{"id":28057,"date":"2026-04-30T08:56:19","date_gmt":"2026-04-30T08:56:19","guid":{"rendered":"https:\/\/trustpair.com\/?p=28057"},"modified":"2026-04-30T12:38:30","modified_gmt":"2026-04-30T12:38:30","slug":"ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense","status":"publish","type":"post","link":"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/","title":{"rendered":"AI and Vendor Fraud: Why Your Vendor Master File is the First Line of Defense"},"content":{"rendered":"\n<p>As AI tools become increasingly accessible, B2B fraud is shifting from &#8220;sporadic events&#8221; to &#8220;systemic attacks.&#8221; We sat down with <strong>Tom Abbey<\/strong> (Account Executive, Trustpair) and <strong>Mo Ahmad<\/strong> (Global Procurement Technology Executive, SAP) to discuss how organizations can defend themselves in 2026.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-vivid-purple-color has-text-color has-link-color wp-elements-6aa09e2f0e2566ca4cb8fd3b66ce98de\"><strong>Key Takeaways for P2P Leaders<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The 80% Rule:<\/strong> Most fraud occurs during onboarding or bank detail modification, not at the payment stage.<\/li>\n\n\n\n<li><strong>AI Scale:<\/strong> Deepfake voices and cloned identities have made manual &#8220;callback&#8221; procedures obsolete.<\/li>\n\n\n\n<li><strong>The Overconfidence Gap:<\/strong> 77% of companies trust their data, yet 70% fail to monitor it continuously.<\/li>\n\n\n\n<li><strong>Clean Core Strategy:<\/strong> Automated bank verification must be native to the SAP environment to eliminate manual error.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Beyond BEC: The Rise of AI-Enabled Impersonation<\/strong><\/h2>\n\n\n\n<p><strong>Q: We\u2019ve heard about the &#8220;Arup&#8221; case\u2014a $25 million loss due to a deepfake CFO. Is this the new normal for Procurement?<\/strong><\/p>\n\n\n\n<p><strong>Tom (Trustpair):<\/strong> It\u2019s becoming day-to-day. Fraudsters only need a few minutes of audio from a YouTube clip to clone a CEO\u2019s voice. In the Arup case, they used a Teams call to forge the CFO\u2019s face and voice. When 71% of businesses report an increase in AI-driven fraud, the &#8220;manual callback&#8221; isn&#8217;t just slow\u2014it&#8217;s a liability.<\/p>\n\n\n\n<p><strong>Mo (SAP):<\/strong> Exactly. As we digitize\u2014introducing supplier self-service and payment automation\u2014we create more entry points. Fraudsters are smarter now; they exploit the gaps between digital systems. It\u2019s no longer just about a fake email; it\u2019s about increased exposure meeting high-speed AI tactics.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Bridging the &#8220;Overconfidence Gap&#8221; in Vendor Master Data<\/strong><\/h2>\n\n\n\n<p><strong>Q: Most companies feel they have a handle on their vendor data. Why do the statistics suggest a different reality?<\/strong><\/p>\n\n\n\n<p><strong>Tom:<\/strong> There\u2019s a massive contradiction. 77% of companies say they are confident in their vendor master data, yet 70% don\u2019t continuously monitor it. We see cases of &#8220;low and slow&#8221; internal fraud\u2014like the British Airways incident\u2014where details are edited in the master file and go unnoticed for years because there is no continuous audit.<\/p>\n\n\n\n<p><strong>Mo:<\/strong> We see this often during ERP transformations, like moving from SAP ECC to S\/4HANA. Companies have ambitions to automate, but when they look under the hood, the data is in a much poorer state than they believed. At SAP, we preach a <strong>&#8220;Clean Core,&#8221;<\/strong> which means you can\u2019t have a clean process if you\u2019re feeding it 15 years of &#8220;poisoned&#8221; or stale data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Designing a Fraud-Resistant SAP Ecosystem<\/strong><\/h2>\n\n\n\n<p><strong>Q: How do Trustpair and SAP integrate to secure the source-to-pay journey?<\/strong><\/p>\n\n\n\n<p><strong>Tom:<\/strong> We focus on the &#8220;Pair.&#8221; First, we identify the company; second, we validate the bank account; and third, we create the &#8220;cement&#8221; by tying that specific company registration to that specific bank account. We only give a &#8220;Green&#8221; status when that link is guaranteed globally across 195 countries.<\/p>\n\n\n\n<p><strong>Mo:<\/strong> We partner with Trustpair because they provide a depth of banking telemetry we don&#8217;t have. Whether you&#8217;re onboarding in SAP Ariba or running payments in S\/4HANA, Trustpair acts as an automated approval step directly in the workflow. This removes the &#8220;manual handshake&#8221; where most fraud slips through.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The &#8220;Winning Move&#8221; for Finance and Risk Leaders<\/strong><\/h2>\n\n\n\n<p><strong>Q: If you could give one piece of advice to a CFO or CPO today, what would it be?<\/strong><\/p>\n\n\n\n<p><strong>Mo:<\/strong> Don\u2019t treat fraud prevention as an &#8220;optional&#8221; add-on. It has to be designed into the source-to-pay process from the start. The only winning move in fraud prevention is to stop the payment before it leaves.<strong>Tom:<\/strong> Get ahead of the curve. Most organizations only call me <em>after<\/em> they\u2019ve been defrauded. Think of it like a speed camera: don&#8217;t wait for the accident to happen. Automation is the only way to outpace AI.<\/p>\n\n\n\n<p><a href=\"https:\/\/trustpair.com\/gb\/resources\/ai-vendor-fraud-why-your-vendor-master-file-is-your-first-line-of-defence\/\" type=\"link\" id=\"https:\/\/trustpair.com\/gb\/resources\/ai-vendor-fraud-why-your-vendor-master-file-is-your-first-line-of-defence\/\">Watch the full replay of this interview here.<\/a><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/a3499a0c-986f-4383-a4df-2823ffe51009\"><\/a><\/p>\n\n\n<p><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-a3499a0c-986f-4383-a4df-2823ffe51009\"><span class=\"hs-cta-node hs-cta-a3499a0c-986f-4383-a4df-2823ffe51009\" id=\"hs-cta-a3499a0c-986f-4383-a4df-2823ffe51009\"><!--[if lte IE 8]>\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/a3499a0c-986f-4383-a4df-2823ffe51009\" ><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-a3499a0c-986f-4383-a4df-2823ffe51009\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/a3499a0c-986f-4383-a4df-2823ffe51009.png\"  alt=\"New call-to-action\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'a3499a0c-986f-4383-a4df-2823ffe51009', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As AI tools become increasingly accessible, B2B fraud is shifting from &#8220;sporadic events&#8221; to &#8220;systemic attacks.&#8221; We sat down with Tom Abbey (Account Executive, Trustpair) and Mo Ahmad (Global Procurement Technology Executive, SAP) to discuss how organizations can defend themselves in 2026. Key Takeaways for P2P Leaders Beyond BEC: The Rise of AI-Enabled Impersonation Q: [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":28069,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[117],"tags":[],"class_list":["post-28057","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud-protection-gb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI and Vendor Fraud: Why Your Vendor Master File is the First Line of Defense - Trustpair<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI and Vendor Fraud: Why Your Vendor Master File is the First Line of Defense - Trustpair\" \/>\n<meta property=\"og:description\" content=\"As AI tools become increasingly accessible, B2B fraud is shifting from &#8220;sporadic events&#8221; to &#8220;systemic attacks.&#8221; We sat down with Tom Abbey (Account Executive, Trustpair) and Mo Ahmad (Global Procurement Technology Executive, SAP) to discuss how organizations can defend themselves in 2026. Key Takeaways for P2P Leaders Beyond BEC: The Rise of AI-Enabled Impersonation Q: [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-30T08:56:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-30T12:38:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/SAP-Webinar-Website-660px-480px-copie.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1320\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julia Suarez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julia Suarez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/blog\\\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/blog\\\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\\\/\"},\"author\":{\"name\":\"Julia Suarez\",\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/#\\\/schema\\\/person\\\/f5876cae04765e0f672445de6e8b156e\"},\"headline\":\"AI and Vendor Fraud: Why Your Vendor Master File is the First Line of Defense\",\"datePublished\":\"2026-04-30T08:56:19+00:00\",\"dateModified\":\"2026-04-30T12:38:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/blog\\\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\\\/\"},\"wordCount\":637,\"publisher\":{\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/blog\\\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trustpair.com\\\/wp-content\\\/uploads\\\/SAP-Webinar-Website-660px-480px-copie.png\",\"articleSection\":[\"Fraud protection\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/blog\\\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\\\/\",\"url\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/blog\\\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\\\/\",\"name\":\"AI and Vendor Fraud: Why Your Vendor Master File is the First Line of Defense - Trustpair\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/blog\\\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/blog\\\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trustpair.com\\\/wp-content\\\/uploads\\\/SAP-Webinar-Website-660px-480px-copie.png\",\"datePublished\":\"2026-04-30T08:56:19+00:00\",\"dateModified\":\"2026-04-30T12:38:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/blog\\\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/trustpair.com\\\/gb\\\/blog\\\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/blog\\\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\\\/#primaryimage\",\"url\":\"https:\\\/\\\/trustpair.com\\\/wp-content\\\/uploads\\\/SAP-Webinar-Website-660px-480px-copie.png\",\"contentUrl\":\"https:\\\/\\\/trustpair.com\\\/wp-content\\\/uploads\\\/SAP-Webinar-Website-660px-480px-copie.png\",\"width\":1320,\"height\":960},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/blog\\\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI and Vendor Fraud: Why Your Vendor Master File is the First Line of Defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/#website\",\"url\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/\",\"name\":\"Trustpair\",\"description\":\"Leading Payment Fraud Prevention Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/trustpair.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Logo-trustpair.svg\",\"contentUrl\":\"https:\\\/\\\/trustpair.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/trustpair.com\\\/gb\\\/#\\\/schema\\\/person\\\/f5876cae04765e0f672445de6e8b156e\",\"name\":\"Julia Suarez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd9f3c948b449649167e4d1747849d71f61c74c1e83ac31ea56617e64a9aec5b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd9f3c948b449649167e4d1747849d71f61c74c1e83ac31ea56617e64a9aec5b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd9f3c948b449649167e4d1747849d71f61c74c1e83ac31ea56617e64a9aec5b?s=96&d=mm&r=g\",\"caption\":\"Julia Suarez\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI and Vendor Fraud: Why Your Vendor Master File is the First Line of Defense - Trustpair","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/","og_locale":"en_GB","og_type":"article","og_title":"AI and Vendor Fraud: Why Your Vendor Master File is the First Line of Defense - Trustpair","og_description":"As AI tools become increasingly accessible, B2B fraud is shifting from &#8220;sporadic events&#8221; to &#8220;systemic attacks.&#8221; We sat down with Tom Abbey (Account Executive, Trustpair) and Mo Ahmad (Global Procurement Technology Executive, SAP) to discuss how organizations can defend themselves in 2026. Key Takeaways for P2P Leaders Beyond BEC: The Rise of AI-Enabled Impersonation Q: [&hellip;]","og_url":"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/","og_site_name":"Trustpair","article_published_time":"2026-04-30T08:56:19+00:00","article_modified_time":"2026-04-30T12:38:30+00:00","og_image":[{"width":1320,"height":960,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/SAP-Webinar-Website-660px-480px-copie.png","type":"image\/png"}],"author":"Julia Suarez","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Julia Suarez","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/"},"author":{"name":"Julia Suarez","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/f5876cae04765e0f672445de6e8b156e"},"headline":"AI and Vendor Fraud: Why Your Vendor Master File is the First Line of Defense","datePublished":"2026-04-30T08:56:19+00:00","dateModified":"2026-04-30T12:38:30+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/"},"wordCount":637,"publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/SAP-Webinar-Website-660px-480px-copie.png","articleSection":["Fraud protection"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/","url":"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/","name":"AI and Vendor Fraud: Why Your Vendor Master File is the First Line of Defense - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/SAP-Webinar-Website-660px-480px-copie.png","datePublished":"2026-04-30T08:56:19+00:00","dateModified":"2026-04-30T12:38:30+00:00","breadcrumb":{"@id":"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/SAP-Webinar-Website-660px-480px-copie.png","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/SAP-Webinar-Website-660px-480px-copie.png","width":1320,"height":960},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/gb\/blog\/ai-and-vendor-fraud-why-your-vendor-master-file-is-the-first-line-of-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/gb\/"},{"@type":"ListItem","position":2,"name":"AI and Vendor Fraud: Why Your Vendor Master File is the First Line of Defense"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/gb\/#website","url":"https:\/\/trustpair.com\/gb\/","name":"Trustpair","description":"Leading Payment Fraud Prevention Platform","publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/gb\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/f5876cae04765e0f672445de6e8b156e","name":"Julia Suarez","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/fd9f3c948b449649167e4d1747849d71f61c74c1e83ac31ea56617e64a9aec5b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd9f3c948b449649167e4d1747849d71f61c74c1e83ac31ea56617e64a9aec5b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fd9f3c948b449649167e4d1747849d71f61c74c1e83ac31ea56617e64a9aec5b?s=96&d=mm&r=g","caption":"Julia Suarez"}}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/28057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/comments?post=28057"}],"version-history":[{"count":1,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/28057\/revisions"}],"predecessor-version":[{"id":28058,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/28057\/revisions\/28058"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media\/28069"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media?parent=28057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/categories?post=28057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/tags?post=28057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}