Hi [[ session.user.profile.firstName ]]

Attacker Economics: Hacker Cost vs Value

Major attacks, breaches, exploits, and malware are nearly a daily occurrence. The problem is two-fold, attacks are getting cheaper to perform and the value of stolen credentials is increasing daily. In this session, Jarrod Overson, Director at Shape Security, will reveal how cheap modern attacks have become and how cybercriminals bypass defenses like CAPTCHAs and browser fingerprints.

You will learn:

- Why attackers are hyper-incentivized due to the dirt-cheap cost of attacks
- How attacks have evolved over time and insights into where attacks are going
- What cybersecurity and development teams must change to reflect the realities of attackers that won’t quit
Recorded Feb 12 2020 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jarrod Overson, Director of Engineering, Shape Security
Presentation preview: Attacker Economics: Hacker Cost vs Value

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Beyond Automated Attacks: Manual Fraud, Genesis & Magecart Apr 16 2020 5:00 pm UTC 16 mins
    Dan Woods | VP Shape Intelligence Center and Former FBI Agent, Shape Security
    Cyber attackers continue to retool, learn and develop more and more sophisticated techniques. Seeing the complete picture and having an understanding of how attackers evolve from rudimentary automated attacks to manual fraud fuelled by malware will help you ensure your organization is well prepared.

    In this session, you will get a complete overview of attacker modes of operation.
  • Digital Skimming, Fraud & PII Theft: Magecart & Other Application Code Attacks Apr 2 2020 5:00 pm UTC 27 mins
    Wesley Hales | Director, Partner Solutions, Shape Security
    Magecart and other malicious JavaScript attacks have defeated CDN, WAFs, and many other security measures because of how and when they execute their code. These breaches have occurred anywhere from small eCommerce sites to some of the largest brands in the world.

    In this webinar, you will learn the top 5 ways Magecart attacks are executed, how to assess your current threat surface level, and how to lock them down.
  • F5 and Shape Join Forces to Crush Fraud and Abuse Recorded: Mar 12 2020 54 mins
    Shuman Ghosemajumder Global Head of AI, F5 Networks | Joel Moses Office of the CTO, F5 Networks
    In a digital transformation world, your applications ARE your business. That’s where you interact with your customers, where you deliver value, and where your experiences differentiate your business. The problem is, the bad guys know that too. That’s why we are seeing an escalating war on web and mobile apps across every vertical in every market.

    F5 and Shape have joined forces to defend EVERY app from attack, with a comprehensive application security portfolio, powered by a proven AI/ML engine, to slash fraud and abuse, prevents reputational damage, and eliminate business disruptions.

    Watch this informative webinar on the future of application security to learn about:

    - Where are cybercriminals headed next in their attacks on applications

    - How to slash fraud losses, chargebacks, stolen loyalty points, and unauthorized fund transfers

    - How to prevent reputational damage and disruptions to critical online services

    - How your team can reduce appsec complexity and improve application performance

    - How to support real-world multi-cloud environments
  • Critical Infrastructure Attacks: Between Apocalypse and Reality Recorded: Feb 12 2020 30 mins
    Tara Seals, Senior Editor, Threatpost
    Learn about the vulnerabilities and malware in circulation affecting power plants and other utilities, oil and gas installations and more.

    In this session, you will learn about the real-world attacks to date and what could be brewing, along with the nation-state and other actors that are focused on wreaking havoc in this segment.
  • Compromised Credentials, Customer Satisfaction, and Your Bottom Line Recorded: Feb 12 2020 33 mins
    Smriti Jaggi, Threat Intelligence Analyst, Shape Security
    Researchers estimate that as many as 80% of people reuse passwords across multiple accounts. With more than 13 billion compromised credentials for sale on the dark web, many organizations are highly exposed and do not even know it.

    In this session, you will learn how to protect your organization from compromised credentials even before they hit the Dark Web while providing a simplified password experience for your users.
  • Attacker Economics: Hacker Cost vs Value Recorded: Feb 12 2020 31 mins
    Jarrod Overson, Director of Engineering, Shape Security
    Major attacks, breaches, exploits, and malware are nearly a daily occurrence. The problem is two-fold, attacks are getting cheaper to perform and the value of stolen credentials is increasing daily. In this session, Jarrod Overson, Director at Shape Security, will reveal how cheap modern attacks have become and how cybercriminals bypass defenses like CAPTCHAs and browser fingerprints.

    You will learn:

    - Why attackers are hyper-incentivized due to the dirt-cheap cost of attacks
    - How attacks have evolved over time and insights into where attacks are going
    - What cybersecurity and development teams must change to reflect the realities of attackers that won’t quit
  • Credential Stuffing 2020: Latest Attack Trends and Tools Recorded: Feb 12 2020 29 mins
    Jarrod Overson, Director of Engineering, Shape Security
    Every day there is a cat and mouse game security professional play with attackers trying to make an illicit profit at your company’s or your customers’ expense. Understanding where we have come from can give you clues and ideas about what attackers will do next and how to be one step ahead of the pack.

    In this session, you will learn about the evolution and economics of credential stuffing and how to make yourself a hard target that is just worth the effort.
  • Shape Security Predictions 2020 Report: Emerging Threats to Application Security Recorded: Feb 12 2020 29 mins
    Mike Plante, CMO, Shape Security
    Understand and prepare for the new threats and trends before you see them in the news.

    In this session, you will learn key emerging trends and gain insights into how you can stay ahead of hackers and use security to help reduce customer friction and grow your business.
  • Managing Financial Aggregators: Security & Business Outcomes Recorded: Jan 30 2020 19 mins
    Sumit Agarwal, Co-Founder and COO at Shape Security
    Financial aggregators deliver single-pane visibility to over 100 million consumer accounts. Plaid, Mint, and Yodlee, and to name some well-known examples, are considered top-tier aggregators.

    While Financial aggregators are innovative, they can also create unintended challenges and risks.

    Join us for this webinar as Sumit Agarwal, Co-Founder and COO at Shape Security, reveals the techniques and strategies that Fortune 500 Banks use to partner with aggregators and better serve clients.
  • The 3 Most Expensive Types of eCommerce Fraud Recorded: Jan 8 2020 58 mins
    Mengmeng Chen, Threat Intelligence Lead, Shape Security
    Join threat intelligence lead Mengmeng Chen as she reveals ‍the 3 most expensive types of eCommerce fraud schemes that businesses battle every day.

    You'll learn:

    - Analysis of attack data during sales promotions
    - Best practices from Top 10 Retailers
    - Top 3 retail attack techniques
  • Why CAPTCHA Doesn't Work Recorded: Dec 19 2019 6 mins
    Dan Woods, VP Shape Intelligence Center
    Captcha's are good for two things: Increased user friction and decreased conversion rates.

    Learn from Dan Woods how cybercriminals and malicious actors can quickly bypass Captcha's on your website.
  • Credential Stuffing using Python & Selenium Recorded: Dec 18 2019 24 mins
    Dan Woods, VP Shape Intelligence Center and Former FBI Agent
    One of the most common ways cybercriminals perform account takeovers is via credential stuffing.

    To learn more about this threat, Dan Woods, former FBI Special Agent, and VP Shape Intelligence will demonstrate how the Selenium Webdriver tool is used to perform credential stuffing attacks.
  • Why CAPTCHA Doesn't Work Recorded: Dec 5 2019 6 mins
    Dan Woods, VP Shape Intelligence Center
    Captcha's are good for two things: Increased user friction and decreased conversion rates.

    Learn from Dan Woods how cybercriminals and malicious actors can quickly bypass Captcha's on your website.
  • Holiday Cyber Threat Guide Recorded: Nov 27 2019 28 mins
    Jarrod Overson, Director of Engineering at Shape Security
    While the holidays bring us an excess of joy and hot chocolate, security teams are faced with a substantial increase in cyber attacks. Hot products in demand bring scammers, scalpers, and bad bots.

    Join us for this live webinar as Jarrod Overson, Director of Engineering at Shape Security, breaks down three of the most popular and costly cyber attacks and what you can do to keep these attacks from ruining the holidays.

    In this webinar, we will discuss in detail:

    - Credential Stuffing & Password Spraying
    - E-Skimming or Magecart Style Attacks
    - Scalping
  • Holiday Cyber Threat Guide Recorded: Nov 21 2019 29 mins
    Jarrod Overson, Director of Engineering at Shape Security
    While the holidays bring us an excess of joy and hot chocolate, security teams are faced with a substantial increase in cyber attacks. Hot products in demand bring scammers, scalpers, and bad bots.

    Join us for this live webinar as Jarrod Overson, Director of Engineering at Shape Security, breaks down three of the most popular and costly cyber attacks and what you can do to keep these attacks from ruining the holidays.

    In this webinar, we will discuss in detail:

    - Credential Stuffing & Password Spraying
    - E-Skimming or Magecart Style Attacks
    - Scalping
  • Genesis: A Walk-through of the New Digital Fingerprint Cybercriminal Marketplace Recorded: Nov 13 2019 7 mins
    Dan Woods, VP Shape Intelligence Center and Former FBI Agent
    How do cybercriminals defeat the “we don’t recognize your device” response from a website? Genesis: The digital fingerprint marketplace. While getting access to Genesis is invite-only, the Shape Intelligence team found a way in and we’d love to show you what’s behind the curtain!

    Join us for this brief webinar as Dan Woods, VP of Shape Intelligence Center and former FBI agent, gives you a step-by-step walk-through of the Genesis marketplace in under 10 minutes.
  • Latest Fraud Schemes in Retail, Hospitality, and Gaming Recorded: Oct 16 2019 34 mins
    Smriti Kawal Jaggi, Threat Intel Analyst at Shape Security
    Up to 99 percent of the traffic on retail and eCommerce login forms is due to account takeover (ATO) attempts. In this webinar, Shape Security’s Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs with actual use cases from retail, hospitality, telco, and gaming industries. Learn about what attackers really do with compromised accounts from Shape Security’s Intelligence Center.

    Key Takeaways:

    - Hear about the size of the automation threat facing the retail industry and the associated losses
    - Learn how social engineering is used more than ever as a fraud tool to leverage PII against individuals and the business they patron
    - Discover how credential stuffing attacks are used to steal gift cards, commit return fraud, and test stolen credit cards
  • Protect Against Bad Bots That Commit Fraud And Kill Customer Experience Recorded: Oct 2 2019 35 mins
    Amy DeMartine, Vice President, Research Director at Forrester
    Most website visitors aren’t humans, but instead bots–or, programs built to do automated tasks. While there are good bots like chatbots and search engines, there are a lot more bad bots, that malicious attackers use to commit fraud while simultaneously killing customer experience.

    In this webinar, Amy DerMartine, Vice President, Research Director at Forrester, will discuss the effects of bad bots and how to combat these bad actors.

    You will learn:

    - How bots are quickly evolving to mimic human behavior or are being used alongside real humans
    - The targets and various types of attacks from bad bots
    - What organizational issues you should consider and tools to use to manage bot traffic
  • Attacker Economics: Hacker Cost vs Value Recorded: Aug 28 2019 38 mins
    Jarrod Overson, Director at Shape Security
    Major attacks, breaches, exploits, and malware are nearly a daily occurrence. The problem is two-fold, attacks are getting cheaper to perform and the value of stolen credentials is increasing daily. In this session, Jarrod Overson, Director at Shape Security, will reveal how cheap modern attacks have become and how cybercriminals bypass defenses like CAPTCHAs and browser fingerprints.

    You will learn:

    Why attackers are hyper-incentivized due to the dirt-cheap cost of attacks
    How attacks have evolved over time and insights into where attacks are going
    What cybersecurity and development teams must change to reflect the realities of attackers that won’t quit
  • Fraud vs Friction How Barneys Prevents Fraud While Improving User Experience Recorded: May 1 2019 28 mins
    Niki Aggarwal, Product Marketing @ Shape Security & Arthur Fontanilla, Manager, Information Security & Compliance @ Barney's
    How Barney's New York addressed fraud, shoe bots, and improved customer experience, retention, and loyalty.
Advanced Website Defense
Shape Security protects Fortune 500 websites from malware, botnets and scripts. Shape protects websites using real-time polymorphism to make websites a moving target. Shape stops the cause of the most serious breaches – web automation.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Attacker Economics: Hacker Cost vs Value
  • Live at: Feb 12 2020 7:00 pm
  • Presented by: Jarrod Overson, Director of Engineering, Shape Security
  • From:
Your email has been sent.
or close