Get 24/7 incident response assistance from our global team
- APAC: +65 3159 4398
- EU & NA: +31 20 890 55 59
- MEA: +971 4 540 6400
Get 24/7 incident response assistance from our global team
Please review the following rules before submitting your application:
1. Our main objective is to foster a community of like-minded individuals dedicated to combatting cybercrime and who have never engaged in Blackhat activities.
2. All applications must include research or a research draft. You can find content criteria in the blog. Please provide a link to your research or research draft using the form below.
Learn how Group-IB's Bureau Veritas-validated technology enables compliant, real-time fraud intelligence sharing between institutions—detecting threats as early as during the critical 4-8 week warm-up phase, before funds are lost.

All sessions are 30 minutes
Can’t attend live? Register anyway — you will receive on-demand access immediately after.
Financial institutions have previously faced a dilemma.
Collaborate to fight fraud → Risk GDPR violations
Protect customer privacy → Miss coordinated attacks
Sharing intelligence about suspicious activity — before fraud is confirmed — has always meant unacceptable compliance risks. Traditional methods like SHA-256 hashing create re-identification vulnerabilities that violate privacy laws. And by the time fraud is confirmed and shareable, the money is gone.
Cyber Fraud Intelligence Platform uses patented Distributed Tokenization — validated by Bureau Veritas as GDPR-compliant – to eliminate re-identification risks.
For the first time, institutions can:
The Regulatory Imperative
Why mandatory collaboration has been legally impossible — until now
The Technical Breakthrough
How Distributed Tokenization differs from SHA-256 hashing and eliminates re-identification risks
while keeping PII in your environment
Independent Validation
Bureau Veritas experts explain the technical and legal basis for GDPR validation
Real-World Impact
How institutions detect mule accounts, stop APP fraud at transaction time, and trace stolen
funds through secure cross-bank coordination
Essential for:
At organizations including:
Understand how to meet data-sharing mandates without creating new compliance risks — and how early adopters are stopping fraud weeks before traditional methods detect it.
Questions? Visit Cyber Fraud Intelligence Platform product page