Security: Maximize Business Benefits

Tibco's Jean-Francois Roy on Security's Chance to EvolveWhen it comes to the evolution of machine data, security organizations now can improve protection and the top line. How can they maximize the business... Read more »

Fraud Investigations: How to Work Effectively with Law Enforcement and Government

The Private Sector Liaison Committee is tasked with enhancing partnerships and capabilities between law enforcement and private industry; support the modernization of the Canadian Anit-Fraud Centre (CAFC); and reduce the impact of... Read more »

Fraud Management – Real Time Fraud Analytics to reduce friction and improve the Customer Experience

Statistics show that poor handling of a fraud incident is a key reason organizations will lose the trust of a customer and why that customer is likely to close an account.

Fraud management... Read more »

Real World Applications of Big Data Analytics – Social Network Analysis and Post Breach Fraud Detection

All 2014 Fraud Summit Toronto recordings:

Insider Fraud Detection – The Appliance of Science

Even after the high-profile Edward Snowden leaks of information from the National Security Agency, most organizations still aren't taking insider threats as seriously as they should be. Too many organizations have not... Read more »

Shellshock Bug: How to Respond

To mitigate the newly discovered Bash bug - AKA Shellshock - which may make millions of systems vulnerable to remote takeover, organizations must take several key steps, says security expert Alan Woodward. Read more »

Financial Inclusion: Security Challenge

The Modi government's "Jan Dhan Yojana" is ambitious, and security concerns are vast. Awareness, complexity and scope must be addressed, says Pervez Goiporia, vice president, IDM development, at Oracle India. Read more »

Responding to the ‘Year of the Breach’

McAfee's Michael Sentonas and Sean Duca discuss emerging threat vectors, sharing how cybercrime impacts the landscape and how lessons from recent global breaches can be applied to the Indian context. Read more »

Fraud Summit: How ATM Attacks Evolve

ATM-related fraud is quickly evolving, says Graham Mott, head of the U.K.'s LINK Scheme and a presenter at the Sept. 23 London Fraud Summit. New malware attacks waged against ATMs prove why... Read more »

What Cyberthreat Does ISIS Pose?

Terrorists Threats More Likely to Be Physical, Not VirtualThe social media savvy Islamic State frightens most of the world with its gruesome Internet postings of executions and online recruitment of new Jihadists.... Read more »