
Many of us have been victims of a fraud attack—often, multiple times in one year. Unfortunately, our growing dependence on social media, mobile and connected devices, and technology in general has seemingly opened up new vulnerabilities for criminals to exploit. Cybersecurity breaches and fraud attacks are now the norm, woven intricately into the fabric of our lives. How do we minimize and counter fraud attacks and security breaches? Do we fight cyber threats to win the fraud battle, or vice versa?
Several experts weigh in on these questions in the next episode of Cyber Beat Live.
Here are some other questions that are part of the discussion:
-
What are the key cybersecurity challenges plaguing the financial services industry?
-
Pundits say that the most common way hackers break into a network is by stealing valid login credentials. Are increasing numbers of cybersecurity gaps promoting more fraudulent acts?
-
How do we minimize the possibility of insiders deliberately or willfully sharing their credentials with would-be hackers?
-
Are millennials more likely to create cybersecurity and fraud risks?
-
At what point should the fraud prevention planning team involve the cybersecurity team? Why?
-
How should financial institutions address the implications of ever-rising Internet and mobile usage by customers?
-
What are some best practices that can be employed to mitigate cybersecurity risks and counter fraud?
Host
Bob Stasio is a senior product manager of cyber analysis with IBM i2 Safer Planet. Stasio has nearly 14 years of expertise in the intelligence community, the US military, the National Security Agency (NSA) and the commercial sector fighting top-tier malicious actors. He also served on the initial staff of the US Cyber Command. During the troop surge of 2007, his intelligence unit supported the detainment of more than 450 high-value targets.
Guests
Scott Dueweke formed Zebryx Consulting in 2015 to provide public and private sector clients an understanding of identities and alternative payment systems, both risks and rewards. Dueweke is an expert on identity and anonymous payments on the Internet, and he regularly advises senior leadership within financial institutions and the US government. He previously provided similar services for Agilex and from 2006–2014 with Booz Allen Hamilton.
Scott N. Schober is a cybersecurity expert and president and CEO at Berkeley Varitronics Systems, Inc., Schober has overseen the development of numerous cell phone detection tools used to enforce a no-cell-phone policy in corporate, correctional, law enforcement, military, secured government and university facilities. He regularly appears on Arise TV, Bloomberg TV and Canadian TV News. And he has numerous appearances as a cybersecurity expert on Al Jazeera America, CCTV America, CNBC, CNN, Fox Business Channel, Fox News, Inside Edition, MSNBC, One America News (OAN), PIX11, TheBlaze and more. Schober has also presented as a subject-matter expert (SME) discussing cybersecurity and corporate espionage at numerous conferences worldwide.
Morgan Wright is an internationally recognized expert on cybersecurity strategy, cyber terrorism, identity theft and privacy. Wright’s landmark congressional testimony about Healthcare.gov changed how the government collected personally identifiable information. He has spoken on cybersecurity to audiences around the world in hundreds of appearances on national news programs and radio broadcasts, and he has been widely published in print and online.
Resources
-
“Hackers Steal Millions from ATMs Without Using a Card,” CNN Money, July 2016.
-
“Almost a Third of Consumers Victimized by Card Fraud,” CreditUnionTimes, July 2016.
-
“SWIFT to Banks: Who You Gonna Call?” InfoRiskToday, July 2016.
-
“Extending Cybersecurity to Fraud Analytics,” GCN, June 2016.
-
“Analytics Brief: Thwarting Cyber Crime on Banks, IBM Big Data & Analytics Hub, May 2016.
Author

- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Latest Articles
Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
Blog2022.10.12Vulnerability management with Wazuh open source XDR
Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky
Subscribe
0 Comments