Financial Aggregators: Friends, Foes, or Attack Surface?

Logo
Presented by

Dan Woods, Head of Shape Intelligence Center

About this talk

Third-party financial aggregators might make life easier for users, but they can be a new attack vector for those looking to defraud your institution and its customers. Each time a new list of leaked credentials goes into circulation, criminals use them for credential-stuffing attacks on aggregators, as well as other targets. Once working aggregator credentials have been identified, attackers move on to siphon funds out of their victims’ accounts. Furthermore, some aggregators explicitly aim to use their positions to disintermediate banks and other financial institutions from their customers. What steps can banks take to: - Protect their infrastructure? - Protect their customers? - Enforce the API use agreements that they have entered with the aggregators? Please join Shape Security’s Head of Shape Intelligence Center, formerly CIA and FBI investigator, Dan Woods for the answers to these and other questions in this webinar.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (162)
Subscribers (11829)
With 20+ years of application service experience, F5 provides the broadest set of services and security for enterprise-grade apps, whether on-premises or across any multi-cloud environment. F5 A Force For Cybersecurity hosts a new webinar every month around cloud and security topics, so do stay tuned to this channel to get the latest information!