OUR PORTFOLIOS

Skip to main content

FLS JUNE US 2026

-

  1. REGISTRATION OPENS: BREAKFAST MEET AND GREET
    • Why is trust central to modern fraud, both in exploiting victims and enabling criminal collaboration?
    • A deep dive into how reputation systems, escrow, and 'customer service' allow fraud to scale.
    • Explaining what these trust models reveal about weaknesses in current prevention strategies.
  2. Anti-Fraud Agentic Workforces: Scam Defense When AI Joins your Team
    Attendees Peer-to-Peer Roundtable Discussions
  3. Attendees Peer-to-Peer Roundtable Discussions
  4. Signals & Metadata: The Missing Layer in Deepfake Detection
    Attendees Peer-to-Peer Roundtable Discussions
  5. Attendees Peer-to-Peer Roundtable Discussions
  6. TEA AND COFFEE BREAK
  7. 10:25 - 10:55 | 10:55 - 11:25 | 11:25 - 11:55
    • Insight into how customer-friendly policies (flexible returns, goodwill credits, promo incentives, instant credit, fast onboarding) are increasingly becoming the attack surface.
    • Where is the tipping point between growth optimization and enabling repeat exploitation?
    • Strategies for segmenting customers and applying proportional controls without damaging lifetime value or brand trust.
  8. LUNCH & NETWORKING
    • Gain a clearer understanding of why authentication can no longer be treated as a single checkpoint, and how fraud increasingly shifts to post-login activity across the customer journey.
    • Insight into how AI-generated voice clones, deepfake verification attempts, and synthetic identities are reshaping the threat landscape and exposing the limits of static, rules-based controls.
    • How can institutions deploy dynamic, behavior-based security that adapts in real time without introducing unnecessary friction for legitimate customers?
    • How criminals are scaling ATO using stolen credentials, SIM swaps and social engineering to hijack customer accounts across financial and digital commerce platforms.
    • Why traditional identity checks, static authentication and compliance-driven controls struggle against adaptive, multi-stage takeover tactics.
    • Which advanced signals (behavioral, device, session linking and cross-channel intelligence) are proving most effective at detecting coordinated ATO before loss occurs?
  9. TEA AND COFFEE BREAK
  10. 14:30 - 15:00 | 15:00 - 15:30 | 15:30 - 16:00
    • Explore how AI and deepfake technologies are bolstering impersonation, phishing and 'pig-butchering' schemes that drain U.S. consumers and institutions and what this means for your control environment.
    • Explaining why social engineering continues to drive APP, card-not-present and crypto losses by manipulating customers and frontline teams to bypass technical safeguards.
    • What multidisciplinary defenses across analytics, customer journey design and internal controls can disrupt human deception at scale- including risks from compromised or manipulated employees.
  11. Attendees Peer-to-Peer Roundtable Discussions
  12. Attendees Peer-to-Peer Roundtable Discussions
  13. Attendees Peer-to-Peer Roundtable Discussions
  14. Attendees Peer-to-Peer Roundtable Discussions
  15. EVENING DRINKS RECEPTION