The accreditors of this session require that you periodically check in to verify that you are still attentive.
Please click the button below to indicate that you are.
• Analyzing how synthetic identities are created and used to create credit files that facilitate fraud
• Reviewing case studies to provide practical guidance on how organized synthetic identity rings target financial institutions
• Detailing best practices for flagging, investigating and resolving potential synthetic identity schemes