{"id":987501389,"global_id":"www.aimglobal.org?id=987501389","global_id_lineage":["www.aimglobal.org?id=987501389"],"author":"9","status":"publish","date":"2025-09-02 15:39:15","date_utc":"2025-09-02 19:39:15","modified":"2025-09-02 15:43:34","modified_utc":"2025-09-02 19:43:34","url":"https:\/\/www.aimglobal.org\/event\/securing-digital-identities-the-growing-risk-of-qr-code-exploits-and-how-to-address-them\/","rest_url":"https:\/\/www.aimglobal.org\/wp-json\/tribe\/events\/v1\/events\/987501389","title":"Securing Digital Identities: The Growing Risk of QR-Code Exploits and How to Address Them","description":"<p data-start=\"381\" data-end=\"706\">As QR codes become a critical touchpoint across supply chains, retail, digital payments, and consumer engagement, they are increasingly targeted by cybercriminals. Emerging threats like <strong data-start=\"567\" data-end=\"593\">QR phishing (quishing)<\/strong> and <strong data-start=\"598\" data-end=\"612\">QR-jacking<\/strong> are exposing vulnerabilities that can compromise enterprise systems and erode consumer trust.<\/p>\n<p data-start=\"708\" data-end=\"1035\">This session provides a deep dive into the <strong data-start=\"751\" data-end=\"786\">latest QR code security threats<\/strong>, including those uncovered by leading global threat intelligence organizations. We&#8217;ll explore the <strong data-start=\"885\" data-end=\"930\">mechanics of modern QR code-based attacks<\/strong>, how threat actors are exploiting them across industries, and what businesses must do to stay protected.<\/p>\n<p data-start=\"1037\" data-end=\"1069\"><strong data-start=\"1037\" data-end=\"1069\">Key Takeaways for Attendees:<\/strong><\/p>\n<ul>\n<li data-start=\"1073\" data-end=\"1148\">An overview of <strong data-start=\"1088\" data-end=\"1121\">modern QR code attack vectors<\/strong> and exploitation tactics<\/li>\n<li data-start=\"1151\" data-end=\"1246\"><strong data-start=\"1151\" data-end=\"1178\">Real-world case studies<\/strong> of QR code misuse in supply chain, retail, and consumer scenarios<\/li>\n<li data-start=\"1249\" data-end=\"1371\">Insights into the role of <strong data-start=\"1275\" data-end=\"1309\">international standards bodies<\/strong> like GS1, AIM, and ISO in defining secure QR code practices<\/li>\n<li data-start=\"1374\" data-end=\"1530\">A comparative analysis of security solutions, including <strong data-start=\"1430\" data-end=\"1450\">GS1 Digital Link<\/strong>, <strong data-start=\"1452\" data-end=\"1477\">secure digital tokens<\/strong>, and <strong data-start=\"1483\" data-end=\"1528\">non-cloneable authentication technologies<\/strong><\/li>\n<li data-start=\"1533\" data-end=\"1639\">Strategic guidance on <strong data-start=\"1555\" data-end=\"1579\">mitigation practices<\/strong>, from consumer education to technological countermeasures<\/li>\n<\/ul>\n<p data-start=\"1641\" data-end=\"1888\">This session is essential for professionals in <strong data-start=\"1688\" data-end=\"1773\">cybersecurity, supply chain management, digital marketing, retail IT, and fintech<\/strong>, seeking to safeguard their QR code ecosystems and maintain consumer trust in the face of growing digital threats.<\/p>","excerpt":"","slug":"securing-digital-identities-the-growing-risk-of-qr-code-exploits-and-how-to-address-them","image":{"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them.png","id":987501390,"extension":"png","width":1200,"height":627,"filesize":447862,"sizes":{"medium":{"width":300,"height":157,"mime-type":"image\/png","filesize":23966,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-300x157.png"},"large":{"width":1024,"height":535,"mime-type":"image\/png","filesize":189583,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-1024x535.png"},"thumbnail":{"width":150,"height":150,"mime-type":"image\/png","filesize":12584,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-150x150.png"},"medium_large":{"width":768,"height":401,"mime-type":"image\/png","filesize":115273,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-768x401.png"},"et-pb-post-main-image":{"width":400,"height":250,"mime-type":"image\/png","filesize":42754,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-400x250.png"},"et-pb-post-main-image-fullwidth":{"width":1080,"height":627,"mime-type":"image\/png","filesize":215685,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-1080x627.png"},"et-pb-portfolio-image":{"width":400,"height":284,"mime-type":"image\/png","filesize":47273,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-400x284.png"},"et-pb-portfolio-module-image":{"width":510,"height":382,"mime-type":"image\/png","filesize":76369,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-510x382.png"},"et-pb-portfolio-image-single":{"width":1080,"height":564,"mime-type":"image\/png","filesize":203323,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-1080x564.png"},"et-pb-gallery-module-image-portrait":{"width":400,"height":516,"mime-type":"image\/png","filesize":84641,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-400x516.png"},"et-pb-image--responsive--tablet":{"width":980,"height":512,"mime-type":"image\/png","filesize":169826,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-980x512.png"},"et-pb-image--responsive--phone":{"width":480,"height":251,"mime-type":"image\/png","filesize":50760,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-480x251.png"},"woocommerce_thumbnail":{"width":400,"height":400,"mime-type":"image\/png","filesize":67484,"uncropped":false,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-400x400.png"},"woocommerce_single":{"width":510,"height":266,"mime-type":"image\/png","filesize":56895,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-510x266.png"},"woocommerce_gallery_thumbnail":{"width":100,"height":100,"mime-type":"image\/png","filesize":6721,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-100x100.png"},"cmplz_banner_image":{"width":350,"height":100,"mime-type":"image\/png","filesize":16728,"url":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them-350x100.png"}}},"all_day":false,"start_date":"2025-09-18 13:00:00","start_date_details":{"year":"2025","month":"09","day":"18","hour":"13","minutes":"00","seconds":"00"},"end_date":"2025-09-18 14:00:00","end_date_details":{"year":"2025","month":"09","day":"18","hour":"14","minutes":"00","seconds":"00"},"utc_start_date":"2025-09-18 17:00:00","utc_start_date_details":{"year":"2025","month":"09","day":"18","hour":"17","minutes":"00","seconds":"00"},"utc_end_date":"2025-09-18 18:00:00","utc_end_date_details":{"year":"2025","month":"09","day":"18","hour":"18","minutes":"00","seconds":"00"},"timezone":"America\/New_York","timezone_abbr":"EDT","cost":"","cost_details":{"currency_symbol":"","currency_code":"","currency_position":"","values":[]},"website":"https:\/\/us02web.zoom.us\/webinar\/register\/2617561459290\/WN_d8YIzMxZSq6Jb9wuZqvNNw","show_map":true,"show_map_link":true,"hide_from_listings":false,"sticky":false,"featured":false,"categories":[],"tags":[],"venue":{"id":987497577,"author":"9","status":"publish","date":"2024-05-22 14:12:24","date_utc":"2024-05-22 14:12:24","modified":"2024-05-22 14:12:24","modified_utc":"2024-05-22 14:12:24","url":"https:\/\/www.aimglobal.org\/venue\/virtual\/","venue":"Virtual","slug":"virtual","json_ld":{"@type":"Place","name":"Virtual","description":"","url":"","address":{"@type":"PostalAddress"},"telephone":"","sameAs":""},"show_map":true,"show_map_link":true,"global_id":"www.aimglobal.org?id=987497577","global_id_lineage":["www.aimglobal.org?id=987497577"]},"organizer":[],"custom_fields":[],"json_ld":{"@context":"http:\/\/schema.org","@type":"Event","name":"Securing Digital Identities: The Growing Risk of QR-Code Exploits and How to Address Them","description":"&lt;p&gt;As QR codes become a critical touchpoint across supply chains, retail, digital payments, and consumer engagement, they are increasingly targeted by cybercriminals. Emerging threats like QR phishing (quishing) and QR-jacking [&hellip;]&lt;\/p&gt;\\n","image":"https:\/\/www.aimglobal.org\/wp-content\/uploads\/2025\/09\/Securing-Digital-Identities-The-Growing-Risk-of-QR-Code-Exploits-and-How-to-Address-Them.png","url":"https:\/\/www.aimglobal.org\/event\/securing-digital-identities-the-growing-risk-of-qr-code-exploits-and-how-to-address-them\/","eventAttendanceMode":"https:\/\/schema.org\/OfflineEventAttendanceMode","eventStatus":"https:\/\/schema.org\/EventScheduled","startDate":"2025-09-18T13:00:00-04:00","endDate":"2025-09-18T14:00:00-04:00","location":{"@type":"Place","name":"Virtual","description":"","url":"","address":{"@type":"PostalAddress"},"telephone":"","sameAs":""},"performer":"Organization"},"ticketed":false}