Hi [[ session.user.profile.firstName ]]

An Intro to Shape Security: Defeating Application Fraud

Now part of F5, Shape Security offers the leading solution for the world’s largest companies to prevent fraud and financial abuse. With an advanced platform that utilizes artificial intelligence and machine learning—supported by powerful cloud-based analytics—Shape protects against attacks that bypass other security and fraud controls. In this session, see how the combined capabilities of Shape Security and F5 can help defend every app from attacks, fraud, and abuse in a multi-cloud world.
Recorded Jun 5 2020 22 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Plante, VP Product Marketing, Shape Product Group at F5
Presentation preview: An Intro to Shape Security: Defeating Application Fraud

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Application Security Priorities Heading into 2H 2020 Jul 21 2020 5:00 pm UTC 60 mins
    Mike Plante, VP of Product Marketing, Shape, Part of F5
    The first half of 2020 ushered in some dramatic changes in web and mobile application usage and application security. The global pandemic radically altered consumer behaviors as industries around the world shifted their mix of offline and online business overnight. Not surprisingly, attackers are taking advantage of these shifts and innovating to deploy new attacks and schemes to defraud

    While the economic outlook for the rest of 2020 is cloudy (at best) for much of the world, there are some key lessons learned and trends that we can use as a community to set priorities for application security in 2H 2020.

    Whether you believe we’ll be still in the throes of COVID-19 or entering a post-COVID world, in this webinar, you’ll learn about:

    - Major shifts in application usage and attacker behavior in 1H 2020
    - How those 1H trends will project into 2H 2020
    - Recommendations for security leaders as you build out your 2H app sec plans and priorities
  • How Online Businesses Can Defeat Application Fraud in a Multi-Cloud World Recorded: Jul 2 2020 17 mins
    Shuman Ghosemajumder, Global Head of AI, F5 Networks
    Businesses need to hold their partners and technology accountable for security outcomes rather than existing functionality that today’s bad actors continually engineer around. Billions of dollars in fraud loss, reputational damage, and disruptions to critical online services are at stake.

    In this webinar, we will explore:
    • What businesses are facing next in the world of fraud and cybercrime
    • How to commit to the continual progression and sophistication of our defense landscape in order to stay one step ahead of bad actors
    • The role AI can play to deliver security outcomes
  • Defeating Application Fraud with AI & Machine Learning Recorded: Jun 11 2020 21 mins
    Mike Plante, VP Product Marketing, Shape Product Group at F5
    Now part of F5, Shape Security offers the leading solution for the world’s largest companies to prevent fraud and financial abuse. With an advanced platform that utilizes artificial intelligence and machine learning—supported by powerful cloud-based analytics—Shape protects against attacks that bypass other security and fraud controls. In this session, see how the combined capabilities of Shape Security and F5 can help defend every app from attacks, fraud, and abuse in a multi-cloud world.
  • An Intro to Shape Security: Defeating Application Fraud Recorded: Jun 5 2020 22 mins
    Mike Plante, VP Product Marketing, Shape Product Group at F5
    Now part of F5, Shape Security offers the leading solution for the world’s largest companies to prevent fraud and financial abuse. With an advanced platform that utilizes artificial intelligence and machine learning—supported by powerful cloud-based analytics—Shape protects against attacks that bypass other security and fraud controls. In this session, see how the combined capabilities of Shape Security and F5 can help defend every app from attacks, fraud, and abuse in a multi-cloud world.
  • Stop Fraud and Abuse with Advanced Artificial Intelligence and Machine Learning Recorded: Jun 2 2020 6 mins
    Brian Uffelman, Sr. Product Marketing, Shape, Part of F5
    Shape Security offers the leading solution for the world’s largest companies to prevent fraud and financial abuse. See how the combined capabilities of Shape Security and F5 can help defend every app from attacks, fraud, and abuse in a multi-cloud world.
  • Compromised Credentials, Customer Satisfaction, and Your Bottom Line Recorded: May 21 2020 32 mins
    Smriti Jaggi, Threat Intelligence Analyst, Shape Security
    Researchers estimate that as many as 80% of people reuse passwords across multiple accounts. With more than 13 billion compromised credentials for sale on the dark web, many organizations are highly exposed and do not even know it.

    In this webinar, you will learn how to protect your organization from compromised credentials even before they hit the Dark Web while providing a simplified password experience for your users.
  • Credential Stuffing 2020: Latest Attack Trends and Tools Recorded: May 7 2020 26 mins
    Jarrod Overson, Director of Engineering, Shape Security
    Every day there is a cat and mouse game security professionals play with attackers trying to make an illicit profit at your company’s or your customers’ expense. Understanding where we have come from can give you clues and ideas about what attackers will do next and how to be one step ahead of the pack.

    In this session, you will learn about the evolution and economics of credential stuffing and how to make yourself a hard target that is just not worth the effort.
  • Attacks and Fraud in Uncertain Times Recorded: Apr 30 2020 37 mins
    Dan Woods, VP Shape Intelligence Center and Former FBI Agent
    Throughout much of the world, COVID-19 has impacted how, where, and even whether we conduct many routine activities, accelerating digital transformation across almost every industry. With this increase in online activity, many different stories are being told surrounding COVID-19’s effect on cyberattacks against web and mobile applications.

    Shape protects more accounts from fraud than everyone else in the world combined, giving us a unique perspective on what's really happening during the current pandemic (or not happening). We reviewed our data and compiled a summary of our findings of COVID-19’s impact on online traffic from customers, fraudsters, and bots.

    Join us for this webinar and learn:

    - The true impact of COVID-19 on ATOs, credential stuffing, and scraping attacks
    - How traffic and attack volumes vary across different industries
    - What companies can do to protect their web and mobile apps during uncertain times
  • Beyond Automated Attacks: Manual Fraud, Genesis & Magecart Recorded: Apr 16 2020 16 mins
    Dan Woods | VP Shape Intelligence Center and Former FBI Agent, Shape Security
    Cyber attackers continue to retool, learn and develop more and more sophisticated techniques. Seeing the complete picture and having an understanding of how attackers evolve from rudimentary automated attacks to manual fraud fuelled by malware will help you ensure your organization is well prepared.

    In this session, you will get a complete overview of attacker modes of operation.
  • Digital Skimming, Fraud & PII Theft: Magecart & Other Application Code Attacks Recorded: Apr 2 2020 27 mins
    Wesley Hales | Director, Partner Solutions, Shape Security
    Magecart and other malicious JavaScript attacks have defeated CDN, WAFs, and many other security measures because of how and when they execute their code. These breaches have occurred anywhere from small eCommerce sites to some of the largest brands in the world.

    In this webinar, you will learn the top 5 ways Magecart attacks are executed, how to assess your current threat surface level, and how to lock them down.
  • F5 and Shape Join Forces to Crush Fraud and Abuse Recorded: Mar 12 2020 54 mins
    Shuman Ghosemajumder Global Head of AI, F5 Networks | Joel Moses Office of the CTO, F5 Networks
    In a digital transformation world, your applications ARE your business. That’s where you interact with your customers, where you deliver value, and where your experiences differentiate your business. The problem is, the bad guys know that too. That’s why we are seeing an escalating war on web and mobile apps across every vertical in every market.

    F5 and Shape have joined forces to defend EVERY app from attack, with a comprehensive application security portfolio, powered by a proven AI/ML engine, to slash fraud and abuse, prevents reputational damage, and eliminate business disruptions.

    Watch this informative webinar on the future of application security to learn about:

    - Where are cybercriminals headed next in their attacks on applications

    - How to slash fraud losses, chargebacks, stolen loyalty points, and unauthorized fund transfers

    - How to prevent reputational damage and disruptions to critical online services

    - How your team can reduce appsec complexity and improve application performance

    - How to support real-world multi-cloud environments
  • Critical Infrastructure Attacks: Between Apocalypse and Reality Recorded: Feb 12 2020 30 mins
    Tara Seals, Senior Editor, Threatpost
    Learn about the vulnerabilities and malware in circulation affecting power plants and other utilities, oil and gas installations and more.

    In this session, you will learn about the real-world attacks to date and what could be brewing, along with the nation-state and other actors that are focused on wreaking havoc in this segment.
  • Attacker Economics: Hacker Cost vs Value Recorded: Feb 12 2020 31 mins
    Jarrod Overson, Director of Engineering, Shape Security
    Major attacks, breaches, exploits, and malware are nearly a daily occurrence. The problem is two-fold, attacks are getting cheaper to perform and the value of stolen credentials is increasing daily. In this session, Jarrod Overson, Director at Shape Security, will reveal how cheap modern attacks have become and how cybercriminals bypass defenses like CAPTCHAs and browser fingerprints.

    You will learn:

    - Why attackers are hyper-incentivized due to the dirt-cheap cost of attacks
    - How attacks have evolved over time and insights into where attacks are going
    - What cybersecurity and development teams must change to reflect the realities of attackers that won’t quit
  • Shape Security Predictions 2020 Report: Emerging Threats to Application Security Recorded: Feb 12 2020 29 mins
    Mike Plante, CMO, Shape Security
    Understand and prepare for the new threats and trends before you see them in the news.

    In this session, you will learn key emerging trends and gain insights into how you can stay ahead of hackers and use security to help reduce customer friction and grow your business.
  • Managing Financial Aggregators: Security & Business Outcomes Recorded: Jan 30 2020 19 mins
    Sumit Agarwal, Co-Founder and COO at Shape Security
    Financial aggregators deliver single-pane visibility to over 100 million consumer accounts. Plaid, Mint, and Yodlee, and to name some well-known examples, are considered top-tier aggregators.

    While Financial aggregators are innovative, they can also create unintended challenges and risks.

    Join us for this webinar as Sumit Agarwal, Co-Founder and COO at Shape Security, reveals the techniques and strategies that Fortune 500 Banks use to partner with aggregators and better serve clients.
  • The 3 Most Expensive Types of eCommerce Fraud Recorded: Jan 8 2020 58 mins
    Mengmeng Chen, Threat Intelligence Lead, Shape Security
    Join threat intelligence lead Mengmeng Chen as she reveals ‍the 3 most expensive types of eCommerce fraud schemes that businesses battle every day.

    You'll learn:

    - Analysis of attack data during sales promotions
    - Best practices from Top 10 Retailers
    - Top 3 retail attack techniques
  • Why CAPTCHA Doesn't Work Recorded: Dec 19 2019 6 mins
    Dan Woods, VP Shape Intelligence Center
    Captcha's are good for two things: Increased user friction and decreased conversion rates.

    Learn from Dan Woods how cybercriminals and malicious actors can quickly bypass Captcha's on your website.
  • Credential Stuffing using Python & Selenium Recorded: Dec 18 2019 24 mins
    Dan Woods, VP Shape Intelligence Center and Former FBI Agent
    One of the most common ways cybercriminals perform account takeovers is via credential stuffing.

    To learn more about this threat, Dan Woods, former FBI Special Agent, and VP Shape Intelligence will demonstrate how the Selenium Webdriver tool is used to perform credential stuffing attacks.
  • Why CAPTCHA Doesn't Work Recorded: Dec 5 2019 6 mins
    Dan Woods, VP Shape Intelligence Center
    Captcha's are good for two things: Increased user friction and decreased conversion rates.

    Learn from Dan Woods how cybercriminals and malicious actors can quickly bypass Captcha's on your website.
  • Holiday Cyber Threat Guide Recorded: Nov 27 2019 28 mins
    Jarrod Overson, Director of Engineering at Shape Security
    While the holidays bring us an excess of joy and hot chocolate, security teams are faced with a substantial increase in cyber attacks. Hot products in demand bring scammers, scalpers, and bad bots.

    Join us for this live webinar as Jarrod Overson, Director of Engineering at Shape Security, breaks down three of the most popular and costly cyber attacks and what you can do to keep these attacks from ruining the holidays.

    In this webinar, we will discuss in detail:

    - Credential Stuffing & Password Spraying
    - E-Skimming or Magecart Style Attacks
    - Scalping
Advanced Website Defense
Shape Security protects Fortune 500 websites from malware, botnets and scripts. Shape protects websites using real-time polymorphism to make websites a moving target. Shape stops the cause of the most serious breaches – web automation.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: An Intro to Shape Security: Defeating Application Fraud
  • Live at: Jun 5 2020 12:25 am
  • Presented by: Mike Plante, VP Product Marketing, Shape Product Group at F5
  • From:
Your email has been sent.
or close