Cryptocurrency and Cybercrime with Patrick Westerhaus of Cyber Team Six and Luke Wilson of 4iQ

It’s no secret that cryptocurrencies have taken the fintech world by storm, with seemingly limitless passion and potential propelling their usage forward. Unfortunately, cryptocurrencies like bitcoin have also drawn attention from some criminals, hackers, and fraudsters…

This podcast episode focuses on the cybercrime landscape as it relates to crypto, and how technology and innovation can help protect banks, businesses, and of course consumers from those who would exploit digital currencies.

Listen in as we explore this with the help of two guests with a tremendous amount of experience in the field of cyber security. Patrick Westerhaus is the CEO of Cyber Team Six, a company building software to defeat the cyber enabled crimes of fraud, theft and espionage, and Luke Wilson is the Vice President of Intelligence for 4iQ, a company that leverages technology to help investigators combat fraud, money laundering, counter terrorism financing, insider threats and other cyber crimes.

Payments & Fintech Insights In This Episode:

  • How and why cyber criminals are targeting and using cryptocurrencies.
  • The story behind Cyber Team Six and 4iQ, and how they work to help organizations improve their detection and prevention of cybercrime.
  • What some of the keys to preventing cybercrime are, and why doing so as it relates to crypto is a great thing for fintechs and payments organizations.
  • Patrick and Luke’s perspectives on the current cybersecurity landscape, and what the future may hold.
  • With so much more!

Featured on the Show:

Payments & Fintech Spotlight: 4iQ

4iQ is an identity intelligence company with curated, historical and transient breached data collected for over ten years from public, private and open sources within the surface, deep and dark Webs, networks and underground communities. The 4iQ IDLake™ helps organizations assess and report on exposed employee and consumer credentials and personally identifiable information (PII) in breaches and leaks to prevent account takeover, identity theft and other identity-based crimes in their suite of 4iQ IDTheft™ APIs.

4iQ IDLake™, fused with other relevant data sources in their 4iQ IDHunt™ solutions, is a force multiplier for fraud, money laundering, espionage and other cyber crime investigations, focusing on the identities behind malicious activities.

The 4iQ team is composed of intelligence community analysts, infosec pioneers and tech entrepreneurs with a single mission: to disrupt cyber-enabled crime at the source – the people behind the attacks. 4iQ is headquartered in Los Altos, CA and backed by Forgepoint Capital, C5 Capital, Adara Ventures, and Benhamou Global Ventures. Please visit www.4iQ.com.

Payments & Fintech Spotlight: Cyber Team Six

As a software product company founded by former law enforcement, commercial and academic credentialed practitioners, Cyber Team Six has cracked the code for modeling the cyber criminal access into your customers to stop fraud before it’s even attempted. It’s a methodology proven to save tens of millions in fraud loss avoidance and help stop fraud in financial services, streaming services, and online retailers – really any company with online customer engagement where something of value is exchanged. Cyber Team Six’s solutions are a new breed of offensive & proactive software designed to prevent issues before people suffer impact in their digital life by cybercriminals. The Cyber Team Six solutions help unify the needed enterprise convergence across Cyber, Risk, Fraud, Compliance, Sales, Regulatory, Digital Channels, and IT functions.

Cyber Team Six’s current market offering, the Fraud Risk Identifier (FRI), is the first pre-emptive anti-fraud technology which prevents fraudulent transactions by devaluing the data hackers steal and sell to fraudsters before the consumer is victimized. The FRI protects individual customers by determining if they have been compromised by cyber threats. The FRI also eliminates the risk of using stolen data which exists when external threat data used by the company is sourced from the Darkweb – either when collected directly or purchased from cyber threat intelligence third parties. Please visit www.cyberteamsix.net to learn more.

More Podcast Episodes