On The Leading Edge Of Fraud: The Data, The User & The Risk

Add bookmark

There’s so much to be done between the moment that fraud goes from risk to an incident. Martin Ingram parses those initiatives out between the data and the user. Hailing from a financial services industry where the purpose is risk, he suggests that all organizations manage risk. And whether the potential incident might concern data or the user- the cyber security executive must understand inherent risk and realize mitigation methodologies accordingly.

Having that understanding, knowledge and prowess is the most straightforward way to ensure the security organization is equipped with the necessary tools to communicate the value of meeting that moment between risk and incident.

Often, more risk means more reward and getting in the way of risk has the implication of limiting business upside. The inverse of course is benign about to contextualize how a certain security cost limits risk and hence is worth the investment. Either way, well informed security executives providing risk context ensures a safe yet enabled enterprise. And that of course extends out to your supply chain. 

Realizing that threats come from within, along the supply chain and through geo-political means- and that those threats have metastasized and been exacerbated is our collective new reality. Martin shares that the onus is on security personnel to be prepared within that constant state of change.

The assumption has been that you can see what your hackers do. If that was the case, it certainly is not the case any longer. Yet, there is a new tool to confront what you can’t see- the data. Patterns can reveal themselves when looking at the right data in the right context.

Martin shares all of the above along with how privilege plays into decision-making, acuity needed beyond solutions, pace of response and more. Join us at SASE APAC February 17-18.


Upcoming Events

Automotive Cyber Security, Connectivity & SDV Week 2025

18th - 20th November, 2025

Van der Valk Hotel Berlin Brandenburg, Germany

Automotive Cyber Security, Connectivity & SDV Week 2025

Digital Identity Week

1st - 2nd September 2026

Sydney, Australia

Digital Identity Week

Latest Webinars

From Dependencies to Defences: Navigating Software Supply Chain Security

2025-09-24

11:00 AM - 12:00 PM SGT

Learn how to defend your software supply chain from dependency threats and build resilient security...

Unpacking global regulatory frameworks to enhance third-party operational resilience

2024-11-14

11:00 AM - 12:00 PM EST

Join this webinar to explore the resilience-focused requirements of DORA, NIS2 and other global regu...

Preventing financial and reputational risk with process intelligence

2024-05-23

11:00 AM - 12:00 PM EDT

Learn how to manage risk stemming from poorly controlled processes in a collaborative way

Recommended