Find Resources
Fraud & Risk
Fraudsters Fight Against Consortiums
Presentation
In a risk-based context, consortiums enable companies to exchange information about both legitimate and illegitimate user behavior. This presentation details ways in which online businesses can leverage consortium data to augment their rules and risk decisions, then highlights how fraudsters can try to bypass consortiums by mimicking legitimate behavior. A scenario involving compromised credentials is then shown, looking at how user identification can be enhanced through consortiums. A sample workflow and brief summary conclude the slide deck.
Note that this presentation is also available as a webinar. To view the webinar, click here.

Note that this presentation is also available as a webinar. To view the webinar, click here.
Share: