MRC Vegas 2018 Presentations
A Fraud Detection System Based on Customized ML Models
Two principals from Microsoft provide a technical overview of the company's Fraud Detection System and the innovations introduced as part of this platform.
A Practical Guide to Payment Processing in Latin America: Best Practices and Benchmarks
Leaders from allpago and Microsoft share their expertise on how companies can maximize revenue opportunities in three key Latin American markets.
Africa: The Final Frontier
See why opportunities abound for eCommerce and mCommerce in Africa, and receive tips on how companies can navigate this complex region.
Alternative Payments and their Importance in Emerging Markets
PayU and Kiwi.com share insights on alternative payments and why they represent a significant share of eCommerce transactions in developing countries.
Artificial Intelligence Gets You So Far -- Augmented Intelligence Can Get You Farther
Learn about augmented intelligence and how this concept can be applied to risk mitigation to help enhance, rather than replace, human decision making.
Building vs. Buying: Understanding the Right Time for Each Option as You Grow Your Organization
Two industry veterans share their perspectives on the benefits and drawbacks of creating a risk platform internally instead of purchasing a solution from a vendor or provider.
Business After the Breach: Unspoofable Behavioral Insights to Complement PII Verification, Fight Fraud, and Reduce Customer Friction
Neustar and Square look at how capturing and analyzing contextual data which cannot be spoofed can help companies reduce customer friction and minimize false positives.
Criminal Minds: How Attackers Weaponize Your Customer Data
Get an inside look at top cybercrime threats and what organizations can do to defend themselves.
Cyber Intelligence & Social Media Surveillance
Keith Elliott from Reed Research shares insights and tips on how companies can leverage social media accounts as part of their investigation tactics.
Don't Get Stuffed! Credential Stuffing, Account Takeovers, and Identification/Mitigation
Discover what credential stuffing is and learn which techniques can be employed to help prevent these attacks.