SlideShare a Scribd company logo
1 of 19
Download to read offline
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without Express Written Permission
使用实时全球分析增加收入和减少欺诈
Ken Lam
Marketing Director, Asia Pacific
ThreatMetrix
May 2017
认证数字身份很困难
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without ThreatMetrix Express Written Permission 2
Open Account Make PaymentLogin
No single organizational view of Digital
Identity and decision strategy
Abandonment AuthenticationFriction
Multiple devices,
Personas and locations
User
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without Express Written Permission 3
数身份攻击是全球化,自动化和增长中
Daily Rejected Transactions
Identity
Abuse Index
高达95%的交易是欺诈性的
% fraudulent account login attempts for ecommerce
2016年:在数字式边界的一年
Over one billion BOT
driven identity
testing attacks
stopped
1 in 5 Transactions
Cross Boarder
Native Mobile
Transactions surpassed
Mobile Web
43% Transactions Mobile
(53% Financial Services)
15 B Transactions
representing
$600B+ in value
350M Fraud
attacks detected
saving ~$15B in
losses
我们需要一种新的方法来认证数字身份
Real-time Big Data Analytics
ThreatMetrix
维护着一个无
与伦比的数字
身份网络。
理解 人与关联
设备,位置,
凭据和威胁行
为之间的关系...
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without Express Written Permission 7
...和现在和随着
时间的多个角色
之间更复杂的关
系。
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without Express Written Permission 8
4.5 billion connected
devices
1.5 billion+ mobile
devices
2 billion transactions
per month
200+ countries and
territories covered
750 million unique
email addresses
700 million IP
addresses
643 million physical
mail addresses
1.4 billion unique
online accounts
500 Million+ attacks
stopped annually
数字身份网络
• 15亿数字身份代表全球所有活
跃数字消费者的40%
• 超过95%的识别率
可信用户或网络威胁?
Airline
17
Identities
Marketplace
2 Accounts
Bank
6 Accounts
PartnersFinancial ServiceseCommerce
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without Express Written Permission
12
ThreatMetrix分析超过超过4000个客户的30K网站7500万的每日交易
DEVICE
IDENTITY
LOCATION
THREAT
数字身份智能 动态决策平台
SMART
ANALYTICS
INTEGRATION
HUB
DECISION
MANAGEMENT
MACHINE	
LEARNING
Smart
Learning
Smart Rules
智能分析
Adaptive	Dynamic
per-Entity	Variables	
Parameter	Selection,	
Weighting	&	Normalization
200ms
BEHAVIORAL	ANALYTICS MACHINE	LEARNING
ThreatMetrix搜索和分析
1
实时位置分析
1
ThreatMetrix在行动:
Cookie
Wiping
Session
Replay
Rotating IP
Address
Situation: 7 Hours (0800
hours to 1500 hours) of
high volume new
account origination
attacks using multiple
methods
Result: 1200 attacks
stopped
顾客见证
18
By using Digital
Identities we can
provide a more
streamlined
authorization
process,
improving overall
card usage while
reducing fraud.”
The ThreatMetrix
Portal, in terms of
case reviews,
recalls and the
flexibility of the
rules, is excellent.
I think it is quite
unique for a
company the size
of Netflix to be
able to rely on a
single fraud and
security solution
like this.”
ThreatMetrix
allowed us to
have bespoke,
risk-based
authentication
that is ahead of
the curve.”
Fraud	
Prevention
Threat
Detection
Authentication
Customer
Identity
“““ “
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without Express Written Permission
Thank You
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without Express Written Permission19

More Related Content

What's hot

The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime SecureAuth
 
Bp Corp Pres Short
Bp Corp Pres ShortBp Corp Pres Short
Bp Corp Pres Shortkevinjoy
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachLaurent Pacalin
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
Falcon debit credit_2909_ps
Falcon debit credit_2909_psFalcon debit credit_2909_ps
Falcon debit credit_2909_pskazemita
 
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021Bruce Ma
 

What's hot (12)

Requirement of PCI DSS in India.
Requirement of PCI DSS in India.Requirement of PCI DSS in India.
Requirement of PCI DSS in India.
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Bp Corp Pres Short
Bp Corp Pres ShortBp Corp Pres Short
Bp Corp Pres Short
 
MTBiz May-June 2019
MTBiz May-June 2019 MTBiz May-June 2019
MTBiz May-June 2019
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
Challenge Accepted
Challenge AcceptedChallenge Accepted
Challenge Accepted
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
Falcon debit credit_2909_ps
Falcon debit credit_2909_psFalcon debit credit_2909_ps
Falcon debit credit_2909_ps
 
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021
 

Similar to ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without Customer Friction

Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsCXO 2.0 Conference
 
Cyber Security Tips to Avoid Cybercrime
Cyber Security Tips to Avoid CybercrimeCyber Security Tips to Avoid Cybercrime
Cyber Security Tips to Avoid CybercrimeNeil Kemp
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Strategic Treasurer
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeSysfore Technologies
 
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdfA Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdfIDMERIT IDMERIT
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety
 
Naapi – Insurer Innovation Award 2023
Naapi – Insurer Innovation Award 2023Naapi – Insurer Innovation Award 2023
Naapi – Insurer Innovation Award 2023The Digital Insurer
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptxdarrengracia
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdfMerchantech - Payment Processing Services
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudMichael Holden
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Financial Management Cybersecurity Protecting Your Financial Data.pdf
Financial Management Cybersecurity Protecting Your Financial Data.pdfFinancial Management Cybersecurity Protecting Your Financial Data.pdf
Financial Management Cybersecurity Protecting Your Financial Data.pdfJose thomas
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!Caroline Johnson
 
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and TomorrowRisky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and TomorrowDigiliti Money
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutionsRasool Irfan
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 

Similar to ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without Customer Friction (20)

Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
 
Cyber Security Tips to Avoid Cybercrime
Cyber Security Tips to Avoid CybercrimeCyber Security Tips to Avoid Cybercrime
Cyber Security Tips to Avoid Cybercrime
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | Sysfore
 
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdfA Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
Naapi – Insurer Innovation Award 2023
Naapi – Insurer Innovation Award 2023Naapi – Insurer Innovation Award 2023
Naapi – Insurer Innovation Award 2023
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire Fraud
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Financial Management Cybersecurity Protecting Your Financial Data.pdf
Financial Management Cybersecurity Protecting Your Financial Data.pdfFinancial Management Cybersecurity Protecting Your Financial Data.pdf
Financial Management Cybersecurity Protecting Your Financial Data.pdf
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
 
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and TomorrowRisky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 

More from Ken Lam

高い不正検知とユーザーの利便性維持の 両立
高い不正検知とユーザーの利便性維持の 両立高い不正検知とユーザーの利便性維持の 両立
高い不正検知とユーザーの利便性維持の 両立Ken Lam
 
ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援
ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援
ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援Ken Lam
 
Netfilxの無料トライアル不正行為対策を サポート
Netfilxの無料トライアル不正行為対策を サポート Netfilxの無料トライアル不正行為対策を サポート
Netfilxの無料トライアル不正行為対策を サポート Ken Lam
 
Fit forum seminar_20170623
Fit forum seminar_20170623Fit forum seminar_20170623
Fit forum seminar_20170623Ken Lam
 
Threat metrix全球共享数字身份情報
Threat metrix全球共享数字身份情報Threat metrix全球共享数字身份情報
Threat metrix全球共享数字身份情報Ken Lam
 
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为Ken Lam
 
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートThreatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートKen Lam
 
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートThreatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートKen Lam
 
ThreatMetrix のデジタル・ アイデンティティ
ThreatMetrix のデジタル・ アイデンティティThreatMetrix のデジタル・ アイデンティティ
ThreatMetrix のデジタル・ アイデンティティKen Lam
 

More from Ken Lam (9)

高い不正検知とユーザーの利便性維持の 両立
高い不正検知とユーザーの利便性維持の 両立高い不正検知とユーザーの利便性維持の 両立
高い不正検知とユーザーの利便性維持の 両立
 
ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援
ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援
ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援
 
Netfilxの無料トライアル不正行為対策を サポート
Netfilxの無料トライアル不正行為対策を サポート Netfilxの無料トライアル不正行為対策を サポート
Netfilxの無料トライアル不正行為対策を サポート
 
Fit forum seminar_20170623
Fit forum seminar_20170623Fit forum seminar_20170623
Fit forum seminar_20170623
 
Threat metrix全球共享数字身份情報
Threat metrix全球共享数字身份情報Threat metrix全球共享数字身份情報
Threat metrix全球共享数字身份情報
 
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
 
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートThreatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
 
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートThreatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
 
ThreatMetrix のデジタル・ アイデンティティ
ThreatMetrix のデジタル・ アイデンティティThreatMetrix のデジタル・ アイデンティティ
ThreatMetrix のデジタル・ アイデンティティ
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without Customer Friction