{"id":100198,"date":"2025-07-14T20:46:55","date_gmt":"2025-07-15T04:46:54","guid":{"rendered":"https:\/\/www.trendmicro.com\/internet-safety\/for-adults\/spotlight-sessions\/dangerous-modern-identity-theft-2\/"},"modified":"2025-10-18T07:25:36","modified_gmt":"2025-10-18T15:25:36","slug":"ai-scams-threat-researcher","status":"publish","type":"page","link":"https:\/\/www.trendmicro.com\/internet-safety\/for-adults\/spotlight-sessions\/ai-scams-threat-researcher\/","title":{"rendered":"AI Powered Scams: What a Threat Researcher Wants You to Know"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#f7f9f9&#8243; parallax=&#8221;on&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;20px||20px||true|false&#8221; custom_padding_tablet=&#8221;40px||||false|false&#8221; custom_padding_phone=&#8221;&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;0px||0px||true|&#8221; global_module=&#8221;7138&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;74px&#8221; custom_margin=&#8221;0px||0px||true|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n\t\t\t<!-- Flexy Breadcrumb -->\r\n\t\t\t<div class=\"fbc fbc-page\">\r\n\r\n\t\t\t\t<!-- Breadcrumb wrapper -->\r\n\t\t\t\t<div class=\"fbc-wrap\">\r\n\r\n\t\t\t\t\t<!-- Ordered list-->\r\n\t\t\t\t\t<ol class=\"fbc-items\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\">\r\n\t\t\t\t\t\t            <li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\r\n                <span itemprop=\"name\">\r\n                    <!-- Home Link -->\r\n                    <a itemprop=\"item\" href=\"https:\/\/www.trendmicro.com\/internet-safety\">\r\n                    \r\n                                                    <i class=\"fa fa-home\" aria-hidden=\"true\"><\/i>Home                    <\/a>\r\n                <\/span>\r\n                <meta itemprop=\"position\" content=\"1\" \/><!-- Meta Position-->\r\n             <\/li><li><span class=\"fbc-separator\">\/<\/span><\/li><li class=\"active\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\" title=\"AI Powered Scams: What a Threat Researcher Wants You to Know\">AI Powered Scams: What...<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li>\t\t\t\t\t<\/ol>\r\n\t\t\t\t\t<div class=\"clearfix\"><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<script><!-- [et_pb_line_break_holder] -->\t$(document).ready(function () {<!-- [et_pb_line_break_holder] -->    addSocialShareButtons();<!-- [et_pb_line_break_holder] -->  });<!-- [et_pb_line_break_holder] --><\/script><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><\/p>\n<div class=\"row\"><!-- [et_pb_line_break_holder] -->  <\/p>\n<div class=\"col-12 col-xl-10 offset-xl-1\"><!-- [et_pb_line_break_holder] -->    <\/p>\n<h1 class=\"interstate text-center\">AI Powered Scams: What a <!\u2013- [et_pb_br_holder] -\u2013>Threat Researcher Wants You to Know<!-- [et_pb_line_break_holder] --><\/h1>\n<p><!-- [et_pb_line_break_holder] -->    <pee class=\"p-f16 text-muted text-center\"><!-- [et_pb_line_break_holder] -->      Recorded on June 11th, 2025<!-- [et_pb_line_break_holder] -->    <\/pee><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->    <\/p>\n<div class=\"col-12 col-lg-10 offset-lg-1\"><!-- [et_pb_line_break_holder] -->      <pee class=\"p-f18 text-center\"><!-- [et_pb_line_break_holder] --> In this eye-opening session, Marike Kuyper sits down with <strong>Ryan Flores<\/strong>, a research leader from Trend Micro\u2019s Forward-Looking Threat Research team, to unpack how cybercriminals are using AI in increasingly sophisticated ways\u2014from phishing emails and voice cloning to deepfakes and agentic AI. Learn how scammers are scaling their operations, the global ecosystem that supports them, and what you can do to stay protected. If you\u2019ve ever wondered how scams are evolving\u2014or how AI can also be used to fight back\u2014this is a must-listen.<!-- [et_pb_line_break_holder] --><\/pee><!-- [et_pb_line_break_holder] -->      <!-- [et_pb_line_break_holder] -->      <pee class=\"text-center d-none\"><!-- [et_pb_line_break_holder] -->        <a href=\"#recording\" class=\"btn btn-danger\">Watch Recording<\/a><!-- [et_pb_line_break_holder] -->      <\/pee><!-- [et_pb_line_break_holder] -->      <\/p>\n<div class=\"social-share-buttons justify-content-center align-items-center\"><\/div>\n<p><!-- [et_pb_line_break_holder] -->    <\/div>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] --><\/div>\n<p>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;40px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"row\"><!-- [et_pb_line_break_holder] -->  <\/p>\n<div class=\"col-12 col-lg-10 offset-lg-1\"><!-- [et_pb_line_break_holder] -->    <iframe loading=\"lazy\" class=\"mb-5 pb-5\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/aymK6V2IKuI?si=hBq-MxUW2SvYhhjf\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>           <!-- [et_pb_line_break_holder] -->\t<\/div>\n<p><!-- [et_pb_line_break_holder] --><\/div>\n<p>[\/et_pb_code][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"row\"><!-- [et_pb_line_break_holder] -->  <\/p>\n<div class=\"col-12 col-lg-10 offset-lg-1\"><!-- [et_pb_line_break_holder] -->            <!-- [et_pb_line_break_holder] -->  <\/p>\n<h2 class=\"interstate\"><!-- [et_pb_line_break_holder] -->    Key Highlights &#038; Insights<!-- [et_pb_line_break_holder] -->    <\/h2>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<ul class=\"p-f18\"><!-- [et_pb_line_break_holder] -->      <\/p>\n<li class=\"mb-3\"><strong>AI Is the New Scam Superpower<\/strong>: Learn how scammers are using generative AI tools like ChatGPT to personalize phishing messages, translate scams into multiple languages, and create fake identities\u2014making their operations more scalable, believable, and globally effective. <\/li>\n<p><!-- [et_pb_line_break_holder] -->      <\/p>\n<li class=\"mb-3\"><strong>Deepfakes Are Fueling Deception<\/strong>: Discover how cybercriminals are deploying deepfake audio and video to impersonate CEOs, politicians, or even loved ones\u2014tricking victims into transferring money, handing over credentials, or falling for romance and job scams.<\/li>\n<p><!-- [et_pb_line_break_holder] -->      <\/p>\n<li class=\"mb-3\"><strong>The Scam Ecosystem Is Global and Specialized<\/strong>: Explore how scammers operate within an organized, global network\u2014where groups specialize in everything from building deepfakes and writing scripts to laundering money\u2014making fraud harder to trace and easier to execute.<\/li>\n<p><!-- [et_pb_line_break_holder] -->      <\/p>\n<li class=\"mb-3\"><strong>AI Can Also Be a Powerful Defense Tool<\/strong>: Discover how cybersecurity tools like Trend Micro ScamCheck use AI to detect scam signals, flag deepfakes, and warn users in real time\u2014helping consumers fight back in a world where scams are increasingly automated and convincing.<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/ul>\n<p><!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->    <\/p>\n<hr>\n<p><!-- [et_pb_line_break_holder] -->               <!-- [et_pb_line_break_holder] -->\t<\/div>\n<p><!-- [et_pb_line_break_holder] --><\/div>\n<p>[\/et_pb_code][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"row\"><!-- [et_pb_line_break_holder] -->  <\/p>\n<div class=\"col-12 col-lg-10 offset-lg-1\"><!-- [et_pb_line_break_holder] -->   <!-- [et_pb_line_break_holder] -->    <\/p>\n<h2 class=\"interstate mt-1\"><!-- [et_pb_line_break_holder] -->    About the Guest: Ryan Flores <!-- [et_pb_line_break_holder] -->    <\/h2>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<div class=\"row\"><!-- [et_pb_line_break_holder] -->      <\/p>\n<div class=\"col-12 col-lg-2 text-center\"><!-- [et_pb_line_break_holder] -->      <img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/iskf\/older-adults\/ryan-flores-headshot.webp\" style=\"max-width:90%;\" alt=\"Headshot of Ryan Flores\"><!-- [et_pb_line_break_holder] -->    <\/div>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<div class=\"col-12 col-lg-9\"><!-- [et_pb_line_break_holder] -->      <pee class=\"p-f18\"><!\u2013- [et_pb_br_holder] -\u2013><!-- [et_pb_line_break_holder] -->        <strong>Ryan Flores<\/strong> is a research leader in Trend Micro\u2019s Forward Looking Threat Research team that is responsible for looking into emerging technologies as well as how these emerging technologies can be misused and abused by cybercriminals and threat actors.<!-- [et_pb_line_break_holder] -->      <\/pee><!-- [et_pb_line_break_holder] -->      <pee><!-- [et_pb_line_break_holder] -->        \u00a0<!-- [et_pb_line_break_holder] -->      <\/pee><!-- [et_pb_line_break_holder] -->    <\/div>\n<p><!-- [et_pb_line_break_holder] -->    <\/div>\n<p><!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->    <\/p>\n<hr>\n<p><!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->\t<\/div>\n<p><!-- [et_pb_line_break_holder] --><\/div>\n<p>[\/et_pb_code][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"row\"><!-- [et_pb_line_break_holder] -->  <\/p>\n<div class=\"col-12 col-lg-10 offset-lg-1\"><!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->    <\/p>\n<h2 class=\"interstate mt-1\"><!-- [et_pb_line_break_holder] -->      Additional Resources<!-- [et_pb_line_break_holder] -->    <\/h2>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<ul class=\"p-f18\"><!-- [et_pb_line_break_holder] -->      <\/p>\n<li class=\"mb-3\"><a href=\"https:\/\/www.idtheftcenter.org\/\" target=\"_blank\">Identity Theft Resource Center  (IDTheftCenter.org)<\/a> \u2013 A nonprofit organization providing free assistance, custom remediation plans, and resources to victims of identity theft. Call their toll-free number at <strong><a href=\"tel:+18884005530\">888-400-5530<\/a><\/strong> to speak with an expert advisor.<\/li>\n<p><!-- [et_pb_line_break_holder] -->      <\/p>\n<li class=\"mb-3\"><a href=\"https:\/\/reportfraud.ftc.gov\/\" target=\"_blank\">ReportFraud.ftc.gov  <\/a> \u2013 The US federal government&#8217;s website where you can report fraud, scams, and bad business practices.<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/ul>\n<p><!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->      <!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><\/p>\n<div class=\"social-share-buttons text-center justify-content-center align-items-center pb-4 mb-4\"><\/div>\n<p><!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->     <\/p>\n<hr>\n<p><!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->\t<\/div>\n<p><!-- [et_pb_line_break_holder] --><\/div>\n<p>[\/et_pb_code][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<style><!-- [et_pb_line_break_holder] -->@media (min-width: 1200px) {<!-- [et_pb_line_break_holder] -->    .btn.w-xl-50 {<!-- [et_pb_line_break_holder] -->      width: 50% !important;<!-- [et_pb_line_break_holder] -->    }<!-- [et_pb_line_break_holder] -->  }<!-- [et_pb_line_break_holder] --><\/style>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><\/p>\n<div class=\"row\"><!-- [et_pb_line_break_holder] -->  <\/p>\n<div class=\"col-12 col-lg-10 offset-lg-1\"><!-- [et_pb_line_break_holder] -->        <!-- [et_pb_line_break_holder] -->    <\/p>\n<h2 class=\"interstate mt-1\"><!-- [et_pb_line_break_holder] -->     Ready to Enhance Your Scam Awareness?<!-- [et_pb_line_break_holder] -->    <\/h2>\n<p><!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->    <pee class=\"p-f18 mb-0\"><!-- [et_pb_line_break_holder] -->      Try our <strong>Trend Micro ScamCheck<\/strong> tool to spot suspicious links and guard against online threats \u2013 because even the savviest among us can use an extra layer of defense.<!-- [et_pb_line_break_holder] -->    <\/pee><!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->    <pee class=\"p-18 text-center mb-0\"><!-- [et_pb_line_break_holder] -->      <a href=\"https:\/\/api.link.trendmicro.com\/events\/landing-page?product_id=4cc29&#038;source=iskf&#038;utm_medium=referral&#038;utm_content=scams-older-adults-trend-spotlight-session-3\" target=\"_blank\" class=\"btn btn-danger a-cta interstate w-100 w-xl-50\">Explore Trend Micro ScamCheck<\/a><!-- [et_pb_line_break_holder] -->    <\/pee><!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->    <pee class=\"p-f18 pb-4 \"><!-- [et_pb_line_break_holder] -->      At Trend, everything we do is about making the world a safer place for exchanging digital information. Thanks for joining us, and stay safe online!<!-- [et_pb_line_break_holder] -->    <\/pee><!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->       <\/p>\n<hr>\n<p><!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->\t<\/div>\n<p><!-- [et_pb_line_break_holder] --><\/div>\n<p>[\/et_pb_code][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<style><!-- [et_pb_line_break_holder] -->.transcript-toggle {<!-- [et_pb_line_break_holder] -->  border: 1px solid #ccc;<!-- [et_pb_line_break_holder] -->  border-radius: 6px;<!-- [et_pb_line_break_holder] -->  padding: 1rem;<!-- [et_pb_line_break_holder] -->  margin-top: 2rem;<!-- [et_pb_line_break_holder] -->  background: #f9f9f9;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->.transcript-toggle summary {<!-- [et_pb_line_break_holder] -->  cursor: pointer;<!-- [et_pb_line_break_holder] -->  list-style: none;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->.transcript-toggle summary h2 {<!-- [et_pb_line_break_holder] -->  font-size: 1.25rem;<!-- [et_pb_line_break_holder] -->  margin: 0;<!-- [et_pb_line_break_holder] -->  display: flex;<!-- [et_pb_line_break_holder] -->  align-items: center;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->.transcript-toggle summary::-webkit-details-marker {<!-- [et_pb_line_break_holder] -->  display: none;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->.webinar-transcript {<!-- [et_pb_line_break_holder] -->  margin-top: 1rem;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->.transcript-entry {<!-- [et_pb_line_break_holder] -->  margin-bottom: 1rem;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->.timestamp {<!-- [et_pb_line_break_holder] -->  font-weight: bold;<!-- [et_pb_line_break_holder] -->  color: #555;<!-- [et_pb_line_break_holder] -->  margin-bottom: 0.2rem;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->.transcript-text {<!-- [et_pb_line_break_holder] -->  margin: 0;<!-- [et_pb_line_break_holder] -->  line-height: 1.6;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><\/style>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><\/p>\n<div class=\"row d-none\"><!-- [et_pb_line_break_holder] -->  <\/p>\n<div class=\"col-12 col-lg-10 offset-lg-1\"><!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->    <\/p>\n<details class=\"transcript-toggle\"> <!-- [et_pb_line_break_holder] -->    <\/p>\n<summary> <!-- [et_pb_line_break_holder] -->        <\/p>\n<h2 class=\"interstate mt-1\">Full Transcript<\/h2>\n<p> <!-- [et_pb_line_break_holder] -->    <\/summary>\n<p> <!-- [et_pb_line_break_holder] -->       <!-- [et_pb_line_break_holder] -->    <\/p>\n<div class=\"webinar-transcript p-f16\"> <!-- [et_pb_line_break_holder] -->      <pee><strong>Speakers:<\/strong><\/pee><!-- [et_pb_line_break_holder] -->        <\/p>\n<ul><!-- [et_pb_line_break_holder] -->            <\/p>\n<li>Marike Kuyper (Trend Micro)<\/li>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<li>Eva Velasquez (Identity Theft Resource Center) <\/li>\n<p><!-- [et_pb_line_break_holder] -->        <\/ul>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[00:00]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> All right. Welcome to Trend Micro&#8217;s Spotlight Session where we aim to shine a revealing light on the hidden dangers lurking in today&#8217;s digital world. In each of these sessions, we&#8217;re bringing together leading voices from cybersecurity, law enforcement, government, and advocacy organizations to share real-world insights and practical tips. My name is Marike Kuyper, and I&#8217;m part of the consumer education team at Trend Micro. Today we&#8217;re joined by Eva Velasquez, CEO of the Identity Theft Resource Center, also known as the ITRC. They&#8217;re a nonprofit dedicated to reducing the risk and impact of identity theft by offering free personalized victim assistance. They also conduct in-depth research, advocate for stronger policies, and develop educational materials to help everyone stay informed and protected. Eva, welcome to our Spotlight Session.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[01:17]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> I am so happy to be here. I can&#8217;t wait to dig in.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[01:20]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> Eva, you spent years at the District Attorney&#8217;s office and the Better Business Bureau, and now you&#8217;re leading the ITRC. What first drew you to consumer protection and identity crime prevention?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[01:34]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> Well, thank you for being so kind and saying years\u2014it was decades. I spent decades at the DA&#8217;s office, and it was where I started my career. I was in the fraud department, and there were a couple of pieces there. The first one is just that the puzzle pieces of putting together what was happening was very appealing to me. But once I realized how few resources we have for this crime type, that was when I was absolutely bit by the bug. It&#8217;s such an important issue. And when you look at consumer protection on the whole, that is something that affects everybody. This is not a niche problem. So it was a combination of so many problems to solve, mysteries to solve, and so many people to help that I just was like\u2014I love working with fraud and identity crimes, and identity crimes very broadly: identity theft, misuse, scams, fraud, cybercrime\u2014all of those pieces.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[02:42]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> So for viewers who may not actually be familiar, can you explain what identity theft actually is, what it can look like for victims, and also how the ITRC helps them?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[02:54]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> Well, identity theft and misuse really is sort of a two-part equation. So we have identity theft\u2014the stealing of your identity credentials, the information that&#8217;s needed to prove that you are you. You do that in your everyday life, when you want to apply for a credit card or log into an account, or even open a new account. Someone with that information can pretend to be you. And that&#8217;s where the misuse comes in. So theft\u2014the stealing of those credentials, and misuse\u2014the actual use of them for some kind of gain, usually monetary gain. But it can be other things, like getting more data. Victims find out about this in a variety of ways. I think a lot of people think it&#8217;s always just credit cards, something to do with financial instruments. And while it&#8217;s true that that is often the end goal, you can have financial gain without just opening a credit card in someone&#8217;s name. You can get medical goods or services, prescriptions, or apply for government benefits in someone&#8217;s name\u2014like unemployment. We saw a huge spike in fraudulent unemployment claims during the pandemic. So again, there are so many ways that your identity can be misused. Think about all the ways that you use it legitimately, and that is the number of ways it can be misused if those credentials are in the wrong hands. And we at the ITRC help people with direct one-on-one assistance\u2014whether it&#8217;s recovery assistance because they have discovered that they are a victim, or consumer education if they need help making a decision. I love that we help with this issue across the entire spectrum, no matter where that person is on their journey. Are they a concerned consumer just looking for general information? Have they encountered something that they need help with right now and need to make a decision? Or are they saying, &#8220;Oh, I did something, I made a mistake, or this thing happened to me, and now I need recovery help&#8221;? And we can help them all along the way\u2014and it&#8217;s all at no cost to them.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[05:10]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> That&#8217;s fantastic. So you&#8217;re really supporting them from raising awareness all the way through to recovery. If it happens, do you think you could give us some examples of what scammers rely on most? Would it be phishing emails, stolen mail, or data breaches? What&#8217;s the most common thing that you see?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[05:30]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> Well, I&#8217;m both biased and the data shifts. I&#8217;m biased because we at the ITRC have maintained the largest repository of publicly reported data breaches since 2005, and data breaches really are fueling identity crimes. At the same time, whenever there are new tools introduced or external events that scammers want to exploit, you&#8217;re going to see that ebb and flow. So, data breaches\u2014I think\u2014is number one. Phishing\u2014oh my gosh! Phishing and social engineering. With AI coming into the mix, the bar for entry for someone to perpetrate these scams is incredibly low. But then I also don&#8217;t want to forget about things we hear about every day\u2014that analog type of stealing and misuse. You&#8217;ve got a relative that has access to your credentials. Maybe someone stole your mail. Maybe it&#8217;s a roommate. We talk with foster youth, who unfortunately have their credentials really out in the wild\u2014in local government databases, with biological parents, multiple foster families. So there&#8217;s both analog and digital. Digital by far has the broader scope and scale, but analog still happens.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[07:03]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> So for these data breaches that you mentioned\u2014they seem really constant these days. I know I&#8217;m constantly getting letters in the mail saying my data has been breached from a company. In your opinion, are companies really keeping our data safe, or is the current climate of deregulation making it harder to protect consumers?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[07:24]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> You know, as far as companies keeping it safe, it&#8217;s really hard to make a broad statement. I think some companies are doing their best. They really are following all of the best practices, meeting more than the minimum standards\u2014but it only takes one vulnerability. I always think about the velociraptors\u2014taking you back to Jurassic Park\u2014how they tested the fences for weakness. That&#8217;s all they did all day long, and they were just waiting for that five-minute moment when the power was out. That&#8217;s what the scammers are doing. They&#8217;re testing for those weaknesses. At the same time, I think for the deregulation question\u2014the jury&#8217;s out. I don&#8217;t think we&#8217;re seeing the results of that yet. We are definitely continuing to see a lot of breaches this year, which I&#8217;m very surprised by. We had a record year. We&#8217;ve seen a new baseline over the last couple of years. The normal trend has been you\u2019ll have a peak, then it dips\u2014not crashes, but dips a little\u2014because the bad actors are busy monetizing that data. Then in a year or two or three, they come back. They need a refresh of that data.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[08:48]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> Feels like millions of accounts at a time sometimes, right?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[08:51]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> Oh, good!<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[08:51]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> That\u2019s a lot of information.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[08:53]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> They&#8217;re looking for all of that data, and then they monetize it. It&#8217;s cyclical, but I think the cycle is shifting a little bit. Too early to tell exactly what it&#8217;s going to be, but it&#8217;s something we&#8217;re keeping an eye on.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[09:05]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> And if you&#8217;re one of the folks listening who has had your information stolen in a data breach\u2014what should you do? If I get that notification, how soon should I act, and what kind of action should I take?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[09:20]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> I always tell people: react, don&#8217;t panic. I don&#8217;t want people having a panic attack or great anxiety, but I also don&#8217;t want them to shove the notice in a drawer and say, \u201cI&#8217;ll get to that later.\u201d Take a look at the notice. Make sure you understand specifically what data was breached. Not all breaches are created equal, and the way you remediate or recover from a breach is very different depending on what data was compromised. If your Social Security number and other information was compromised that would allow a thief to open new lines of credit, then I&#8217;m going to tell you\u2014freeze your credit right away. That&#8217;s your first step if it\u2019s not already frozen. Conversely, if your username and password were breached, I&#8217;m going to tell you\u2014change your password. Upgrade your password game. So it&#8217;s really important to know specifically what type of data was breached. And if you can&#8217;t tell from the breach notice, then I encourage people to contact the company. It\u2019s their responsibility to be transparent and give people the information they need so they can act accordingly.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[10:43]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> So it sounds like\u2014take a moment to take some inventory of what was lost. Figure out what was compromised. Contact them if you don\u2019t know what kind of information they had about you. You mentioned freezing credit. Can you quickly explain what that means, for those who don&#8217;t know?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[11:00]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> It\u2019s the most proactive and robust consumer protection step available to us. It allows you to take your credit profile\u2014the one lenders use to determine if they&#8217;ll extend credit\u2014and freeze it so no one else has access to it except for you and the organizations you already have a relationship with. So if a thief has all of your data and tries to apply for a credit card, it can&#8217;t go through because your credit needs to be thawed. It\u2019s a really easy process now. It used to be very cumbersome. And in fact, I love that we&#8217;re talking about this because we just received a donation of a tool called Frozen Pii. It was developed by a longtime partner of ours, Tom O&#8217;Malley, and he donated it to the ITRC. We&#8217;re now powering it. It&#8217;s a one-stop shop for people to come and get the information they need to freeze their credit. The links to the different bureaus are right there. We even have a page with all the specialty bureaus, because many people don&#8217;t realize how many there are.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[12:22]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> In the U.S., there are three main bureaus. In Canada, I believe there are two. And unfortunately, credit freezing isn\u2019t necessarily available globally, but I know for the United States, it\u2019s available in all 50 states.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[12:39]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> It is.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[12:41]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> That\u2019s wonderful. So, coming back to the data breaches\u2014many viewers tuning in may be small business owners or entrusted with handling customer data. What are some of the biggest risks they should be aware of, and how can they proactively safeguard themselves and their customers?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[13:03]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> I usually tell the small business owners I interact with to treat their business the same way they treat their individual identity. Do things like checking your business credit profile regularly\u2014you can do that on Dun &#038; Bradstreet, but also through the major three bureaus. Sign up for alerts for your business credit cards and bank accounts. Review the business&#8217;s public records for any unauthorized changes. And as far as protecting their customers\u2014train your staff. That is often the weakest link. I say this not to be pejorative\u2014it\u2019s just reality. We&#8217;re all being deluged with phishing and scam attempts. Your staff are consumers too. So, good training and creating a culture of cybersecurity, data protection, privacy, and data minimization needs to come from the top down. Have strong policies to safeguard customer data. When it comes to data collection\u2014if you don\u2019t need it, don\u2019t collect it, because if you don\u2019t have it, it can\u2019t be stolen.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[14:14]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> I mean\u2014<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[14:15]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> And then retention and disposal. Know there are many things that come with collecting data, and it\u2019s important to follow best practices.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[14:28]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> Does the ITRC actually offer any resources\u2014or do you know of resources\u2014specifically tailored to small businesses or startups that you could point them toward?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[14:36]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> We do offer solutions for small businesses. We have a lot of free resources, and we also have paid resources. We use the money from those paid services to fund our free services for individuals. So not only are businesses getting the great information they need at a very reasonable price\u2014we&#8217;re not looking to make a profit\u2014but they\u2019re also supporting a nonprofit that&#8217;s trying to do good in the world.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[15:12]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> That&#8217;s fantastic\u2014good information for the small business owners listening in. These days, we\u2019re seeing that scams are often AI-powered. Do you think AI is changing the game for scammers and identity thieves? And how can consumers protect themselves as these tools become more sophisticated?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[15:38]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> I do think AI has changed the game 1,000%. It\u2019s no longer possible for individuals to tell\u2014just by appearance\u2014if something is legitimate. Ten years ago, we used to train people to spot fake emails by grammar errors, fuzzy logos, or syntax issues. Some of that still exists, but the level of perfection and sophistication in phishing emails, texts, and fake websites now is astounding. I tell people: it\u2019s impossible to tell. So, go to the source and verify. Especially if you didn\u2019t initiate the contact\u2014whether it\u2019s an email, text, phone call, or social media DM\u2014don\u2019t engage on that platform. Go directly to the source. It\u2019s universal advice. It applies across every platform. If there\u2019s one thing folks remember today, it\u2019s this: go to the source and verify.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[16:59]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> That\u2019s great advice\u2014absolutely. And as you mentioned earlier, it\u2019s not just about credit cards. Identity theft can have fallout across many areas\u2014medical, reputational, and more. What kinds of non-financial consequences do you see most often, and how do you help victims recover?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[17:25]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> When it comes to non-financial consequences, it\u2019s twofold: the domino effect and the emotional impact. With the domino effect, if someone has their identity misused and they\u2019re trying to prove who they are, it can stop them from moving forward. It could be a young person trying to get student loans or someone applying for a job, promotion, or security clearance\u2014or even trying to rent an apartment. Then there\u2019s the emotional impact. Our data shows people lose trust, feel shame and embarrassment. Some even feel suicidal\u2014which is far too common. That emotional toll can make people disengage. They don\u2019t want to tell anyone or ask for help, and their recovery stalls. That\u2019s where we come in. We provide one-on-one recovery plans. What I love about our organization is that we help with immediate needs but also provide educational materials and guides to protect them in the future. We take our time. You get a case manager. You move at your own pace. We want people to feel empowered. Even after going through this, they know they can get back up\u2014and that they\u2019re not alone.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[19:32]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> That&#8217;s fantastic. It sounds like your support isn&#8217;t just a one-time phone call. Recovery takes time, and you&#8217;re there to help at different stages.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[19:47]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> Exactly. We have to help the individual. They\u2019ll have different needs, and we meet them where they are. If it takes an hour or two\u2014fine. If it takes five minutes\u2014also fine. They dictate how we help them. We offer expert advice and create a really nice synergy.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[20:17]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> We\u2019ve heard from other guests that underreporting is real\u2014many victims don\u2019t come forward. Do you have any statistics, or a message for people about overcoming the stigma and seeking help sooner?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[20:37]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> It&#8217;s hard to get data around a non-event\u2014someone not reporting. But we know from experience that people aren\u2019t coming forward. There\u2019s a sense of shame and embarrassment. Everyone has a role to play\u2014not just the person experiencing it. We need to convey that there\u2019s nothing to be ashamed of. I often tell victims, if you fell and broke your leg, you wouldn\u2019t be mad that you couldn\u2019t set your own bone\u2014you\u2019d go to a doctor. Same thing here: it&#8217;s beyond your skill set. Get help. And I think folks in this space\u2014like us\u2014and the media have an obligation in how we talk about victims. I still see language like \u201cduped,\u201d \u201cfell for it,\u201d or \u201chow could they not see that?\u201d That adds to the shame. Even if it\u2019s not said aloud, people feel it. Especially with seniors, we need to be careful. Many fear that if they make a financial mistake, their loved ones will think they\u2019re no longer capable of managing their own affairs. And while cognitive decline is real, we can\u2019t treat scam victimization as a litmus test for capability. People need to know it\u2019s okay to make a mistake and ask for help.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[23:02]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> Do you have a sense of the real demographics of identity theft victims? Is it all ages and backgrounds?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[23:20]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> Oh my gosh\u2014yes. You\u2019re hitting on one of the things I constantly try to get across. I hear all the time: \u201cWho\u2019s most vulnerable? Seniors, right?\u201d Or, \u201cIt\u2019s Gen Alpha or Gen Z.\u201d No\u2014everybody is vulnerable. Just differently. It\u2019s not about age\u2014it\u2019s how you engage with the world, especially digitally. If you look at the data from us, the FTC, IC3\u2014any given year you\u2019ll see a slightly higher reporting rate from one group, like 35\u201344-year-olds. That\u2019s a fact. But the difference between age groups is maybe 1\u20132%. Aside from the very young and very old, we\u2019re all pretty equally vulnerable.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[24:47]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> Yeah, I\u2019ve heard it said: it\u2019s not if you\u2019ll be scammed, but when.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[24:58]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> Exactly. Everyone is being targeted. Even me\u2014I\u2019m not immune. Given the right set of circumstances, I could believe a scam. If it&#8217;s from a vendor I know, I\u2019m distracted, making dinner, talking to my kids, dog underfoot\u2014it\u2019s easy to miss something. I might click on a link. That doesn\u2019t make me gullible. It makes me human.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[26:02]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> Yes! Even people in cybersecurity have told me they\u2019ve fallen for scams. We can have good habits, use software tools, and still fall for something.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[26:35]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> There are those velociraptors again\u2014testing the fence. We&#8217;re the fence.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[26:42]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> So is there one practice\u2014or a couple of practices\u2014you recommend? You talked about credit freezes. Is there anything else that everyone should be adopting right now to reduce their risk and secure their &#8220;fence&#8221; from identity theft?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[26:58]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> There are a number of things people can do. I always encourage people to practice good identity and cyber hygiene. Think of it like maintaining your health\u2014your doctor wouldn\u2019t just say \u201cbrush your teeth\u201d and leave it at that. They\u2019d say: get enough sleep, eat right, exercise. It\u2019s the same here. These small habits add up. Where do we start? The big three: First, freeze your credit, which we already talked about. Second, update your password game. Please use unique passwords across all of your accounts. Don\u2019t use the same easy password. Use unique passwords that are 12 characters or longer. It can be a passphrase. Just don\u2019t use a single dictionary word\u2014it can be cracked in less than a second. If a password manager is intuitive to you, use one\u2014even if you have to pay for it. For seniors, it\u2019s okay to write them down, with some caveats. Don\u2019t keep them in a Word doc or on your phone. Use a notepad in a secure place at home. That\u2019s much better than using the same password across all your accounts. Third, enable MFA\u2014multi-factor authentication. I have t-shirts that say \u201cEnable MFA.\u201d It\u2019s that second step that sends you a one-time use token. Even if someone has your username and password, they still can\u2019t get in. Whether it\u2019s a text or an email code\u2014never share it with anyone, no matter how legitimate they sound. That code is only for logging into your account. Better yet, enable passkeys where they\u2019re offered. You don\u2019t have to remember anything, and it reduces that vulnerability. It\u2019s not a silver bullet, but it solves that issue very well.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[28:47]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> Yeah, we hear that people can have upwards of 150 online accounts\u2014retailers, ticketing, flights, hotels, email\u2014and you want to keep those passwords updated due to breaches. That\u2019s a lot to manage. If you don\u2019t have a system or tool, it\u2019s overwhelming. I think that\u2019s why people default to reusing simple passwords they can remember.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[29:28]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> There\u2019s good news on that front. And the last item in our top three is MFA, like I mentioned. Enable it. That one-time use code\u2014whether by text or email\u2014adds a strong layer of protection. And again, don\u2019t share it with anyone. Better yet, use passkeys. We\u2019re seeing wide adoption, and I think it\u2019s promising. It doesn\u2019t solve every identity problem, but it solves that one very well.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[30:46]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> That&#8217;s wonderful advice. One thing I noticed about the ITRC is that you&#8217;re also advocating for better policies. Would you like to see more collaboration between government bodies, nonprofits, or tech companies? What\u2019s missing from the broader conversation?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[31:08]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> We\u2019d absolutely like to see more collaboration. I want to see NGOs and nonprofits working more closely with all stakeholders. Nonprofits fill the gaps between what government provides and what the private sector sells. There are great products out there\u2014but if there were a business case to offer free identity recovery services, someone would have done it. It&#8217;s not profitable. That\u2019s why nonprofits exist. And the gap is becoming a chasm. I want to see more acknowledgment from government about how serious this problem is. Not just in prevention and detection\u2014we\u2019re involved in those conversations and want more of them\u2014but also in recovery. Until we create a perfect system where no one is victimized, we need more robust recovery services. People need our services\u2014and other services, like peer support. But many criminal justice programs won\u2019t fund those unless the victimization was violent. That needs to change. We need to rethink both public and private policies to reduce victimization rates and mitigate the impact when it happens.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[32:57]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> Okay\u2014<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[32:57]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> \u2014policies that ensure we reduce the number of victims and minimize the impact when someone is targeted.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[33:06]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> We spoke to a member of law enforcement in our last session who said we shouldn\u2019t treat victims of cybercrime any differently than a stabbing victim. One is physical, one is digital\u2014but the fallout can be just as damaging.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[33:30]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> Oh, I love him. I want to work with him! We actually do a lot of support programs for law enforcement. Our live chat is embedded on numerous local LEA and state websites\u2014like the New Mexico Attorney General\u2019s site. We get referrals from the FTC. We love working with law enforcement. They focus on their piece\u2014investigation, finding the bad guy. That\u2019s what they do, and I know that, because I used to do that. We focus on recovery. We have dozens of collaborative partnerships across the country. When law enforcement hands a victim a police report, they refer them to us so we can support them\u2014because they don\u2019t always have the resources to do that follow-up.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[34:34]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> I&#8217;m sure they\u2019re grateful you exist\u2014and I know victims are too. You&#8217;ve been at the forefront of this fight for a long time. What keeps you personally motivated? Is there a success story that stands out?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[34:52]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> I love our stories. One that stands out is a woman who was about to be scammed by a government and bank impersonator. She was about to move all the money from her 401(k)\u2014hundreds of thousands of dollars. Her provider got suspicious and started putting up barriers, asking for more information. That slowed things down. She contacted us. We told her it was a scam. She\u2019d been told not to trust her provider\u2014it was supposedly an insider job. Very clever scam. But we convinced her otherwise. She never moved the money. She didn\u2019t lose it. She came very close\u2014but she didn\u2019t lose it. That kind of story reminds us why we do what we do. But honestly, it\u2019s not just one compelling story\u2014it\u2019s the hundreds of thousands of stories over the past 12 years. We just did our annual report\u2014it\u2019s nearly 2 million people we\u2019ve helped in the last two years.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[36:32]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> Massive numbers!<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[36:34]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> Exactly. And when I think about that\u2014it\u2019s what keeps me going. If not us, then who? I don\u2019t know who would step in. I don\u2019t want to leave that gap. This work has purpose. It\u2019s also intellectually stimulating\u2014because as much as I hate the bad guys, they are a crafty lot.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[37:07]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> They keep us all on our toes. So, for those who want immediate help or want to learn more about preventing identity theft, what resource should they visit? Would you like to share your website so people can find support?<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[37:24]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> Sure. For those who want information, go to our website: idtheftcenter.org. That\u2019s I-D-theftcenter-dot-org. If you need immediate help, you can live chat with us on the site\u2014or call our toll-free number: 888-400-5530.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[37:55]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> Eva, thank you so much for sharing your expertise. We really appreciate the important work the ITRC is doing to support identity theft victims and raise awareness. And thank you to our viewers for joining us. Stay tuned for our next session, where we\u2019ll dive into more global perspectives on online safety.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[38:16]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Eva:<\/strong> Thanks, everybody. It was a pleasure.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<div class=\"transcript-entry\"><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"timestamp mb-0 pb-0\">[38:18]<\/div>\n<p><!-- [et_pb_line_break_holder] -->            <\/p>\n<div class=\"transcript-text\"><strong>Marike:<\/strong> Take care! Bye-bye.<\/div>\n<p><!-- [et_pb_line_break_holder] -->        <\/div>\n<p><!-- [et_pb_line_break_holder] -->    <\/div>\n<p><!-- [et_pb_line_break_holder] --><\/details>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] --><\/div>\n<p>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Get Involved&#8221; _builder_version=&#8221;4.27.4&#8243; background_color=&#8221;#f7f9f9&#8243; background_image=&#8221;\/internet-safety\/wp-content\/uploads\/2021\/05\/charity-13.png&#8221; parallax=&#8221;on&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;30px|0px|140px|0px|false|false&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; custom_width_px__hover=&#8221;1080px&#8221; custom_width_px__hover_enabled=&#8221;1080px&#8221; custom_width_percent__hover=&#8221;80%&#8221; custom_width_percent__hover_enabled=&#8221;80%&#8221; locked=&#8221;off&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; gutter_width__hover=&#8221;3&#8243; gutter_width__hover_enabled=&#8221;3&#8243; parallax_1__hover=&#8221;off&#8221; parallax_1__hover_enabled=&#8221;off&#8221; parallax_2__hover=&#8221;off&#8221; parallax_2__hover_enabled=&#8221;off&#8221; parallax_3__hover=&#8221;off&#8221; parallax_3__hover_enabled=&#8221;off&#8221; parallax_method_1__hover=&#8221;on&#8221; parallax_method_1__hover_enabled=&#8221;on&#8221; parallax_method_2__hover=&#8221;on&#8221; parallax_method_2__hover_enabled=&#8221;on&#8221; parallax_method_3__hover=&#8221;on&#8221; parallax_method_3__hover_enabled=&#8221;on&#8221; use_background_color_gradient__hover=&#8221;off&#8221; use_background_color_gradient__hover_enabled=&#8221;off&#8221; background_color_gradient_start__hover=&#8221;#2b87da&#8221; background_color_gradient_start__hover_enabled=&#8221;#2b87da&#8221; background_color_gradient_end__hover=&#8221;#29c4a9&#8243; background_color_gradient_end__hover_enabled=&#8221;#29c4a9&#8243; background_color_gradient_type__hover=&#8221;linear&#8221; background_color_gradient_type__hover_enabled=&#8221;linear&#8221; background_color_gradient_direction__hover=&#8221;180deg&#8221; background_color_gradient_direction__hover_enabled=&#8221;180deg&#8221; background_color_gradient_direction_radial__hover=&#8221;center&#8221; background_color_gradient_direction_radial__hover_enabled=&#8221;center&#8221; background_color_gradient_start_position__hover=&#8221;0%&#8221; background_color_gradient_start_position__hover_enabled=&#8221;0%&#8221; background_color_gradient_end_position__hover=&#8221;100%&#8221; background_color_gradient_end_position__hover_enabled=&#8221;100%&#8221; background_color_gradient_overlays_image__hover=&#8221;off&#8221; background_color_gradient_overlays_image__hover_enabled=&#8221;off&#8221; parallax__hover=&#8221;off&#8221; parallax__hover_enabled=&#8221;off&#8221; parallax_method__hover=&#8221;on&#8221; parallax_method__hover_enabled=&#8221;on&#8221; background_size__hover=&#8221;cover&#8221; background_size__hover_enabled=&#8221;cover&#8221; background_position__hover=&#8221;center&#8221; background_position__hover_enabled=&#8221;center&#8221; background_repeat__hover=&#8221;no-repeat&#8221; background_repeat__hover_enabled=&#8221;no-repeat&#8221; background_blend__hover=&#8221;normal&#8221; background_blend__hover_enabled=&#8221;normal&#8221; allow_player_pause__hover=&#8221;off&#8221; allow_player_pause__hover_enabled=&#8221;off&#8221; background_video_pause_outside_viewport__hover=&#8221;on&#8221; background_video_pause_outside_viewport__hover_enabled=&#8221;on&#8221; inner_shadow__hover=&#8221;off&#8221; inner_shadow__hover_enabled=&#8221;off&#8221; make_fullwidth__hover=&#8221;off&#8221; make_fullwidth__hover_enabled=&#8221;off&#8221; use_custom_width__hover=&#8221;off&#8221; use_custom_width__hover_enabled=&#8221;off&#8221; width_unit__hover=&#8221;on&#8221; width_unit__hover_enabled=&#8221;on&#8221; make_equal__hover=&#8221;off&#8221; make_equal__hover_enabled=&#8221;off&#8221; use_custom_gutter__hover=&#8221;off&#8221; use_custom_gutter__hover_enabled=&#8221;off&#8221; border_radii__hover=&#8221;on||||&#8221; border_radii__hover_enabled=&#8221;on||||&#8221; box_shadow_style__hover=&#8221;none&#8221; box_shadow_style__hover_enabled=&#8221;none&#8221; box_shadow_color__hover=&#8221;rgba(0,0,0,0.3)&#8221; box_shadow_color__hover_enabled=&#8221;rgba(0,0,0,0.3)&#8221; max_width__hover=&#8221;100%&#8221; max_width__hover_enabled=&#8221;100%&#8221; filter_hue_rotate__hover=&#8221;0deg&#8221; filter_hue_rotate__hover_enabled=&#8221;0deg&#8221; filter_saturate__hover=&#8221;100%&#8221; filter_saturate__hover_enabled=&#8221;100%&#8221; filter_brightness__hover=&#8221;100%&#8221; filter_brightness__hover_enabled=&#8221;100%&#8221; filter_contrast__hover=&#8221;100%&#8221; filter_contrast__hover_enabled=&#8221;100%&#8221; filter_invert__hover=&#8221;0%&#8221; filter_invert__hover_enabled=&#8221;0%&#8221; filter_sepia__hover=&#8221;0%&#8221; filter_sepia__hover_enabled=&#8221;0%&#8221; filter_opacity__hover=&#8221;100%&#8221; filter_opacity__hover_enabled=&#8221;100%&#8221; filter_blur__hover=&#8221;0px&#8221; filter_blur__hover_enabled=&#8221;0px&#8221; mix_blend_mode__hover=&#8221;normal&#8221; mix_blend_mode__hover_enabled=&#8221;normal&#8221; animation_style__hover=&#8221;none&#8221; animation_style__hover_enabled=&#8221;none&#8221; animation_repeat__hover=&#8221;once&#8221; animation_repeat__hover_enabled=&#8221;once&#8221; animation_direction__hover=&#8221;center&#8221; animation_direction__hover_enabled=&#8221;center&#8221; animation_duration__hover=&#8221;1000ms&#8221; animation_duration__hover_enabled=&#8221;1000ms&#8221; animation_delay__hover=&#8221;0ms&#8221; animation_delay__hover_enabled=&#8221;0ms&#8221; animation_intensity_slide__hover=&#8221;50%&#8221; animation_intensity_slide__hover_enabled=&#8221;50%&#8221; animation_intensity_zoom__hover=&#8221;50%&#8221; animation_intensity_zoom__hover_enabled=&#8221;50%&#8221; animation_intensity_flip__hover=&#8221;50%&#8221; animation_intensity_flip__hover_enabled=&#8221;50%&#8221; animation_intensity_fold__hover=&#8221;50%&#8221; animation_intensity_fold__hover_enabled=&#8221;50%&#8221; animation_intensity_roll__hover=&#8221;50%&#8221; animation_intensity_roll__hover_enabled=&#8221;50%&#8221; animation_starting_opacity__hover=&#8221;0%&#8221; animation_starting_opacity__hover_enabled=&#8221;0%&#8221; animation_speed_curve__hover=&#8221;ease-in-out&#8221; animation_speed_curve__hover_enabled=&#8221;ease-in-out&#8221; hover_transition_duration__hover=&#8221;300ms&#8221; hover_transition_duration__hover_enabled=&#8221;300ms&#8221; hover_transition_delay__hover=&#8221;0ms&#8221; hover_transition_delay__hover_enabled=&#8221;0ms&#8221; hover_transition_speed_curve__hover=&#8221;ease&#8221; hover_transition_speed_curve__hover_enabled=&#8221;ease&#8221; inner_max_width__hover=&#8221;1080px&#8221; inner_max_width__hover_enabled=&#8221;1080px&#8221; background_color_gradient_stops__hover=&#8221;#2b87da 0%|#29c4a9 100%&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.27.4&#8243; background_color=&#8221;#ffffff&#8221; width=&#8221;90%&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; max_width=&#8221;1200px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;|15px||15px|false|true&#8221; custom_padding_tablet=&#8221;50px|10px|0px|10px|false|true&#8221; custom_padding_phone=&#8221;|30px||30px|false|true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;100px&#8221; box_shadow_spread=&#8221;-30px&#8221; box_shadow_color=&#8221;rgba(0,0,0,0.22)&#8221; use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;Faustina||||||||&#8221; text_font_size=&#8221;24px&#8221; text_line_height=&#8221;2em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#26c699&#8243; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Faustina|600|||||||&#8221; header_2_text_color=&#8221;#0e7162&#8243; header_2_font_size=&#8221;42px&#8221; header_2_line_height=&#8221;1.4em&#8221; text_orientation=&#8221;center&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||25px||false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;17px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;22px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; custom_css_main_element=&#8221;font-family:&#8217;Open Sans&#8217;;&#8221; locked=&#8221;off&#8221; inline_fonts=&#8221;Montserrat,Open Sans&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"interstate mb-0 pb-0\" style=\"color: #333 !important;\">Webinar Recordings<\/h2>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||true|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<style><!-- [et_pb_line_break_holder] -->\/* Styling for the container holding the buttons *\/<!-- [et_pb_line_break_holder] -->.webinar-sort-options {<!-- [et_pb_line_break_holder] -->    display: flex;<!-- [et_pb_line_break_holder] -->    gap: 10px; \/* Space between buttons *\/<!-- [et_pb_line_break_holder] -->    margin-bottom: 0; \/* Space below the buttons *\/<!-- [et_pb_line_break_holder] -->    justify-content: center; \/* <<<--- CHANGE THIS LINE *\/<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->\/* ... rest of your button CSS remains the same ... *\/<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->\/* Base styling for the buttons (Inactive state) *\/<!-- [et_pb_line_break_holder] -->.webinar-sort-options button {<!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->    color: #ffffff;           \/* White text for good contrast *\/<!-- [et_pb_line_break_holder] -->    padding: 7px 12px;<!-- [et_pb_line_break_holder] -->    border: none;<!-- [et_pb_line_break_holder] -->    border-radius: 4px;<!-- [et_pb_line_break_holder] -->    cursor: pointer;<!-- [et_pb_line_break_holder] -->    font-size: 11px;<!-- [et_pb_line_break_holder] -->    font-weight: bold;<!-- [et_pb_line_break_holder] -->    text-transform: uppercase;<!-- [et_pb_line_break_holder] -->    letter-spacing: 0.2px;<!-- [et_pb_line_break_holder] -->    transition: background-color 0.3s ease, transform 0.1s ease; \/* Smooth transitions *\/<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->\/* Hover effect for INACTIVE buttons *\/<!-- [et_pb_line_break_holder] -->.webinar-sort-options button:not(.active):hover {<!-- [et_pb_line_break_holder] -->    \/*<!-- [et_pb_line_break_holder] -->    transform: translateY(-1px);  Slight lift effect *\/<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->\/* Style for the currently active\/selected button *\/<!-- [et_pb_line_break_holder] -->.webinar-sort-options button.active {<!-- [et_pb_line_break_holder] -->    <!-- [et_pb_line_break_holder] -->    border: 1px solid #1a1a1a; \/* Slight border for more definition *\/<!-- [et_pb_line_break_holder] -->    cursor: default; \/* Indicates it's already selected *\/<!-- [et_pb_line_break_holder] -->    box-shadow: inset 0 1px 3px rgba(0,0,0,0.2); \/* Slight pressed-in look *\/<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->\/* Hover effect for ACTIVE buttons *\/<!-- [et_pb_line_break_holder] -->.webinar-sort-options button.active:hover {<!-- [et_pb_line_break_holder] -->    background-color: #333 !important; \/* Slightly darker than active color on hover *\/<!-- [et_pb_line_break_holder] -->    transform: none; \/* Remove the lift effect when active and hovered *\/<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><\/style>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><\/p>\n<div class=\"webinar-sort-options\"><!-- [et_pb_line_break_holder] -->    <button id=\"sort-newest\" class=\"btn btn-secondary btn-dark me-2\">Sort by: Newest<\/button><!-- [et_pb_line_break_holder] -->    <button id=\"sort-oldest\" class=\"btn btn-secondary\">Sort by: Oldest<\/button><!-- [et_pb_line_break_holder] --><\/div>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; module_class=&#8221;ss-episode-list&#8221; _builder_version=&#8221;4.27.4&#8243; background_color=&#8221;#ffffff&#8221; width=&#8221;90%&#8221; max_width=&#8221;1200px&#8221; custom_padding=&#8221;30px|80px|30px|80px|true|false&#8221; custom_padding_tablet=&#8221;|30px||30px|false|true&#8221; custom_padding_phone=&#8221;40px|30px||30px||true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;100px&#8221; box_shadow_spread=&#8221;-30px&#8221; box_shadow_color=&#8221;rgba(0,0,0,0.22)&#8221; use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;\/internet-safety\/wp-content\/uploads\/iskf\/older-adults\/spotlight-sessions-banner-myth-reality-scams.webp&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.27.4&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\" mb-0 pb-0\"><span class=\"interstate\" style=\"font-weight: 400;\">Myth vs. Reality: A New Look at Scams and Older Adults<\/span><br \/>\n<span class=\"p-f16\">With guest, Russell Slater, National Council on Aging (NCOA)<\/span><\/h3>\n<p class=\"p-f16\">Recorded: <span class=\"webinar-sort-date\" data-date=\"2025-03-11\">March 11, 2025<\/span><\/p>\n<p class=\"p-f18\"><a href=\"\/internet-safety\/for-adults\/spotlight-sessions\/myth-vs-reality-scams-older-adults\" class=\"btn btn-danger a-cta\">Watch Recording<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; module_class=&#8221;ss-episode-list&#8221; _builder_version=&#8221;4.27.4&#8243; background_color=&#8221;#ffffff&#8221; width=&#8221;90%&#8221; max_width=&#8221;1200px&#8221; custom_padding=&#8221;30px|80px|30px|80px|true|false&#8221; custom_padding_tablet=&#8221;|30px||30px|false|true&#8221; custom_padding_phone=&#8221;40px|30px||30px||true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;100px&#8221; box_shadow_spread=&#8221;-30px&#8221; box_shadow_color=&#8221;rgba(0,0,0,0.22)&#8221; use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;\/internet-safety\/wp-content\/uploads\/iskf\/older-adults\/spotlight-sessions-banner-policing-online-fraud.webp&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.27.4&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\" mb-0 pb-0\"><span class=\"interstate\" style=\"font-weight: 400;\">Hot on the Digital Trail: Policing the Evolving World of Online Fraud<\/span><br \/>\n<span class=\"p-f16\">With guest, Constable Brian Mason, Edmonton Police Service<\/span><\/h3>\n<p class=\"p-f16\">Recorded: <span class=\"webinar-sort-date\" data-date=\"2025-04-14\">April 14, 2025<span><\/p>\n<p class=\"p-f18\"><a href=\"\/internet-safety\/for-adults\/spotlight-sessions\/digital-trail-online-fraud\" class=\"btn btn-danger a-cta\">Watch Recording<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; module_class=&#8221;ss-episode-list&#8221; _builder_version=&#8221;4.27.4&#8243; background_color=&#8221;#ffffff&#8221; width=&#8221;90%&#8221; max_width=&#8221;1200px&#8221; custom_padding=&#8221;30px|80px|30px|80px|true|false&#8221; custom_padding_tablet=&#8221;|30px||30px|false|true&#8221; custom_padding_phone=&#8221;40px|30px||30px||true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;100px&#8221; box_shadow_spread=&#8221;-30px&#8221; box_shadow_color=&#8221;rgba(0,0,0,0.22)&#8221; use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;\/internet-safety\/wp-content\/uploads\/iskf\/older-adults\/spotlight-sessions-banner-modern-identity-theft.webp&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.27.4&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\" mb-0 pb-0\"><span class=\"interstate\" style=\"font-weight: 400;\">Disguised and Dangerous: A Deep Dive into Modern Identity Theft<\/span><br \/>\n<span class=\"p-f16\">With guest, Eva Velasquez, CEO, Identity Theft Resource Center<\/span><\/h3>\n<p class=\"p-f16\">Recorded: <span class=\"webinar-sort-date\" data-date=\"2025-05-07\">May 7, 2025<\/span><\/p>\n<p class=\"p-f18\"><a href=\"\/internet-safety\/for-adults\/spotlight-sessions\/dangerous-modern-identity-theft\" class=\"btn btn-danger a-cta\">Watch Recording<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; module_class=&#8221;ss-episode-list&#8221; _builder_version=&#8221;4.27.4&#8243; background_color=&#8221;#ffffff&#8221; width=&#8221;90%&#8221; max_width=&#8221;1200px&#8221; custom_padding=&#8221;30px|80px|30px|80px|true|false&#8221; custom_padding_tablet=&#8221;|30px||30px|false|true&#8221; custom_padding_phone=&#8221;40px|30px||30px||true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;100px&#8221; box_shadow_spread=&#8221;-30px&#8221; box_shadow_color=&#8221;rgba(0,0,0,0.22)&#8221; use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;\/internet-safety\/wp-content\/uploads\/iskf\/older-adults\/spotlight-sessions-banner-ai-powered-scams.webp&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.27.4&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\" mb-0 pb-0\"><span class=\"interstate\" style=\"font-weight: 400;\">AI Powered Scams: What a Threat Researcher Wants You to Know<\/span><br \/>\n<span class=\"p-f16\">With guest, Ryan Flores, Senior Manager, Forward Looking Threat Research, Trend Micro<\/span><\/h3>\n<p class=\"p-f16\">Recorded: <span class=\"webinar-sort-date\" data-date=\"2025-06-11\">June 11, 2025<\/span><\/p>\n<p class=\"p-f18\"><a href=\"\/internet-safety\/for-adults\/spotlight-sessions\/ai-scams-threat-researcher\" class=\"btn btn-danger a-cta\">Watch Recording<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; module_class=&#8221;ss-episode-list&#8221; _builder_version=&#8221;4.27.4&#8243; background_color=&#8221;#ffffff&#8221; width=&#8221;90%&#8221; max_width=&#8221;1200px&#8221; custom_padding=&#8221;30px|80px|30px|80px|true|false&#8221; custom_padding_tablet=&#8221;|30px||30px|false|true&#8221; custom_padding_phone=&#8221;40px|30px||30px||true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;100px&#8221; box_shadow_spread=&#8221;-30px&#8221; box_shadow_color=&#8221;rgba(0,0,0,0.22)&#8221; use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2025\/07\/spotlight-sessions-meeting-fraudsters.webp&#8221; alt=&#8221;Spotlight Sessions banner: &#8216;Meeting Fraudsters: A Researcher\u2019s Journey Into One Corner of the Scam Landscape'&#8221; title_text=&#8221;spotlight-sessions-meeting-fraudsters&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.27.4&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\" mb-0 pb-0\"><span class=\"interstate\" style=\"font-weight: 400;\">Meeting Fraudsters: A Researcher\u2019s Journey Into One Corner of the Scam Landscape<\/span><br \/>\n<span class=\"p-f16\">With guest, Olivier Beaudet-Labrecque, co-founder of Foreign Swiss and Dean at the Institute of Economic Crime Investigation<\/span><\/h3>\n<p class=\"p-f16\">Recorded: <span class=\"webinar-sort-date\" data-date=\"2025-07-16\">July 16, 2025<\/span><\/p>\n<p class=\"p-f18\"><a href=\"\/internet-safety\/for-adults\/spotlight-sessions\/meeting-fraudsters-scam-landscape\" class=\"btn btn-danger a-cta\">Watch Recording<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; module_class=&#8221;ss-episode-list&#8221; _builder_version=&#8221;4.27.4&#8243; background_color=&#8221;#ffffff&#8221; width=&#8221;90%&#8221; max_width=&#8221;1200px&#8221; custom_padding=&#8221;30px|80px|30px|80px|true|false&#8221; custom_padding_tablet=&#8221;|30px||30px|false|true&#8221; custom_padding_phone=&#8221;40px|30px||30px||true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;100px&#8221; box_shadow_spread=&#8221;-30px&#8221; box_shadow_color=&#8221;rgba(0,0,0,0.22)&#8221; use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2025\/08\/spotlight-sessions-banner-digital-citizens-scams-sextortion-youth-1200&#215;675-1.jpg&#8221; alt=&#8221;Spotlight Sessions banner: &#8216;Raising Digital Citizens: Scams, Sextortion &#038; Empowering Youth in a Connected World'&#8221; title_text=&#8221;spotlight-sessions-banner-digital-citizens-scams-sextortion-youth-1200&#215;675&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.27.4&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\" mb-0 pb-0\"><span class=\"interstate\" style=\"font-weight: 400;\">Raising Digital Citizens: Scams, Sextortion &amp; Empowering Youth in a Connected World<\/span><br \/>\n<span class=\"p-f16\">With guest, Will Gardner, CEO of Childnet<\/span><\/h3>\n<p class=\"p-f16\">Recorded: <span class=\"webinar-sort-date\" data-date=\"2025-08-05\">August 5, 2025<\/span><\/p>\n<p class=\"p-f18\"><a href=\"\/internet-safety\/for-adults\/spotlight-sessions\/digital-citizens-scams-sextortion-youth-safety\" class=\"btn btn-danger a-cta\">Watch Recording<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; module_class=&#8221;ss-episode-list&#8221; _builder_version=&#8221;4.27.4&#8243; background_color=&#8221;#ffffff&#8221; width=&#8221;90%&#8221; max_width=&#8221;1200px&#8221; custom_padding=&#8221;30px|80px|30px|80px|true|false&#8221; custom_padding_tablet=&#8221;|30px||30px|false|true&#8221; custom_padding_phone=&#8221;40px|30px||30px||true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;100px&#8221; box_shadow_spread=&#8221;-30px&#8221; box_shadow_color=&#8221;rgba(0,0,0,0.22)&#8221; use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2025\/09\/spotlight-sessions-banner-fighting-fraud-ftc-1200&#215;675-1.jpg&#8221; alt=&#8221;Spotlight Sessions banner: &#8216;Fighting Fraud: Inside the FTC\u2019s Mission to Protect Consumers'&#8221; title_text=&#8221;spotlight-sessions-banner-fighting-fraud-ftc-1200&#215;675&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.27.4&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\" mb-0 pb-0\"><span class=\"interstate\" style=\"font-weight: 400;\">Fighting Fraud: Inside the FTC\u2019s Mission to Protect Consumers<\/span><br \/>\n<span class=\"p-f16\">With guests:<\/span><\/h3>\n<ul class=\"p-f16 mb-0 px-0\">\n<li class=\"mb-3\" style=\"list-style: none; line-height: 1.4em;font-weight:600;\">Karen S. Hobbs<br \/>\n<span style=\"font-weight: normal;\">Assistant Director, Division of Consumer and Business Education<br \/>\nFederal Trade Commission<\/span><\/li>\n<li class=\"mb-3\" style=\"list-style: none; line-height: 1.4em;font-weight:600;\">Nicholas Mastrocinque<br \/>\n<span style=\"font-weight: normal;\">Consumer Sentinel Attorney and Manager<br \/>\nFederal Trade Commission <\/span><\/li>\n<li style=\"list-style: none; line-height: 1.4em;font-weight:600;\">Patti Poss<br \/>\n<span style=\"font-weight: normal;\">Senior Attorney<br \/>\nFederal Trade Commission <\/span><\/li>\n<\/ul>\n<p class=\"p-f16\">Recorded: <span class=\"webinar-sort-date\" data-date=\"2025-09-10\">September 10, 2025<\/span><\/p>\n<p class=\"p-f18\"><a href=\"\/internet-safety\/for-adults\/spotlight-sessions\/fighting-fraud-ftc\" class=\"btn btn-danger a-cta\">Watch Recording<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; module_class=&#8221;ss-episode-list&#8221; _builder_version=&#8221;4.27.4&#8243; background_color=&#8221;#ffffff&#8221; width=&#8221;90%&#8221; max_width=&#8221;1200px&#8221; custom_padding=&#8221;30px|80px|30px|80px|true|false&#8221; custom_padding_tablet=&#8221;|30px||30px|false|true&#8221; custom_padding_phone=&#8221;40px|30px||30px||true&#8221; hover_enabled=&#8221;0&#8243; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;100px&#8221; box_shadow_spread=&#8221;-30px&#8221; box_shadow_color=&#8221;rgba(0,0,0,0.22)&#8221; use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2025\/10\/spotlight-sessions-banner-australia-antiscam-centre-1024&#215;576-1.webp&#8221; alt=&#8221;Spotlight Sessions banner: &#8216;Scam Trends &#038; Action: Insights from Australia\u2019s National Anti-Scam Centre'&#8221; title_text=&#8221;spotlight-sessions-banner-australia-antiscam-centre-1024&#215;576&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.27.4&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3 class=\" mb-0 pb-0\"><span class=\"interstate\" style=\"font-weight: 400;\">Scam Trends &amp; Action: Insights from Australia\u2019s National Anti-Scam Centre<\/span><br \/>\n<span class=\"p-f16\">With guest, Jayde Richmond, General Manager, Australian Competition and Consumer Commission\u2019s National Anti-Scam Centre <\/span><\/h3>\n<p class=\"p-f16\">Recorded: <span class=\"webinar-sort-date\" data-date=\"2025-10-08\">October 8, 2025<\/span><\/p>\n<p class=\"p-f18\"><a href=\"\/internet-safety\/for-adults\/spotlight-sessions\/scam-trends-australia\" class=\"btn btn-danger a-cta\">Watch Recording<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;next-episode&#8221; _builder_version=&#8221;4.27.4&#8243; background_color=&#8221;#ffffff&#8221; width=&#8221;90%&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1200px&#8221; custom_padding=&#8221;0||10px||false|false&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;100px&#8221; box_shadow_spread=&#8221;-30px&#8221; box_shadow_color=&#8221;rgba(0,0,0,0.22)&#8221; use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;#eeeeee 0%|#f7f9f9 100%&#8221; background_color_gradient_start=&#8221;#eeeeee&#8221; background_color_gradient_end=&#8221;#f7f9f9&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<div class=\"iskf-footer\">\r\n    <div class=\"row\">\r\n<div class=\"col-xs-12 col-sm-12 col-md-6 col-lg-4\">\r\n\r\n<label for=\"select-lang\" class=\"form-label\" id=\"footer-lang\"><i class=\"fas fa-globe\"><\/i> <span class=\"text\">Select language<\/span><\/label>\r\n<select class=\"form-select form-select-sm\" id=\"select-lang\" aria-label=\"Select language\">\r\n  <option class=\"ar-sa\" name=\"ar-sa\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/ar-sa\">\u0627\u0644\u0639\u0631\u0628\u064a\u0629 (\ufe8d\ufedf\ufeb4\ufecc\ufeee\ufea9\ufef3\ufe94)<\/option>\r\n  <option class=\"en-us\" name=\"en-us\" value=\"https:\/\/www.trendmicro.com\/internet-safety\">English (United States)<\/option>\r\n  <option class=\"en-hk\" name=\"en-hk\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/en-hk\">English (Hong Kong)<\/option>\r\n  <option class=\"cs\" name=\"cs\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/cs\">\u010ce\u0161tina (\u010cR)<\/option>\r\n  <option class=\"zh-tw\" name=\"zh-tw\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/zh-tw\">\u7e41\u9ad4\u4e2d\u6587 (\u53f0\u7063)<\/option>\r\n  <option class=\"zh-hk\" name=\"zh-hk\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/zh-hk\">\u7e41\u9ad4\u4e2d\u6587 (\u9999\u6e2f)<\/option>\r\n  <option class=\"de\" name=\"de\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/de\">Deutsch (Deutschland)<\/option>\r\n  <option class=\"nl\" name=\"nl\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/nl\">Dutch (Netherland)<\/option>\r\n  <option class=\"es\" name=\"es\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/es\">Espa\u00f1ol (Espa\u00f1a)<\/option>\r\n  <option class=\"es-mx\" name=\"es-mx\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/es-mx\">Espa\u00f1ol (M\u00e9xico)<\/option>\r\n  <option class=\"ph\" name=\"ph\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/ph\">Filipino (Pilipinas)<\/option>\r\n  <option class=\"fr-ca\" name=\"fr-ca\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/fr-ca\">Fran\u00e7ais (Canada)<\/option>\r\n  <option class=\"fr\" name=\"fr\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/fr\">Fran\u00e7ais (France)<\/option>\r\n  <option class=\"ga-ie\" name=\"ga-ie\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/ga-ie\">Gaeilge (Ireland)<\/option>\r\n  <option class=\"it\" name=\"it\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/it\">Italiano (Italia)<\/option>\r\n  <option class=\"jp\" name=\"jp\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/ja\">\u65e5\u672c\u8a9e\uff08\u65e5\u672c\uff09<\/option>\r\n  <option class=\"pl\" name=\"pl\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/pl\">Polski (Polska)<\/option>\r\n  <option class=\"pt-br\" name=\"pt-br\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/pt-br\">Portugu\u00eas (Brasil)<\/option>\r\n  <option class=\"ru\" name=\"ru\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/ru\">\u0420\u0443\u0441\u0441\u043a\u0438\u0439 (\u0420\u043e\u0441\u0441\u0438\u044f)<\/option>\r\n  <option class=\"tr\" name=\"tr\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/tr\">T\u00fcrk\u00e7e (T\u00fcrkiye)<\/option>\r\n  <option class=\"uk\" name=\"uk\" value=\"https:\/\/www.trendmicro.com\/internet-safety\/uk\">\u0423\u043a\u0440\u0430\u0457\u043d\u0441\u044c\u043a\u0430 (\u0423\u043a\u0440\u0430\u0457\u043d\u0430)<\/option>\r\n<\/select>\r\n\r\n<\/div>\r\n<\/div>  \r\n\r\n<div class=\"row d-none\">\r\n        <div class=\"col-12\">\r\n            <ul id=\"lang\">\r\n                <li><i class=\"fas fa-globe\"><\/i><strong class=\"d-none\">Select your language:<\/strong><\/li>                \r\n                <li class=\"en-us\"><a href=\"https:\/\/www.trendmicro.com\/internet-safety\" target=\"_blank\" title=\"English (United States)\">English (United States)<\/a><\/li>\r\n                <li class=\"cs\"><a href=\"https:\/\/www.trendmicro.com\/internet-safety\/cs\" target=\"_blank\" title=\"Czech (Czech Republic)\">\u010ce\u0161tina (\u010cesky)<\/a><\/li>\r\n                <li class=\"de\"><a href=\"https:\/\/www.trendmicro.com\/internet-safety\/de\" target=\"_blank\" title=\"German (Germany)\">Deutsch (Deutschland)<\/a><\/li>\r\n                <!--<li class=\"es d-none\"><a href=\"https:\/\/www.trendmicro.com\/internet-safety\/es\" target=\"_blank\" title=\"Spanish (Spain)\">Espa\u00f1ol (Espa\u00f1a)<\/a><\/li>-->\r\n                <li class=\"es-mx\"><a href=\"https:\/\/www.trendmicro.com\/internet-safety\/mx\" target=\"_blank\" title=\"Spanish (Mexico)\">Espa\u00f1ol (M\u00e9xico)<\/a><\/li>\r\n                <li class=\"fr-ca\"><a href=\"https:\/\/www.trendmicro.com\/internet-safety\/fr-ca\" target=\"_blank\" title=\"French (Canada)\">Fran\u00e7ais (Canada)<\/a><\/li>\r\n                <li class=\"it\"><a href=\"https:\/\/www.trendmicro.com\/internet-safety\/it\" target=\"_blank\" title=\"Italian (Italy)\">Italiano (Italia)<\/a><\/li>\r\n                <li class=\"pl\"><a href=\"https:\/\/www.trendmicro.com\/internet-safety\/pl\" target=\"_blank\" title=\"Polish (Poland)\">Polski (Polska)<\/a><\/li>\r\n                <li class=\"ar-sa\"><a href=\"https:\/\/www.trendmicro.com\/internet-safety\/ar-sa\" target=\"_blank\" title=\"Arabic (Saudi Arabia)\">\u0627\u0644\u0639\u0631\u0628\u064a\u0629 (\ufe8d\ufedf\ufeb4\ufecc\ufeee\ufea9\ufef3\ufe94)<\/a><\/li>\r\n                <li class=\"zh-tw\"><a href=\"https:\/\/www.trendmicro.com\/internet-safety\/tw\" target=\"_blank\" title=\"Chinese (Taiwan)\">\u7e41\u9ad4\u4e2d\u6587 (\u53f0\u7063)<\/a><\/li>\r\n                <li class=\"zh-hk\"><a href=\"https:\/\/www.trendmicro.com\/internet-safety\/hk\" target=\"_blank\" title=\"Chinese (Hong Kong)\">\u7e41\u9ad4\u4e2d\u6587 (\u9999\u6e2f)<\/a><\/li>\r\n                <li class=\"en-hk\"><a href=\"https:\/\/www.trendmicro.com\/internet-safety\/en-hk\" target=\"_blank\" title=\"English (Hong Kong)\">English (Hong Kong)<\/a><\/li>\r\n            <\/ul>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n    <div class=\"row\">\r\n        <div class=\"col-12 col-md-12 col-lg-9\">\r\n            <h5>Trend Micro Internet Safety Center<\/h5>\r\n            <div class=\"row\">\r\n                <div class=\"col-12 col-md-12 col-lg-12 col-xl-2\">\r\n                    <ul class=\"footer-ul\" style=\"margin-bottom: 20px !important\">\r\n                        <li><a href=\"\/internet-safety\/\"><strong>Home<\/strong><\/a><\/li>\r\n                    <\/ul>\r\n                <\/div>\r\n                <div class=\"col-12 col-md-12 col-lg-12 col-xl-3\">\r\n                    <ul class=\"footer-ul\" style=\"margin-bottom: 20px !important\">\r\n                        <li><a href=\"\/internet-safety\/for-parents-and-teachers\"><strong>For Parents & Teachers<\/strong><\/a>\r\n                            <ul class=\"footer-ul\">\r\n                                <li><a href=\"\/internet-safety\/for-parents-and-teachers\/webinars\">Webinars<\/a>\r\n                                <li><a href=\"\/internet-safety\/for-parents-and-teachers\/resources\">Resources<\/a>\r\n                                <li class=\"d-none\"><a href=\"\/internet-safety\/for-parents-and-teachers\/events\">Events<\/a>\r\n                            <\/ul>\r\n                        <\/li>\r\n                    <\/ul>\r\n                <\/div>\r\n                <div class=\"col-12 col-md-12 col-lg-12 col-xl-2\">\r\n                    <ul class=\"footer-ul\" style=\"margin-bottom: 20px !important\">\r\n                        <li><a href=\"\/internet-safety\/for-kids\"><strong>For Kids<\/strong><\/a>\r\n                            <ul class=\"footer-ul\">\r\n                                <li><a href=\"\/internet-safety\/for-kids\/cyber-academy\">Cyber Academy<\/a>\r\n                                <li><a href=\"\/internet-safety\/for-kids\/whats-your-story\">What's Your Story<\/a>\r\n                            <\/ul>\r\n                        <\/li>\r\n                    <\/ul>\r\n                <\/div>\r\n                <div class=\"col-12 col-md-12 col-lg-12 col-xl-2\">\r\n                    <ul class=\"footer-ul\" style=\"margin-bottom: 20px !important\">\r\n                        <li><a href=\"\/internet-safety\/for-adults\"><strong>For Adults<\/strong><\/a><\/li>\r\n                                <li><a href=\"\/internet-safety\/for-adults\/older-adults-program\/\">Older Adults Program<\/a>\r\n\t\t\t\t\t\t\t\t<li><a href=\"\/internet-safety\/for-adults\/spotlight-sessions\/\">Spotlight Sesions<\/a>\r\n                                <li><a href=\"\/internet-safety\/for-parents-and-teachers\/blog\">Blog<\/a>\r\n                                <li><a href=\"\/internet-safety\/for-adults\/events\">Events<\/a>\r\n                                <li><a href=\"\/internet-safety\/for-parents-and-teachers\/free-tech-tools\">Free Tech Tools<\/a>\r\n                    <\/ul>\r\n                <\/div>\r\n                <div class=\"col-12 col-md-12 col-lg-12 col-xl-2\">\r\n                    <ul class=\"footer-ul\" style=\"margin-bottom: 20px !important\">\r\n\t\t\t\t\t\t<li><a href=\"\/internet-safety\/about-us\"><strong>About Us<\/strong><\/a><\/li>\r\n                        <li><a href=\"\/internet-safety\/contact-us\"><strong>Contact Us<\/strong><\/a><\/li>\r\n                    <\/ul>\r\n                <\/div>\r\n            <\/div>\r\n        <\/div>\r\n        <div class=\"tm col-12 col-md-12 col-lg-3\">\r\n            <h5><a href=\"https:\/\/www.trendmicro.com\/\" target=\"_blank\" title=\"Go to TrendMicro.com\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/2020\/05\/trend-micro-logo.png?v=2\" alt=\"Trend Micro logo\" width=\"150\" style=\"max-width: 150px !important\"><\/a><\/h5>\r\n            <ul class=\"footer-ul\">\r\n                <li><a href=\"https:\/\/www.trendmicro.com\/\" target=\"_blank\">TrendMicro.com<\/a><\/li>\r\n                <li class=\"d-none\"><a href=\"https:\/\/www.trendmicro.com\/TMIE\" target=\"_blank\">Trend Micro Initiative for Education<\/a><\/li>\r\n                <li><a href=\"https:\/\/www.trendmicro.com\/en_gb\/about\/legal.html\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy Policy<\/a><\/li>\r\n            <\/ul>\r\n        <\/div>\r\n    <\/div>  \r\n<\/div>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#f7f9f9&#8243; global_colors_info=&#8221;{}&#8221; use_background_color_gradient__hover=&#8221;off&#8221; use_background_color_gradient__hover_enabled=&#8221;off&#8221; background_color_gradient_start__hover=&#8221;#2b87da&#8221; background_color_gradient_start__hover_enabled=&#8221;#2b87da&#8221; background_color_gradient_end__hover=&#8221;#29c4a9&#8243; background_color_gradient_end__hover_enabled=&#8221;#29c4a9&#8243; background_color_gradient_type__hover=&#8221;linear&#8221; background_color_gradient_type__hover_enabled=&#8221;linear&#8221; background_color_gradient_direction__hover=&#8221;180deg&#8221; background_color_gradient_direction__hover_enabled=&#8221;180deg&#8221; background_color_gradient_direction_radial__hover=&#8221;center&#8221; background_color_gradient_direction_radial__hover_enabled=&#8221;center&#8221; background_color_gradient_start_position__hover=&#8221;0%&#8221; background_color_gradient_start_position__hover_enabled=&#8221;0%&#8221; background_color_gradient_end_position__hover=&#8221;100%&#8221; background_color_gradient_end_position__hover_enabled=&#8221;100%&#8221; background_color_gradient_overlays_image__hover=&#8221;off&#8221; background_color_gradient_overlays_image__hover_enabled=&#8221;off&#8221; parallax__hover=&#8221;off&#8221; parallax__hover_enabled=&#8221;off&#8221; parallax_method__hover=&#8221;on&#8221; parallax_method__hover_enabled=&#8221;on&#8221; background_size__hover=&#8221;cover&#8221; background_size__hover_enabled=&#8221;cover&#8221; background_position__hover=&#8221;center&#8221; background_position__hover_enabled=&#8221;center&#8221; background_repeat__hover=&#8221;no-repeat&#8221; background_repeat__hover_enabled=&#8221;no-repeat&#8221; background_blend__hover=&#8221;normal&#8221; background_blend__hover_enabled=&#8221;normal&#8221; allow_player_pause__hover=&#8221;off&#8221; allow_player_pause__hover_enabled=&#8221;off&#8221; background_video_pause_outside_viewport__hover=&#8221;on&#8221; background_video_pause_outside_viewport__hover_enabled=&#8221;on&#8221; background_color_gradient_stops__hover=&#8221;#2b87da 0%|#29c4a9 100%&#8221;][et_pb_fullwidth_image src=&#8221;\/internet-safety\/wp-content\/uploads\/2021\/05\/charity-23.png&#8221; _builder_version=&#8221;4.16&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_intensity_slide=&#8221;4%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_image][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\t\t\t<!-- Flexy Breadcrumb -->\r\n\t\t\t<div class=\"fbc fbc-page\">\r\n\r\n\t\t\t\t<!-- Breadcrumb wrapper -->\r\n\t\t\t\t<div class=\"fbc-wrap\">\r\n\r\n\t\t\t\t\t<!-- Ordered list-->\r\n\t\t\t\t\t<ol class=\"fbc-items\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\">\r\n\t\t\t\t\t\t            <li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\r\n                <span itemprop=\"name\">\r\n                    <!-- Home Link -->\r\n                    <a itemprop=\"item\" href=\"https:\/\/www.trendmicro.com\/internet-safety\">\r\n                    \r\n                                                    <i class=\"fa fa-home\" aria-hidden=\"true\"><\/i>Home                    <\/a>\r\n                <\/span>\r\n                <meta itemprop=\"position\" content=\"1\" \/><!-- Meta Position-->\r\n             <\/li><li><span class=\"fbc-separator\">\/<\/span><\/li><li class=\"active\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\" title=\"AI Powered Scams: What a Threat Researcher Wants You to Know\">AI Powered Scams: What...<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li>\t\t\t\t\t<\/ol>\r\n\t\t\t\t\t<div class=\"clearfix\"><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t Full Transcript Speakers: Marike Kuyper (Trend Micro) Eva Velasquez (Identity Theft Resource Center) [00:00] Marike: All right. Welcome to Trend Micro&#8217;s Spotlight Session where we aim to shine a revealing light on the hidden dangers lurking in today&#8217;s digital world. In each of these sessions, we&#8217;re bringing together leading voices from cybersecurity, law enforcement, [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":100201,"parent":99861,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"footnotes":""},"class_list":["post-100198","page","type-page","status-publish","has-post-thumbnail","hentry","wpautop"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages\/100198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/comments?post=100198"}],"version-history":[{"count":2,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages\/100198\/revisions"}],"predecessor-version":[{"id":101168,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages\/100198\/revisions\/101168"}],"up":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages\/99861"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media\/100201"}],"wp:attachment":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media?parent=100198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}