BAI Webinar

Managing digital identity threats through data-driven risk decisioning

Watch now!

All fields required.

RECORDED: July 14, 2022
TIME: 1:00 - 2:00 PM CT

Identity fraud is impacting organizations globally as data breaches are on the rise, new threat vectors are entering the picture, and user personally identifiable information (PII) is harvesting through social engineering.

A recent statistic confirms that approximately one-third of online transactions are from BOTs or fake identities. When you add that to the exponential volume of stolen identity data, which is being bought and sold on the dark web, online users are now facing a growing world of identity threats.

Digital identity data-driven risk decisioning provides a robust workflow that addresses the rising threat of identity fraud utilizing multiple touch points. The differentiator in this design is a secure repository of global device and user-persona history data.

By processing this data through an intelligent rules-based policy, financial services organizations can make split-second automated risk decisions before letting users through the front door. This workflow continues to evolve, adding new attributes, additional identity proofing and authentication solutions to the decisioning engine. Join us to learn more.

Key takeaways:

  • Discover the current state of the digital identity threat landscape
  • Understand the power of data-driven workflows with specific use cases and examples in the financial services industry
  • Learn how to stay ahead of emerging identity fraud threats with innovative risk decisioning capabilities like behavioral biometrics and advanced fraud analytics

George Freeman
Sr. Solutions Consultant, Fraud & Identity, Business Services
LexisNexis® Risk Solutions

George Freeman is a subject matter expert for customers in business services. George provides illustrated use cases and workflow designs to mitigate identity cyberfraud resulting from increasing use of stolen identities, fake identities, and malicious BOTs. George works with various business development teams to scope Identity solutions from rapid shifts in various Internet threat landscapes.
Presented by: