Fraudsters Fight Against Consortiums

Data analysis
Parul Sharma and Pranav Prakash -- ThreatMetrix
Jan 23, 2019
In a risk-based context, consortiums enable companies to exchange information about user behavior, both legitimate and illegitimate. This webinar explains ways in which online retailers can use consortium data to augment their rules and risk decisions, then examines how fraudsters can attempt to bypass consortiums by mimicking legitimate behavior. A scenario involving compromised credentials is then presented, showing how user identification can be enhanced through consortiums. A sample workflow and brief Q&A round out the broadcast.

Some content is hidden, to be able to see it login here Login

Blue-tinted background of a man watching a webinar

Host a Webinar with the MRC

Help the MRC community stay current on relevant fraud, payments, and law enforcement topics.
Submit a Request

Publish Your Document with the MRC

Feature your case studies, surveys, and whitepapers in the MRC Resource Center.
Submit Your Document

Related Resources

Cookies help us improve your website experience.
By using our website, you agree to our use of cookies.