MRC Vegas 2018 Presentations

A Fraud Detection System Based on Customized ML Models

Two principals from Microsoft provide a technical overview of the company's Fraud Detection System and the innovations introduced as part of this platform.

Read more »

A Practical Guide to Payment Processing in Latin America: Best Practices and Benchmarks

Leaders from allpago and Microsoft share their expertise on how companies can maximize revenue opportunities in three key Latin American markets.

Read more »

Africa: The Final Frontier

See why opportunities abound for eCommerce and mCommerce in Africa, and receive tips on how companies can navigate this complex region.

Read more »

Alternative Payments and their Importance in Emerging Markets

PayU and Kiwi.com share insights on alternative payments and why they represent a significant share of eCommerce transactions in developing countries.

Read more »

Artificial Intelligence Gets You So Far -- Augmented Intelligence Can Get You Farther

Learn about augmented intelligence and how this concept can be applied to risk mitigation to help enhance, rather than replace, human decision making.

Read more »

Building vs. Buying: Understanding the Right Time for Each Option as You Grow Your Organization

Two industry veterans share their perspectives on the benefits and drawbacks of creating a risk platform internally instead of purchasing a solution from a vendor or provider.

Read more »

Business After the Breach: Unspoofable Behavioral Insights to Complement PII Verification, Fight Fraud, and Reduce Customer Friction

Neustar and Square look at how capturing and analyzing contextual data which cannot be spoofed can help companies reduce customer friction and minimize false positives.

Read more »

Criminal Minds: How Attackers Weaponize Your Customer Data

Get an inside look at top cybercrime threats and what organizations can do to defend themselves.

Read more »

Cyber Intelligence & Social Media Surveillance

Keith Elliott from Reed Research shares insights and tips on how companies can leverage social media accounts as part of their investigation tactics.

Read more »

Don't Get Stuffed! Credential Stuffing, Account Takeovers, and Identification/Mitigation

Discover what credential stuffing is and learn which techniques can be employed to help prevent these attacks.

Read more »