The Truth About the Dark Web Fraud Trade

The Truth About the Dark Web Fraud Trade

The dark web is kind of like the last season of Game of Thrones; it’s not all good, but it’s not all bad either. In her session today, Emily Wilson, CFE, VP of Research at Terbium Labs, discussed the dark web fraud economy thriving just below the accessible search engines we visit every day.

According to Wilson, the dark web is not found through a Google search and it requires special technology called TOR for access. The technology is used to encrypt a user’s IP address and browsing history to give you an anonymous presence while you search. The dark web lives below the clear web and the deep web, and is booming with activity.

Read More

Work with Human Behavior to Avoid Breaches and Cybercrime, Says Cybersecurity Expert

Work with Human Behavior to Avoid Breaches and Cybercrime, Says Cybersecurity Expert

Organizations continue to operate under a cybercrime misconception about their customers, and it’s costing them a lot of money, said cybersecurity expert Theresa Payton, the Monday luncheon keynote speaker. “The conventional wisdom [in cybercrime and fraud] is that ‘humans are the weakest link … That’s why we have security problems.’ I want to change that conversation now.

“I used to feel that way when I was in the financial services industry,” she said. “I’d say, ‘I wish we could just train our customers on the little bit of what I know. My job would be safer and easier to do, and we’d all be happier.’ We’ve been talking this way for decades. We keep asking ourselves, ‘Why do people click on links? Why do people open attachments? … Why do people make these mistakes?’

Read More

Former White House CIO to Keynote ACFE Global Fraud Conference

Former White House CIO to Keynote ACFE Global Fraud Conference

The 30th Annual ACFE Global Fraud Conference is excited to welcome Theresa Payton to the stage on Monday, June 24, 2019. Payton was the first female to serve as White House Chief Information Officer where she oversaw IT operations for the U.S. President during a period of unprecedented technological change and escalating threats. She was named by IFSEC Global as the 4th among the top 50 of the world’s cybersecurity professionals and by Security Magazine as one of the top 25 Most Influential People in Security. Payton is one of America’s most respected authorities on security and intelligence operations.

Read More

Crime in Business and the Business of Crime

Crime in Business and the Business of Crime

In the 90s, smash-and-grab thefts at jewelry stores accompanied by security footage dominated the news more than foreign hackers and cyberattacks.  

Seemingly overnight, everything changed. Suddenly criminals figured it out — you don’t have to use a gun to commit a crime anymore. You can rob people from far away — from another country even — without worrying about ending up in a shootout with a cop. 

Read More

GDPR: A New Ethical Framework for Fraud Examiners

GDPR: A New Ethical Framework for Fraud Examiners

Most likely, you’ve heard the phrase “leaving a carbon footprint.” We know that traveling, consuming food and even breathing are all activities that release trace amounts of carbon into the atmosphere. The same idea is applicable to a person’s digital footprint. Your digital footprint is the virtual impression of activities you are involved in. Liking your friend’s post on Facebook, purchasing a pair of shoes online, tweeting about how much you loved this year’s #fraudconf — all of these activities are tracked and logged, and combined they are your digital footprint. This is what the GDPR is concerned with: protecting that data.

Read More