practices and software that protect the brand and the consumer. Can you be both a social business and have a secure data setup? How do you know what data to collect and what to block? How can you use a system that is both scalable and usable to flag unwanted content? How do you know when to export and archive data? How can you integrate a culture of data compliance into your entire organization?
In this webinar, we will discuss:
-Best practices for collecting, processing, and storing data.
-Software solutions that will help you start and scale a data management and compliance program.
-How to integrate a compliance strategy into technology solutions so the entire organization is on board.
Insights Success brings you the experience, knowledge, and expertise of such authentication companies in its new edition of “The 10 Most Reliable Authentication Solution Providers, 2021.”
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
The Money 2.0 Conference dives into the latest market trends, enterprise risk management strategies, regulatory changes, and FinTech developments in the rapidly-evolving finance and insurance landscape. A three-day conference, it will delve into crucial topics such as the role of blockchain in banking, cybersecurity, digital forensics, spam identification; it will also review investments in emerging markets, money scam and fraud detection, retirement savings, and much more.
Listen to top-notch speakers from well-known organizations who will share their valuable insights and break down the latest developments so that you learn how to manage and grow your wealth in a secure manner! Join us on 18th-20th March 2022 in Dubai, UAE and on April 11th-13th 2022 in Las Vegas, USA.
MTBiz is for you if you are looking for contemporary information on business, economy and especially on banking industry of Bangladesh. You would also find periodical information on Global Economy and Commodity Markets.
Accenture re-organizing-todays-cyber-threatsLapman Lee ✔
Banks are facing an urgent need to bring fraud risk management and IT security—two historic silos—more closely together to combat mounting data security and cyber threats.
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows
Our client received an email from a known attack group demanding a large sum of money to prevent a denial-of-service attack on their website.
Learn more at https://resources.digitalshadows.com/
Latin america cyber security market,symantec market share internet security,m...Ashish Chauhan
Get Ken Research Latest report on Brazil Cyber Security Market which covers Cyber Crimes Losses in Brazil,Future Endpoint Security Market,Symantec Market Share Internet Security,Avast Total Security Competition,McAfee Antivirus Market Share,Trustwave Competition Antivirus,Latin America Cyber Security Market,Cybercrime in Brazil
Cyber Claims: GDPR and business email compromise drive greater frequenciesΔρ. Γιώργος K. Κασάπης
Business email compromise (BEC) has overtaken ransomware and data breach by hackers as the main driver of AIG EMEA cyber claims, according to the latest cyber claims statistics.
Nearly a quarter of reported incidents in 2018 were due to business email compromise (BEC), up significantly from 11% in 2017. Ransomware, data breach by hackers and data breach due to employee negligence were the other main breach types in 2018.
Balancing Security and Customer ExperienceTransUnion
Using Device Insight to Balance Fraud Prevention and Customer Experience
Today, your customer’s device has become their proxy for a large percentage of their online retail and banking activity. By using insight from those devices, you can reduce risk and ensure a smooth experience along the entire customer journey.
In this webinar, you’ll learn from Max Anhoury, our VP of Global partnerships, about:
* Today’s fraud and security trends
* What a fraud ring looks like
* The evolving online experience with EMV
* How to create frictionless security across the consumer journey
Configuration File of Trojan Targets OrganizationDigital Shadows
With Digital Shadows SearchLight™, the IT security manager of a bank discovered a configuration file that indicated a banking trojan was targeting their customers.
Learn more at https://resources.digitalshadows.com/
One afternoon. Nine pitches. Who will get your 'investment'?
Enter the CyberDen and take your place in the dragon's seat. We're sending in eight leading cyber security vendors who will pitch their solutions to try and pique your interest.
We've rounded up some of the biggest names in the industry and exciting new players to provide you with an informative and relaxed afternoon. The RSA Vaults act as the perfect setting to make you feel like you're stepping in the den. You can then vote to 'invest' in the pitches that impress you or excite your interest.
Social business organizations, especially those in regulated industries, now know they must take privacy and data security seriously to gain consumer trust, but many don’t know how to begin implementing practices and software that protect the brand and the consumer. Can you be both a social business and have a secure data setup? How do you know what data to collect and what to block? How can you use a system that is both scalable and usable to flag unwanted content? How do you know when to export and archive data? How can you integrate a culture of data compliance into your entire organization?
In this webinar, we will discuss:
-Best practices for collecting, processing, and storing data.
-Software solutions that will help you start and scale a data management and compliance program.
-How to integrate a compliance strategy into technology solutions so the entire organization is on board.
Insights Success brings you the experience, knowledge, and expertise of such authentication companies in its new edition of “The 10 Most Reliable Authentication Solution Providers, 2021.”
The dire need of competent cybersecurity solution providers has made us look for, “The 10 Most Trusted Cyber Security Solution Providers, 2018.” On our cover page we have DERMALOG Identification Systems GmbH, which is an expanding company based in Hamburg with additional offices in Malaysia and Singapore, as a result of strong growth in the region.
Bank Branch Of The Future Conference 2014 - MalaysiaDigital Vidya
Care about building career in Social Media? Learn how Social Media Marketing (SMM) helps in Customer Acquisition from Digital Vidya's CEO & Co-Founder, Pradeep Chopra in a session led by him at Bank Branch Of The Future Conference 2014 in Malaysia. Find more about Digital Vidya at http://www.digitalvidya.com
Top 10 leading fraud detection and prevention solution providersMerry D'souza
CIOLOOK comes up with its edition of Top 10 Leading Fraud Detection and Prevention Solution Providers. Featuring it’s Cover Story is – Kaspersky is to save the world. Kaspersky is a global cybersecurity company founded in 1997 with its roots in antivirus solutions. Its mission is simple: to build a safer world.
The Social Mobile Payments: Americas conference provides the opportunity to gain valuable exposure and GROW your business!
Contact: Bruce Burke (727) 612-5775 gbc@gulfbayconsulting.com
Market your company to a highly targeted audience of executives, technology professionals and innovators by partnering with us. With four levels of distinction; Silver, Gold, Platinum and Diamond the Americas event provides opportunities designed to fit virtually any companies requirements.
Pre Launch Exxa Wallet with integrated AI trading bot this 29 of September in Singapore
Get paid for storing your Crypto Assets in the EXXA Wallet.
Website: https://exxa.net/
✅Referral Code (needed for register): 73131731
Connect with EXXA Network and be a part of EXXA community of cryptocurrency users. Store your existing crypto assets and start earning with Devo+ as soon as you join. Get immediate access to EXXA academy where you can learn as you earn, all while enjoying exclusive travel perks and discounts with EXXA partners.
✅Just launched on 19th Sep 2019.
You get paid for holding your Crypto in the wallet
Monthly profit of between 5% and 12% (Strategic multi-wallet placement)
✅21 Level compensation plan for Team Builders
Democratization of Finance
Digital Lifestyle
✈ Travel Network
Empower the masses on their digital wealth creation journey.
Token launched at $0.10 with HUGE potential to earn
Raise The Cybersecurity Curtain!
With a clear grasp of systems theory and revelation of pervasive, persistent, and resilient interconnectedness, I set out on the journey to interact with 100 "best of the best" Cybersecurity / Information Security professionals to learn about their own EXPERIENCES and gain INSIGHTS from their personal perspectives.
I was truly blessed to have had a wide variety of insightful conversations with leaders who are serving their organizations at various levels.
I sincerely wanted to expand the impact of the lessons I learned from these interactions by sharing them with Cybersecurity enthusiasts around the globe - people who are paving their own way towards a successful Cybersecurity career.
I hope readers will gain insights into how they can guide their career path to the success they desire and benefit the global security community through their unique contributions.
Deliver the ‘Right’ Customer Experience without Compromising Data SecuritySPLICE Software
Today’s customers are demanding more real-time interaction. Yet, in this digital world, data vulnerability and cyber-attacks against insurers and financial institutions are becoming an increasingly frequent and sophisticated reality. This webinar shares key insights needed to implement modern solutions that improve your customer’s experience while reducing the risk of cyber threats - protecting your company and your customers from attacks.
2. Cybercrime Prevention Summit 2015
CONNECT & COLLABORATE
2
Schedule At A Glance
Activity
Breakfast
General Sessions
Break
General Sessions
Lunch
General Sessions
Break
General Sessions
Buses Depart for Gala Dinner
Gala Dinner
Activity
Breakfast
General Sessions
Break
General Sessions
Lunch
General Sessions
Conference Closes
Friday, October 9
Thursday, October 8
Activity
Optional Activities
ThreatMetrix Concepts and Portal Training 101
Welcome Reception and Dinner
Time
9:00 am – 3:30 pm
4:00 pm – 5:30 pm
6:00 pm – 10:00 pm
Time
7:30 am – 8:30 am
8:30 am – 10:10 am
10:10 am – 10:30 am
10:30 am – 12:20 pm
12:20 pm – 1:30 pm
1:30 pm – 3:20 pm
3:20 pm – 3:40 pm
3:40 pm – 5:00 pm
5:30 pm
6:00 pm – 10:00 pm
Time
7:30 am – 8:30 am
8:30 am – 10:00 am
10:00 am – 10:15 am
10:15 am – 12:00 pm
12:00 pm – 1:00 pm
1:00 pm – 3:00 pm
3:00 pm
Wednesday, October 7
3. Cybercrime Prevention Summit 2015
CONNECT & COLLABORATE
3
Conference Schedule
Time
9:00 am - 3:30 pm
4:00 pm - 5:30 pm
6:00 pm - 10:00 pm
7:30 am - 8:30 am
8:30 am - 9: 00 am
Activity
Optional Activities: Golf, Tennis,
Wine Tasting and Cycling
ThreatMetrix Concepts and Portal Training 101
This session will introduce new users to general
ThreatMetrix concepts and features. Basic
Cybercrime Control Center navigation and
functionality will also be presented.
Welcome Reception and Dinner
Breakfast
Welcome and Opening Remarks
Reed Taussig, President and CEO, ThreatMetrix, Inc.
Reed Taussig has more than 30 years of experience in the computer
hardware and software fields. Prior to ThreatMetrix, Reed was
president and CEO of Vormetric, Inc., a leader in data privacy and
protection. Under his leadership, Vormetric established itself as a
leading provider of encryption solutions for the Payment Card
Industry Data Security Standards (PCI DSS).
He also served as president and CEO of Callidus Software, Inc.
(NASDAQ: CALD), the leading provider of enterprise incentive
compensation management application systems. As founding CEO
and the fifth employee, Reed led the growth of the company to
more than $70 million in revenues and over 350 employees. Prior to
Callidus he was the president and CEO of inquiry.com, a pioneer in
the B2B Internet space as well as senior vice president of operations
for Gupta Technologies, the leader for PC client server software
development tools and databases. Reed holds a bachelor of arts
degree in economics from the University of Arizona.
Location
Various
Vintner’s Court
The Grove
Fairway Deck
Wednesday, October 7
Thursday, October 8 Thursday General Session will be
held in the Silverado Ballrom
4. Cybercrime Prevention Summit 2015
CONNECT & COLLABORATE
4
Conference Schedule
Thursday, October 8
9:00 am - 9:30 am
9:30 am - 10:10 am
10:10 am - 10:30 am
10:30 am - 11:10 am
Enhancing SecurityThough Innovation
Mark Nelsen, Senior Vice President, Risk Products and Business
Intelligence, Visa, Inc.
Mark Nelsen is senior vice president of risk products and business
intelligence at Visa. In this role, he manages global fraud detection and
decisioning solutions, such as Visa Advanced Authorization and Visa
Risk Manager. He oversees global authentication platforms, such as
EMV chip technology and 3D-Secure authentication for e-commerce.
In addition, Mark’s organization delivers performance benchmarking
and business intelligence solutions to ensure clients are optimizing
authorization decisioning.
Prior to joining Visa, Mark was a senior architect at IBM Global Services,
where he managed large-scale e-business application development
for global companies. Mark holds a bachelor of science degree in
industrial engineering from the University of Wisconsin.
Data Privacy is Dead: Identity Assurance Revisited
Avivah Litan, Vice President and Distinguished Analyst, Gartner
Avivah Litan is a vice president and distinguished analyst at Gartner.
Her area of expertise includes big data analytics for cybersecurity and
fraud, fraud detection and prevention applications, authentication,
identity proofing, identity theft, and insider threats. She also covers
the PCI compliance program, tokenization and the security aspects of
payment systems.
Break Ballroom Foyer
Web Psychology:The Science of Online Persuasion
Nathalie Nahai, The Web Psychologist
Nathalie Nahai is a new kind of futurist – one who delivers
information about why and how we use the web. Calling herself a
Web Psychologist, Nathalie has determined that there is a need to
5. Cybercrime Prevention Summit 2015
CONNECT & COLLABORATE
5
Conference Schedule
Thursday, October 8
11:10 am - 11:40 am
understand and explain to the consuming public why they work the
way they do, and why the Internet impacts so directly on decisions
made at every juncture.
Nathalie is the founder of the Institute of Web Psychology, which
helps businesses apply scientific rigor to their design and
decision-making processes, to achieve better engagement online.
She has a background in psychology, web design and digital strategy,
and wrote the best-selling Webs of Influence: The Psychology of
Online Persuasion. Natalie lectures internationally (audiences include
eBay, Harvard Business Review and Google), and has worked with
Fortune 500 companies, design agencies and SME’s. Nathalie is also
a resident blogger at Psychology Today and contributes to national
publications and radio on the subject of online behavior and
research.
Staying Ahead of Cybercrime
Andreas Baumhof, Chief Technology Officer, ThreatMetrix, Inc.
Andreas Baumhof, chief technology officer at ThreatMetrix, is an
internationally renowned cybersecurity thought leader and expert
with deep experience in the encryption, PKI, malware and phishing
markets. His commentary has appeared in numerous publications
including SecurityWeek, The Paypers, Dark Reading, Computerworld,
CIO, PC Magazine, BankInfoSecurity, SC Magazine, American
Banker, PaymentsMarket, Digital Transactions and others. Prior to
ThreatMetrix, Andreas was an executive director, CEO and co-founder
of Australian-based TrustDefender, a leading provider of security and
fraud detection technologies. He previously served as co-founder
and chief technology officer of Microdasys Inc., a leading provider of
deep content security solutions. While there, he developed the first
SSL proxy and has patents pending in Europe and the U.S. Andreas
holds a degree in mathematics and computer science from the
University of Munich, Germany.
6. Cybercrime Prevention Summit 2015
CONNECT & COLLABORATE
6
Conference Schedule
Thursday, October 8
AllThings Mobile Panel Discussion
Moderator: Brad Greene,Vice President Mobile and Digital
Payments,Visa, Inc.
Brad Greene leads the commercialization of Visa’s mobile payment
solutions for developed markets, including the Visa Token Service. His
responsibilities include applications, products and services that make
Visa payments via smart phone possible.
Before joining Visa, Brad was global head of business development
for the GSMA, the mobile industry association representing over
800 mobile operators worldwide. Prior to that, he was a corporate
development executive for BellSouth, responsible for executing M&A
deals and strategic equity investments involving BellSouth’s mobile
and telecom assets across 16 countries.
Before joining BellSouth, Brad was an investment professional with
Summit Partners, a venture capital firm focusing on growth-stage
investments in technology companies. Brad holds an MBA from Emory
University and a bachelor of science degree from Georgia Tech.
Panelist: Vilash Poovala, Co-founder and CTO, PayClip, Inc.
Vilash is the co-founder and CTO of PayClip, Inc. Over the last 15
years, he has created and developed consumer-facing products in the
e-commerce, checkout and wallet spaces. Prior to founding PayClip,
Vilash was the senior director of products for consumer and merchant
acceptance at V.me by Visa. He launched V.me wallet and checkout
across 33 of the top U.S. etailers. As the head of products at PlaySpan,
Vilash spearheaded payment product acceptance at major gaming
providers.
Vilash also worked at PayPal where he focused on improving payment
acceptance in new markets and rolling out PayPal-issued products
to improve checkout conversion on and off eBay. He later was part of
the Paypal mobile team focused entirely on creating consumer and
merchant acceptance in Latin America.
11:40 am - 12:20 pm
7. Cybercrime Prevention Summit 2015
CONNECT & COLLABORATE
7
Conference Schedule
His fascination and passion for payments was first sparked while building
cutting edge wallet products to ease online checkout at his first payments
startup, Globeset, that was acquired by Visa in 2000. Vilash has served as an
adviser for several payments/commerce startups.
Panelist: Menekse Gencer, Managing Director, mPay Connect
Menekse Gencer is a payments executive with over 22 years of experience
in emerging technology and 10 years in mobile and digital payments
innovation.
For the past 7 years, she has run mPay Connect, a consulting service to
assist banks, central banks, mobile network operators, third party platforms,
development agencies, and merchants seeking to launch mobile financial
services. She was a key driver of go-to-market strategy and business
development that helped PayPal Mobile and bKash (Bangladesh) launch
their services. Her market expertise extends from developed, banked
markets such as the U.S. and Kuwait to emerging, unbanked markets in
South Asia, Africa, and the Caribbean.
Menekse has an MBA from Wharton and a bachelor of arts in economics
from Harvard University. She is a Bill and Melinda Gates Foundation
Technology Partner and speaks at conferences worldwide on the subjects of
FinTech and digital payments innovation.
Panelist: Garrett Goff, Head of Fraud, Netflix, Inc.
Garrett Goff is head of fraud at Netflix. He uses payment data from tens
of millions of subscribers to monitor, anticipate, and defend against fraud
attempts.
Prior to Netflix, he was a senior consultant for Deloitte, working with
companies including Facebook, LinkedIn, Uber,Yelp, Zynga and Charles
Schwab. Before entering the financial world, he spent two years as a math
teacher for Teach for America, working with teens at the highest risk of not
graduating high school. He is also a board member of The Volunteer Center
of San Francisco, which connects individuals, nonprofits and businesses with
the resources to support local communities.
Garrett holds a bachelor of arts in business administration with a focus in
Finance from Emory University.
8. Cybercrime Prevention Summit 2015
CONNECT & COLLABORATE
8
12:20 pm - 1:30 pm
1:30 pm - 2:00 pm
2:00 pm - 2:40 pm
Conference Schedule
Thursday, October 8
Lunch Mansion Front Lawn
ThreatMetrixVision and Product Roadmap
Alisdair Faulkner, Chief Products Officer, ThreatMetrix, Inc.
Alisdair Faulkner is a technology entrepreneur who has nearly two
decades of experience building products and delivering mission critical
technologies that are run by the world’s most trusted brands. Alisdair
is a noted industry expert in issues relating to online fraud, cybercrime,
identity theft, information security and networking technology. As chief
products officer and co-founder at ThreatMetrix, he is responsible for
product management and strategy.
Prior to ThreatMetrix, Alisdair was a founder and head of products and
business development for NetPriva, a leading network performance
software provider, acquired by Expand Networks, now Riverbed. Prior to
NetPriva, he was a senior consultant at Accenture in their e-commerce
practice. Alisdair holds a master of engineering degree in information
technology and telecommunications from Adelaide University, a
graduate diploma in applied finance from the Securities Institute
Australia, and has authored several patents in the fields of security, fraud
and networking.
Multi Channel Evolution
Presented by Andy Renshaw and Ian Spanswick
Andy Renshaw, Senior Manager – Digital Banking, Fraud and Security,
Lloyds Banking Group
Andy Renshaw has over 10 years of experience working in financial
services for some of the largest U.S. and UK-based banks including
Capital One, Citibank and LLoyds Banking Group.
At Capital One, he served as director of fraud analysis for Capital One UK.
At Citibank, he was responsible for the integration of numerous fraud
platforms. Now in his sixth year at LLoyds Banking Group, he currently
9. Cybercrime Prevention Summit 2015
CONNECT & COLLABORATE
9
Conference Schedule
2:00 pm - 2:40 pm
2:40 pm - 3:20 pm
heads up their fraud and customer experience areas within the Group Digital
area. He is responsible for the strategic direction of the authentication and
fraud layers within Group Digital including device ID, biometrics, malware
prevention, and risk engine monitoring in order to protect over 12 million
online customers.
Ian Spanswick, Senior Manager – Digital Application Fraud, Lloyds
Banking Group
Ian Spanswick is a senior manager at Lloyds Banking Group. Ian is responsible
for digital application fraud controls and strategy, specializing in identification
and third party fraud prevention. Ian led the project to introduce device
identification capture at point of application for all retail banking products.
Prior to joining Lloyds Banking Group, Ian worked with a variety of financial
software vendors delivering solutions for revolving credit, real-time
authorization and e-commerce.
Big Data and Privacy
Kathryn Petralia, Chief Operating Officer and Co-Founder, Kabbage, Inc.
Kathryn Petralia has spent the past 20 years working with startups and
established companies focused on credit, payments, technology and
e-commerce.
Kathryn and her co-founders started Kabbage in 2009, and they have
provided more than $700 million to SMBs. Prior to Kabbage, Kathryn
was with Revolution Money, an Internet-based credit card startup based
in St. Petersburg, Florida, where she was vice president of strategy.
Before Revolution, Kathryn was a corporate development executive with
CompuCredit Corporation. She spent the early dotcom years with several
Internet startups, including US Web and WorthKnowing.com. Kathryn holds a
bachelor of arts in English literature from Furman University.
Thursday, October 8
10. Cybercrime Prevention Summit 2015
CONNECT & COLLABORATE
10
Conference Schedule
3:40 pm - 4:20 pm
4:20 pm - 5:00 pm
5:30 pm
6:00 pm - 10:00 pm
Break Ballroom Foyer
World’s Digital Commerce Platform
John McDonnell, CEO, BitNet
John McDonnell is a seasoned FinTech executive with 20+ years of
experience managing cutting-edge payment technology companies.
Prior to founding Bitnet, John served as senior vice president for
Visa and head of business development for CyberSource, a global
provider of electronic payment processing and security solutions for
e-commerce and POS merchants that was acquired by Visa in 2010.
Earlier in his career, John practiced securities law and has also been an
active private investor with extensive board experience. John earned
his bachelor of arts degree with honors from Stanford University and
his J.D. from UCLA law school.
The Scorpion and the Frog: Envisioning the Future ofValue
Exchange and Cybersecurity
Dr. Chris Brauer, Director of Innovation in the Institute of Management
Studies (IMS) at Goldsmiths, University of London
Dr. Chris Brauer is a world-renowned researcher on the intersection
of emerging technologies and socio-economic life. His research
projects have been featured in over 400 media outlets worldwide in
2015 including the BBC, Financial Times, Wall Street Journal, MSNBC,
and NPR. His current projects include investigations of wearables,
driverless cars, crypto-currencies, smart home technologies, the
Internet of Things, and cashless transaction and payment systems.
Buses Depart for Gala Dinner Mansion Entrance
Gala Dinner
11. Cybercrime Prevention Summit 2015
CONNECT & COLLABORATE
11
Conference Schedule
Friday, October 9
7:30 am - 8:30 am
8:30 am - 10:00 am
8:30 am - 10:00 am
8:30 am - 10:00 am
10:00 am - 10:15 am
10:15 am - 11:15 am
10:15 am - 11:15 am
Breakfast
E-commerce Roundtable
An open and informal session, focused on
networking, building relationships and sharing of
best practices and trends as they pertain to the
e-commerce industry.
Financial Services Roundtable
An open and informal session, focused on
networking, building relationships and sharing of
best practices and trends as they pertain to the
Financial Services industry.
Online Lender Roundtable
An open and informal session, focused on
networking, building relationships and sharing of
best practices and trends as they pertain to the
Online Lender industry.
Break
ThreatMetrix Labs
A session focusing on the latest research carried out
by ThreatMetrix Labs, focusing on topics such as
malware and coordinated attacks.
UsingThreatMetrix Policies to BuildTrust
This session will discuss the approaches that can be
taken to identify events that should be trusted, for
example through the use of Persona ID and Trust Tag
functionality and leveraging global intelligence.
Fairway Deck
Silverado East
Sterling
Joseph Phelps
Ballroom Foyer
Silverado East
Silverado West
12. Cybercrime Prevention Summit 2015
CONNECT & COLLABORATE
12
Conference Schedule
Friday, October 9
11:15 am - 12:00 pm
11:15 am - 12:00 pm
12:00 pm - 1:00 pm
1:00 pm - 2:00 pm
2:00 pm - 3:00 pm
3:00 pm
ThreatMetrix MobileWorkshop
The latest ThreatMetrix Mobile features will be
presented, together with an in-depth discussion
on how to expand ThreatMetrix usage to cover the
mobile channel.
Forensics andVisualization –The New
ThreatMetrix Portal
This session will introduce the new ThreatMetrix
Portal, with a tour of the new visualization and
workspace functionality.
Lunch
ThreatMetrix 2015 Fall Release
This presentation will focus on live product
demonstrations featuring new capabilities that are
being made available for ThreatMetrix customers
this Fall.
Advanced Users – Customer Case Studies
Learn from your peers who are leveraging the full
functionality of the ThreatMetrix platform to meet
their business objectives.
Conference Closes
Silverado East
Silverado West
Fairway Deck
Silverado East
Silverado East
16. ThreatMetrix Headquarters 160 W Santa Clara St Suite 1400 San Jose, CA, 95113
Telephone: +1.408.200.5755 | Fax: +1.408.200.5799 | Email: sales@threatmetrix.com
WWW.THREATMETRIX.COM
#TMSUMMIT2015
Join the Discussion
The Digital Identity Company™