Training

Data Breach Prevention and Response Summit , Events , Fraud Summit

CAPTURED: The Longevity of Stolen Data Until it's Sold on the Underground

CAPTURED: The Longevity of Stolen Data Until it's Sold on the Underground

Cyber threat actors are trans-national, well-funded and highly organized, they are utilizing leading-edge technology to attack merchants and stealing data at a large scale. Join us as we walk you through our research on what happens after the attacks. We will highlight when that stolen payment card data appears on the dark web and how long that data can linger before it is purchased by a criminal and used for fraudulent purchases and cash-out schemes.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.