This course in one part in our ongoing series on Fraud Trends in the Future. This specific course focuses on Targeted Attacks. In a targeted attack, your organization is singled out because the attacker has a specific interest in your business or has been paid to target you. The groundwork for the attack could take months so that they can find the best route to deliver their exploit directly to your systems (or users). In this course we discuss the types of targeted attacks, phases of targeted attacks and mitigation methods.
Fraudsters seek new ways to exploit private information. Cybercrime and fraud prevention is an evolving field based on varied tactics used by fraudsters. In order to be prepared to mitigate fraud risks, you must understand the current fraud trends. The initial segment of this series will focus on fraud trends that have been identified for 2023 and beyond. Broadly, these trends include:
- Automation
- Account Takeover
- Adoption of new digital payment methods
- Balancing fraud and consumer friction
- Rise of synthetic identities
- Escalating cost of fraud
- Targeted attacks
- Strong need for real-time assessment
- Need for multi-layered fraud assessment
- Account security
Within each succeeding segment we will focus on specific aspects to enable professionals to start adapting and integrating the trend into their business.
Course Series
This course is included in the following series:
7 CoursesFraud Trends for the Future
- Fraud Trends for the Future - Examining Automation and Machine Learning
- Fraud Trends for the Future - Understanding and Addressing Account Takeover
- Fraud Trends for the Future - Digital Payments Fraud
- Fraud Trends for the Future - Mitigation Methods for Synthetic Identities
- Fraud Trends for the Future - Understanding Synthetic Identities
- Fraud Trends for the Future - Need for Real-time Risk Assessment - Part one
- Fraud Trends for The Future - Targeted Attacks and Payment Management
Learning Objectives
- Explore and evaluate Fraud trends for 2023 and beyond.
- Discover and define targeted attacks.
- Identify types of targeted attacks.
- Identify the phases of targeted attacks.
- Discover and discuss elements of software that can help mitigate a targeted attack.
5 Reviews (15 ratings)
Reviews
Prerequisites
No advanced preparation or prerequisites are required for this course.