enigma logo
IntroCommitteeSponsorsProgramAbout
TwitterFacebookGoogle+YouTube
Get Info
Presentations: 
Bullet-Proof Credit Card Processing
Drops for Stuff: An Analysis of Reshipping Mule Scams
Data Integrity Based Attacks in Investigative Domains: How Companies Are Exploiting Data Science to Thwart Investigative Outcomes