top of page

Programação e Agenda

Bem-vindo à programação do Digital Risk Summit São Paulo (DRSAO). Confira a página de logística para saber mais sobre hotéis, transporte público, estacionamento e atrações turísticas.

 

A agenda final para 2025 será publicada em breve. Fique ligado!

Presented by:

Leveraging Data to Enable Proactive Detection A Sharing Economy Case Study with Wonolo REC
AGENDA

Rascunho de 2025 Agenda

Focado em gestão de risco, trust & safety, conformidade e estratégia regulatória e jurídica para marketplaces e plataformas digitais.

 

A agenda de 2025 será publicada em breve. Fique ligado! 

Agenda de Eventos (2 de outubro de 2025)

 

Quarta-feira, 1º de outubro
5:00 PM - 7:00 PM: Recepção de Boas-Vindas

 

Quinta-feira, 2 de outubro

8:00 AM - 9:00 AM: Check-in e Registro
9:00 AM - 10:00 AM: Palestra Principal
10:00 AM - 5:00 PM: Sessões
5:00 PM - 7:00 PM: Recepção para Networking
7:00 PM - 9:00 PM:

Programa Jantar & Networking

TBD

2 de out. de 2025

From:

TBD

To:

TBD

Risk Without Borders: How to Localize Your antiFraud Strategy for Marketplaces in Latin America

- Quezia Miyazaki de Paula, Head of Product, EBANX

Expanding a marketplace into Latin America requires more than translating a website; it demands a hyper-localized risk strategy. A one-size-fits-all model from the US or Europe is bound to fail against unique regional challenges, from Pix fraud in Brazil to cash payment risks in Mexico and the "cultural chargeback" phenomenon. This session explores the diverse LatAm risk landscape and demonstrates how leveraging local payment intelligence is the first line of defense. Through a real-world case study, we will show how localizing your strategy can significantly decrease fraud rates while boosting payment approval.

TBD

2 de out. de 2025

From:

TBD

To:

TBD

How to Prevent Fraud in IA World

- Saulo Prado, Prevention and Chargeback Manager, Wellhub

Preventing fraud in the AI world requires a multi-faceted approach. As AI systems become more sophisticated, so do the methods of fraudsters, necessitating robust defense mechanisms. Key strategies include implementing advanced anomaly detection algorithms to identify unusual patterns in real-time, securing AI models against adversarial attacks that could manipulate their outputs, and ensuring data integrity through secure pipelines and validation
bottom of page