top of page

Schedule & Agenda

Welcome to the schedule of events for the Marketplace Risk Austin Conference (MRATX). Check out the logistics page to learn more about hotels, public transportation, parking, and tourists  attractions.

The final 2026 agenda will be released shortly.

Presented by:

g2 risk solutions.png
incognia.webp
AGENDA

Draft Agenda

Focused on digital risk and critical areas such as trust & safety, compliance, fraud prevention, and evolving regulations across digital platforms, including marketplaces, fintechs, and platform-based businesses.

Schedule of Events (February 24 - 25, 2026)

Tuesday, February 24
5:00 PM - 7:00 PM: Welcome Reception at JCC

 

Wednesday, February 25

8:00 AM - 9:00 AM: Check-in and Registration
9:00 AM - 9:40 AM: Opening Session
9:50 AM - 5:10 PM: Sessions
5:00 PM - 7:00 PM: Networking Reception at JCC

JCC

The Cost of Harm: Proving ROI on Trust & Safety Investments

Feb 25, 2026

From:

TBD

To:

TBD

- Kristin Kupiec, Manager, Critical Investigations & LERT, DoorDash

Trust & Safety leaders know that preventing harm is the right thing to do—but budget owners want to know what it is worth. How do you credibly show ROI when the “return” is an incident that never happens, a victim who is never harmed, or a headline that never hits? This panel will tackle the uncomfortable but essential challenge of putting a price on harm in order to secure investment in safety. Panelists will share practical methods for estimating the cost of incidents—from fraud losses and support costs to reputational damage, regulatory exposure, and long-term user trust. They will discuss how to frame victim impact ethically and respectfully while still translating it into the financial language of CFOs, GMs, and boards. Through real examples and candid discussion, the session will cover how to build defensible cost models, use scenarios and ranges instead of false precision, and construct narratives that connect safety outcomes to growth, retention, and risk mitigation. Attendees will leave with actionable tools to move beyond “it’s the right thing to do” and effectively sell ROI for Trust & Safety initiatives without diminishing the human impact at the heart of their work.

JCC

AI at Scale in Trust & Safety: Balancing Automation with Operational Reliability

Feb 25, 2026

From:

TBD

To:

TBD

- Ante Radan, Product Manager, Meta

As digital platforms scale AI-driven Trust & Safety, automation often introduces new operational risks such as model drift, brittle decisioning, and rising human override costs. This session explores how to design AI-assisted risk systems that scale globally while remaining reliable, transparent, and defensible. Drawing on real-world experience operating large, multi-market platforms, the talk focuses on practical design choices: where automation creates durable value, where it breaks down, and how to build resilient human-in-the-loop workflows. Attendees will leave with actionable frameworks for balancing automation, operational stability, and regulatory expectations at scale.

JCC

When Trust Is the Target: Fighting Fraud Across Employees, Vendors, and Bad Actors

Feb 25, 2026

From:

TBD

To:

TBD

- Kristin Kupiec, Manager, Critical Investigations & LERT, DoorDash

Fraud is never just “out there.” For modern marketplaces, risk lives everywhere: in internal tools, in outsourced operations, and at the edges of the platform where sophisticated external actors test every control. At the same time, vendors and partners operate under commercial pressure, staff turnover, and incentive structures that can make them vulnerable to mistakes—or, in rare cases, misconduct and corruption. This panel will explore fraud as an end-to-end ecosystem problem, not just a point solution or a “T&S issue.” We will examine how fraud surfaces across three layers: In-house: employees with privileged access, policy discretion, and deep system knowledge. Outsourced / Vendors: BPOs and third parties who handle reviews, support, or operations, often with high access and lower visibility. External Bad Actors: organized fraud rings, opportunistic users, and third-party toolkits constantly probing for weaknesses.
bottom of page