SlideShare a Scribd company logo
1 of 13
United States is one of the last
countries to implement the chip-and-pin
technology
October 1, 2015– Fraud Liability Shift
Will reduce card-present fraud
According to the Toledo Business
Journal, a credit union in Ohio incurred
over $100,000 in fraud losses due to
card compromises (Toledo Business
Journal, 2015).
• The implementation of EMV cards is going to change
the banking industry who holds the liability.
• Policy changes by MasterCard, American Express,
and Visa will protect from certain liability.
– Example: A bank issues EMV cards to customers, but the
merchant fails to adopt the chip-and-pin technology, then
merchant will face the liability in the event of a data
breach.
• Training is crucial when it comes to
training employees and could reduce
likelihood of accidental breaches
• One study showed that 78% IT
personnel indicated they have
experienced a data breach in result of
employee negligence (Abawajy, 2014).
• Training and awareness is the most
cost-effective form of security control!
• Many companies are
implementing
cybersecurity awareness
programs
• By increasing awareness,
the outcome of a security
breach may decrease
• Employees are frontline
defense against these
cyber criminals (ABA Banking
Journal, 2014)
• Employee negligence could
cost financial institutions
major loss and liabilities, and
affecting the reputation of
institutions.
• Many banks and credit unions
are starting to use the FFIEC
Cybersecurity Assessment
Tool (Released June 30,2015)
• Identity theft
– As EMV cards are deployed, it
should reduce card-present fraud;
BUT card-not-present fraud could
increase along with identity theft.
– Financial institutions are educating
their members with newsletters,
pamphlets, and on the company’s
websites.
– Some companies will likely start
implementing methods to
authenticate callers to prevent
phone “spoofing” (ABA Banking
Journal, 2014).
EMV cards
– Today, 100% of fraud liability is on the
card issuer
– Companies are trying to determine if the
cost of the technology is going to
outweigh the benefits
– Less than one quarter of retailers are
EMV compliant
– Numerous companies need to upgrade
their systems, but many say it’s
unnecessary.
– Companies are reluctant on upgrading
their POS systems due to how expensive
it is
• Training & Awareness-
– Many companies are starting to
employ phishing awareness
assessments amongst employees
– FFIEC and NIST took the steps to
increase awareness in the U.S. and
assist companies in calculating their
inherent risk profile (Stechyshyn, 2015).
– For those companies that do not have
a cybersecurity strategy in place, this
tool will guide them in developing
one.
– Institutions and other businesses are
already using this free resource
Conclusion
• These trends are not going away anytime soon
• Education is key!
• EMV cards are going to become the new
standard. By 2016, an estimated 500 million
EMV cards will be active in the U.S.
• Employees are the frontline defense against
these threat actors. Training is imperative!
• Abawajy, J. (2014). User Preference of Cyber Security Awareness Delivery Methods. Behavior
& Information Technology, 33(3), 236-247.
• Lazette, M. (2014). Credit union puts chips on fraud protection. Crain's Cleveland Business,
35(4), 5. Retrieved from
http://ezproxy.umuc.edu/login?url=http://search.proquest.com.ezproxy.umuc.edu/docview/1
494489918?accountid=14580
• Retailer cyber security harming area financial institutions. (2015). Toledo Business Journal,
31(6), 25. Retrieved from
http://ezproxy.umuc.edu/login?url=http://search.proquest.com.ezproxy.umuc.edu/docview/1
698149300?accountid=14580
• Sauer, C. (2014). Data Security: How Much Will EMV Help?. Credit Union Magazine, 80(7), 26.
• Working Together to Protect Against Identity Theft. (2014). ABA Banking Journal, 106(9),29-48
• Stechyshyn, A. (2015). Security vulnerabilities in financial institutions (Order No. 1586590).
Available from ProQuest Dissertations & Theses Global: Science & Technology. (1677223944).
Retrieved from
http://ezproxy.umuc.edu/login?url=http://search.proquest.com.ezproxy.umuc.edu/docview/1
677223944?accountid=14580

More Related Content

Similar to Cybersecurity trends in the banking industry

Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 
Information AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxInformation AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docx
jaggernaoma
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
Jim Romeo
 

Similar to Cybersecurity trends in the banking industry (20)

For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
 
How to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail BankHow to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail Bank
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Next Generation of the Previously Unthinkable
Next Generation of the Previously UnthinkableNext Generation of the Previously Unthinkable
Next Generation of the Previously Unthinkable
 
Information AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxInformation AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docx
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threats
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 
Machine Learning In Insurance
Machine Learning In InsuranceMachine Learning In Insurance
Machine Learning In Insurance
 
Mobile Payment Security Trends for the Future
Mobile Payment Security Trends for the FutureMobile Payment Security Trends for the Future
Mobile Payment Security Trends for the Future
 
Machine Leaning Insurance
Machine Leaning InsuranceMachine Leaning Insurance
Machine Leaning Insurance
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
WeDo Technologies Blog 2014
WeDo Technologies Blog 2014WeDo Technologies Blog 2014
WeDo Technologies Blog 2014
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
 
Finance + The Machine: who will win the trust battle?
Finance + The Machine: who will win the trust battle?Finance + The Machine: who will win the trust battle?
Finance + The Machine: who will win the trust battle?
 
Payment Gateway by iPay88
Payment Gateway by iPay88Payment Gateway by iPay88
Payment Gateway by iPay88
 

Recently uploaded

Experiencing the history of Masitise cave and housing in Lesotho
Experiencing the history of Masitise cave and housing in LesothoExperiencing the history of Masitise cave and housing in Lesotho
Experiencing the history of Masitise cave and housing in Lesotho
paballosylviatsunyan
 
Same Day Delhi To Agra Tour By Car | Delhi To Agra Tour By Cab
Same Day Delhi To Agra Tour By Car | Delhi To Agra Tour By CabSame Day Delhi To Agra Tour By Car | Delhi To Agra Tour By Cab
Same Day Delhi To Agra Tour By Car | Delhi To Agra Tour By Cab
Dial4Cab
 
Explore amazing adventures in the mountain kingdom country
Explore amazing adventures in the mountain kingdom countryExplore amazing adventures in the mountain kingdom country
Explore amazing adventures in the mountain kingdom country
mantsebo72
 
Recovery Heroes 247- Recovery Services.pdf
Recovery Heroes 247- Recovery Services.pdfRecovery Heroes 247- Recovery Services.pdf
Recovery Heroes 247- Recovery Services.pdf
Recovery Heroes 247
 

Recently uploaded (20)

Tourism attraction in Lesotho 2024 .pptx
Tourism attraction in Lesotho 2024 .pptxTourism attraction in Lesotho 2024 .pptx
Tourism attraction in Lesotho 2024 .pptx
 
Experiencing the history of Masitise cave and housing in Lesotho
Experiencing the history of Masitise cave and housing in LesothoExperiencing the history of Masitise cave and housing in Lesotho
Experiencing the history of Masitise cave and housing in Lesotho
 
Explore the Best of North India Shimla, Manali, Dalhousie, Delhi .pdf
Explore the Best of North India Shimla, Manali, Dalhousie, Delhi .pdfExplore the Best of North India Shimla, Manali, Dalhousie, Delhi .pdf
Explore the Best of North India Shimla, Manali, Dalhousie, Delhi .pdf
 
Same Day Delhi To Agra Tour By Car | Delhi To Agra Tour By Cab
Same Day Delhi To Agra Tour By Car | Delhi To Agra Tour By CabSame Day Delhi To Agra Tour By Car | Delhi To Agra Tour By Cab
Same Day Delhi To Agra Tour By Car | Delhi To Agra Tour By Cab
 
A_Brief_Introductory_of_Nuristan, by Ab.Hakim Hakimi.pdf
A_Brief_Introductory_of_Nuristan, by Ab.Hakim Hakimi.pdfA_Brief_Introductory_of_Nuristan, by Ab.Hakim Hakimi.pdf
A_Brief_Introductory_of_Nuristan, by Ab.Hakim Hakimi.pdf
 
Explore amazing adventures in the mountain kingdom country
Explore amazing adventures in the mountain kingdom countryExplore amazing adventures in the mountain kingdom country
Explore amazing adventures in the mountain kingdom country
 
Awesome places one can visit in Lesotho.
Awesome places one can visit in Lesotho.Awesome places one can visit in Lesotho.
Awesome places one can visit in Lesotho.
 
Tourist_Attractions_in_Lesotho_prepared_by_Reabetsoe_Bereng.pptx
Tourist_Attractions_in_Lesotho_prepared_by_Reabetsoe_Bereng.pptxTourist_Attractions_in_Lesotho_prepared_by_Reabetsoe_Bereng.pptx
Tourist_Attractions_in_Lesotho_prepared_by_Reabetsoe_Bereng.pptx
 
Tourism attraction in Lesotho 2024 .pptx
Tourism attraction in Lesotho 2024 .pptxTourism attraction in Lesotho 2024 .pptx
Tourism attraction in Lesotho 2024 .pptx
 
Tourist_Attractions_in_Lesotho_prepared_by_Teboho_Majoro.pptx
Tourist_Attractions_in_Lesotho_prepared_by_Teboho_Majoro.pptxTourist_Attractions_in_Lesotho_prepared_by_Teboho_Majoro.pptx
Tourist_Attractions_in_Lesotho_prepared_by_Teboho_Majoro.pptx
 
Tourism in Lesotho by Boitumelo Ntlhane.pptx
Tourism in Lesotho by Boitumelo Ntlhane.pptxTourism in Lesotho by Boitumelo Ntlhane.pptx
Tourism in Lesotho by Boitumelo Ntlhane.pptx
 
Recovery Heroes 247- Recovery Services.pdf
Recovery Heroes 247- Recovery Services.pdfRecovery Heroes 247- Recovery Services.pdf
Recovery Heroes 247- Recovery Services.pdf
 
The most tourism attractions in Lesotho.
The most tourism attractions in Lesotho.The most tourism attractions in Lesotho.
The most tourism attractions in Lesotho.
 
Taxi Bambino is a service providing clients with taxis with car seats for the...
Taxi Bambino is a service providing clients with taxis with car seats for the...Taxi Bambino is a service providing clients with taxis with car seats for the...
Taxi Bambino is a service providing clients with taxis with car seats for the...
 
Explore the Rich History of Northeast Sicily
Explore the Rich History of Northeast SicilyExplore the Rich History of Northeast Sicily
Explore the Rich History of Northeast Sicily
 
What Should I Know Before Booking A Catamaran In Aruba
What Should I Know Before Booking A Catamaran In ArubaWhat Should I Know Before Booking A Catamaran In Aruba
What Should I Know Before Booking A Catamaran In Aruba
 
Myanmar 80 Greetings and colors from Myanmar
Myanmar 80 Greetings and colors from MyanmarMyanmar 80 Greetings and colors from Myanmar
Myanmar 80 Greetings and colors from Myanmar
 
10 precious day Vietnam ( 19-28 Sep ) .pdf
10 precious day Vietnam ( 19-28 Sep ) .pdf10 precious day Vietnam ( 19-28 Sep ) .pdf
10 precious day Vietnam ( 19-28 Sep ) .pdf
 
6 Unmissable Czech Food Experiences to try in Prague
6 Unmissable Czech Food Experiences to try in Prague6 Unmissable Czech Food Experiences to try in Prague
6 Unmissable Czech Food Experiences to try in Prague
 
Essential Grammar in Use 4th Edition by R. Murphy.pdf
Essential Grammar in Use 4th Edition by R. Murphy.pdfEssential Grammar in Use 4th Edition by R. Murphy.pdf
Essential Grammar in Use 4th Edition by R. Murphy.pdf
 

Cybersecurity trends in the banking industry

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. United States is one of the last countries to implement the chip-and-pin technology October 1, 2015– Fraud Liability Shift Will reduce card-present fraud According to the Toledo Business Journal, a credit union in Ohio incurred over $100,000 in fraud losses due to card compromises (Toledo Business Journal, 2015).
  • 6. • The implementation of EMV cards is going to change the banking industry who holds the liability. • Policy changes by MasterCard, American Express, and Visa will protect from certain liability. – Example: A bank issues EMV cards to customers, but the merchant fails to adopt the chip-and-pin technology, then merchant will face the liability in the event of a data breach.
  • 7. • Training is crucial when it comes to training employees and could reduce likelihood of accidental breaches • One study showed that 78% IT personnel indicated they have experienced a data breach in result of employee negligence (Abawajy, 2014). • Training and awareness is the most cost-effective form of security control!
  • 8. • Many companies are implementing cybersecurity awareness programs • By increasing awareness, the outcome of a security breach may decrease • Employees are frontline defense against these cyber criminals (ABA Banking Journal, 2014) • Employee negligence could cost financial institutions major loss and liabilities, and affecting the reputation of institutions. • Many banks and credit unions are starting to use the FFIEC Cybersecurity Assessment Tool (Released June 30,2015)
  • 9. • Identity theft – As EMV cards are deployed, it should reduce card-present fraud; BUT card-not-present fraud could increase along with identity theft. – Financial institutions are educating their members with newsletters, pamphlets, and on the company’s websites. – Some companies will likely start implementing methods to authenticate callers to prevent phone “spoofing” (ABA Banking Journal, 2014).
  • 10. EMV cards – Today, 100% of fraud liability is on the card issuer – Companies are trying to determine if the cost of the technology is going to outweigh the benefits – Less than one quarter of retailers are EMV compliant – Numerous companies need to upgrade their systems, but many say it’s unnecessary. – Companies are reluctant on upgrading their POS systems due to how expensive it is
  • 11. • Training & Awareness- – Many companies are starting to employ phishing awareness assessments amongst employees – FFIEC and NIST took the steps to increase awareness in the U.S. and assist companies in calculating their inherent risk profile (Stechyshyn, 2015). – For those companies that do not have a cybersecurity strategy in place, this tool will guide them in developing one. – Institutions and other businesses are already using this free resource
  • 12. Conclusion • These trends are not going away anytime soon • Education is key! • EMV cards are going to become the new standard. By 2016, an estimated 500 million EMV cards will be active in the U.S. • Employees are the frontline defense against these threat actors. Training is imperative!
  • 13. • Abawajy, J. (2014). User Preference of Cyber Security Awareness Delivery Methods. Behavior & Information Technology, 33(3), 236-247. • Lazette, M. (2014). Credit union puts chips on fraud protection. Crain's Cleveland Business, 35(4), 5. Retrieved from http://ezproxy.umuc.edu/login?url=http://search.proquest.com.ezproxy.umuc.edu/docview/1 494489918?accountid=14580 • Retailer cyber security harming area financial institutions. (2015). Toledo Business Journal, 31(6), 25. Retrieved from http://ezproxy.umuc.edu/login?url=http://search.proquest.com.ezproxy.umuc.edu/docview/1 698149300?accountid=14580 • Sauer, C. (2014). Data Security: How Much Will EMV Help?. Credit Union Magazine, 80(7), 26. • Working Together to Protect Against Identity Theft. (2014). ABA Banking Journal, 106(9),29-48 • Stechyshyn, A. (2015). Security vulnerabilities in financial institutions (Order No. 1586590). Available from ProQuest Dissertations & Theses Global: Science & Technology. (1677223944). Retrieved from http://ezproxy.umuc.edu/login?url=http://search.proquest.com.ezproxy.umuc.edu/docview/1 677223944?accountid=14580