We're sorry, but we couldn't find any results that match your search criteria. Please try again with different keywords or filters.
Loading
-
REGISTRATION OPENS: BREAKFAST MEET AND GREET
-
-
-
- Why is trust central to modern fraud, both in exploiting victims and enabling criminal collaboration?
- A deep dive into how reputation systems, escrow, and 'customer service' allow fraud to scale.
- Explaining what these trust models reveal about weaknesses in current prevention strategies.
-
Attendees Peer-to-Peer Roundtable Discussions -
Attendees Peer-to-Peer Roundtable Discussions
-
Attendees Peer-to-Peer Roundtable Discussions -
Attendees Peer-to-Peer Roundtable Discussions
-
TEA AND COFFEE BREAK
-
10:25 - 10:55 | 10:55 - 11:25 | 11:25 - 11:55
-
- Insight into how customer-friendly policies (flexible returns, goodwill credits, promo incentives, instant credit, fast onboarding) are increasingly becoming the attack surface.
- Where is the tipping point between growth optimization and enabling repeat exploitation?
- Strategies for segmenting customers and applying proportional controls without damaging lifetime value or brand trust.
-
LUNCH & NETWORKING
-
-
- Gain a clearer understanding of why authentication can no longer be treated as a single checkpoint, and how fraud increasingly shifts to post-login activity across the customer journey.
- Insight into how AI-generated voice clones, deepfake verification attempts, and synthetic identities are reshaping the threat landscape and exposing the limits of static, rules-based controls.
- How can institutions deploy dynamic, behavior-based security that adapts in real time without introducing unnecessary friction for legitimate customers?
-
- How criminals are scaling ATO using stolen credentials, SIM swaps and social engineering to hijack customer accounts across financial and digital commerce platforms.
- Why traditional identity checks, static authentication and compliance-driven controls struggle against adaptive, multi-stage takeover tactics.
- Which advanced signals (behavioral, device, session linking and cross-channel intelligence) are proving most effective at detecting coordinated ATO before loss occurs?
-
TEA AND COFFEE BREAK
-
14:30 - 15:00 | 15:00 - 15:30 | 15:30 - 16:00
-
- Explore how AI and deepfake technologies are bolstering impersonation, phishing and 'pig-butchering' schemes that drain U.S. consumers and institutions and what this means for your control environment.
- Explaining why social engineering continues to drive APP, card-not-present and crypto losses by manipulating customers and frontline teams to bypass technical safeguards.
- What multidisciplinary defenses across analytics, customer journey design and internal controls can disrupt human deception at scale- including risks from compromised or manipulated employees.
-
Attendees Peer-to-Peer Roundtable Discussions
-
Attendees Peer-to-Peer Roundtable Discussions
-
Attendees Peer-to-Peer Roundtable Discussions
-
Attendees Peer-to-Peer Roundtable Discussions
-
-
EVENING DRINKS RECEPTION

