Smriti Kawal Jaggi, Threat Intel Analyst at Shape Security
Up to 99 percent of the traffic on retail and eCommerce login forms is due to account takeover (ATO) attempts. In this webinar, Shape Security’s Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs with actual use cases from retail, hospitality, telco, and gaming industries. Learn about what attackers really do with compromised accounts from Shape Security’s Intelligence Center.
- Hear about the size of the automation threat facing the retail industry and the associated losses
- Learn how social engineering is used more than ever as a fraud tool to leverage PII against individuals and the business they patron
- Discover how credential stuffing attacks are used to steal gift cards, commit return fraud, and test stolen credit cards
Amy DeMartine, Vice President, Research Director at Forrester
Most website visitors aren’t humans, but instead bots–or, programs built to do automated tasks. While there are good bots like chatbots and search engines, there are a lot more bad bots, that malicious attackers use to commit fraud while simultaneously killing customer experience.
In this webinar, Amy DerMartine, Vice President, Research Director at Forrester, will discuss the effects of bad bots and how to combat these bad actors.
You will learn:
- How bots are quickly evolving to mimic human behavior or are being used alongside real humans
- The targets and various types of attacks from bad bots
- What organizational issues you should consider and tools to use to manage bot traffic
Major attacks, breaches, exploits, and malware are nearly a daily occurrence. The problem is two-fold, attacks are getting cheaper to perform and the value of stolen credentials is increasing daily. In this session, Jarrod Overson, Director at Shape Security, will reveal how cheap modern attacks have become and how cybercriminals bypass defenses like CAPTCHAs and browser fingerprints.
You will learn:
Why attackers are hyper-incentivized due to the dirt-cheap cost of attacks
How attacks have evolved over time and insights into where attacks are going
What cybersecurity and development teams must change to reflect the realities of attackers that won’t quit
According to the FBI report in 2014, botnets have caused over $9 billion in losses to U.S. victims and over $110 billion in losses globally. Bots are rapidly proliferating globally at a rate of 18 machines per second. These bots are being used by organized crime to carry out website attacks such as credential stuffing attacks leading to large-scale account hijacking and widespread online fraud. Attend this webinar to learn about bots, botnets, and automated attack ecosystem from Shape’s Shuman Ghosemajumder, who is also the former head of product management for click fraud protection at Google.
Why you should attend:
- Learn about the evolving bot and botnet landscape
- Understand how bots are used to carry out website attacks and fraud
- Evaluate strategies to protect your website from bots
Sumit Agarwal, Co-Founder & Vice President of Products and Nwokedi Idika, Ph.D., Senior Research Scientist
"Use of Stolen Credentials" is this year's #1 most common threat, according to Verizon's latest Data Breach Report. In this webinar with Shape Security's threat research team, you will learn how stolen credentials sold on the darknet are fueling these attacks—particularly in the retail, travel, hospitality and financial services industries. These attacks lead to breaches, each of which can cost an enterprise millions of dollars.
Why you should attend:
-Understand credential stuffing attacks and how they lead to account takeover
-Evaluate business risks for your organization
-Learn about the workflow and common tools used to execute credential stuffing attacks
Shape Security protects Fortune 500 websites from malware, botnets and scripts. Shape protects websites using real-time polymorphism to make websites a moving target. Shape stops the cause of the most serious breaches – web automation.
Fraud vs Friction How Barneys Prevents Fraud While Improving User ExperienceNiki Aggarwal, Product Marketing @ Shape Security & Arthur Fontanilla, Manager, Information Security & Compliance @ Barney's[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]28 mins