2013 Faces of Fraud: The Threat Evolution

Help Benchmark How Organizations Are Addressing Fraud, Cyberthreats

From the growth of mobile malware to the refinement of sophisticated banking Trojans and the proliferation of point-of-sale and retail breaches, the fraud landscape continues to evolve for banking institutions globally.

But so, too, do the anti-fraud technology solutions institutions use to detect, prevent and analyze the impact of myriad fraud schemes.

What are today's most predominant and damaging fraud incidents impacting banking institutions and their customers? And what anti-fraud investments are institutions making to thwart the fraudsters and satisfy the new demands of regulatory agencies?

These are among the questions to be answered by this latest study, 2013 Faces of Fraud: The Threat Evolution. A follow-up to ISMG's 2010 and 2011 Faces of Fraud surveys, this new research looks not only at the latest fraud trends and how institutions are fighting back, but also at how they are affected by the impact of ever-evolving threats.

This survey benchmarks how organizations affected by today's financial security risks are expected to address fraud and cyberthreats in 2013.


Survey Results Webinar

Survey Results: 2013 Faces of Fraud

Survey Results: 2013 Faces of Fraud

From the growth of mobile malware to the refinement of sophisticated banking Trojans and the proliferation of point-of-sale and retail breaches, the fraud landscape continues to evolve for banking institutions globally.

But so, too, do the anti-fraud technology solutions institutions use to detect, prevent and analyze the impact of myriad fraud schemes.

How are organizations addressing fraud and cyberthreats? Register for this webinar for an early look at survey results, as well as expert analysis of:

  • Today's most predominant and damaging fraud incidents impacting banking institutions and their customers;
  • New anti-fraud investments institutions are making to thwart the fraudsters and satisfy the demands of regulatory agencies.

Register for this webinar now »








Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.