Stop Account Takeovers with Proven Strategies
Drawing from 15+ years of scaling security at global leaders like Booking.com, I deliver customized consulting that reduces breaches by up to 95%, automates responses, and ensures regulatory compliance—without disrupting your users.
About Me
I’m a seasoned cybersecurity leader with over 15 years of hands-on experience in fraud prevention and account takeover (ATO) mitigation, having spearheaded transformative solutions at global giants like Booking.com, Kaspersky, and Sbercloud. As an expert in risk-based authentication, threat intelligence, and AI-driven defenses, I’ve dedicated my career to protecting user accounts from sophisticated threats such as credential stuffing, phishing, and fake account creation. My approach combines strategic product management with cutting-edge technologies, ensuring that businesses not only detect but proactively prevent ATO incidents while minimizing user friction and operational costs.

What I Offer

Buy-vs-Build Vendor Evaluation & Integration
Objective analysis of ATO tools, with PoCs and integration plans tailored to your budget and ecosystem.

ATO Maturity Assessment
A comprehensive 2-4 week audit of your existing ATO defenses, including GenAI-powered threat modeling, backlog analysis, and vulnerability scans. I provide a prioritized roadmap with actionable steps for detection, remediation, and compliance (e.g., GDPR/EU AI Act alignment)

Risk-Based Authentication (RBA) Strategy & Implementation
Expert guidance on building or optimizing RBA systems with ML models for device, IP, and behavioral signals. Includes vendor PoCs and hands-on setup to minimize user friction while blocking attacks.
Get in Touch!
Contact me today for a no-obligation discussion on how we can tailor these services to your needs.
-
Why ATO protection is important?
•
Why ATO protection is important? Account Takeover (ATO) protection is critical because it safeguards user accounts from unauthorized access, which can lead to severe consequences. ATO occurs when malicious actors gain control of accounts through methods like phishing, credential stuffing, or exploiting weak passwords. Here’s why ATO protection matters: In summary, ATO protection is…