SlideShare a Scribd company logo
1 of 49
Download to read offline
WEBINAR
BALANCING SECURITY &
CUSTOMER EXPERIENCE
7/19/16
MAX ANHOURY , VP, Global Partnerships
AGENDA
2
n Introduction
n Fraud & Security Trends
n Frictionless Security Across the
Consumer Journey
n Summary
3
IOVATION INC.
SOLUTIONS: Authentication and Fraud Prevention
CUSTOMERS:450+, 6 Continents, 18 Time Zones
FOUNDED: 2004
CUSTOMERRETENTION: 96%
HEADQUARTERS: Portland, Oregon
EMPLOYEES: 125
INVESTORS: Intel Capital, Sapphire Ventures
COMMUNITY: 3,500 Fraud Professionals
TOTAL TRANSACTIONS: 20B
BRANDS PROTECTED:1,500+
4
Every device tells a story.
What stories do you care about?
Am I authorized for
this account?
Where am I located?
Do I have a fraud history?
What other devices does
this consumer have?
How many accounts
have I accessed?
Am I hiding from
detection?
5
If a device can connect to the internet,
we can recognize it.
6
Which device is this?
Is it associated with bad devices?
Are there real time risk indicators?
Is it associated with abuse?
DEEP DEVICE INTELLIGENCE:
BEYOND DEVICE RECOGNITION
7
EVIDENCE
GEOLOCATIONAGE-BASED
ANOMALY
RISK PROFILE
VELOCITY
DEEP DEVICE INTELLIGENCE
STOPPING A FRAUD
RING IN SO. CA.
9
Ø 150 transactions
Ø 50 Transactions
Ø 20 transactions
Ø 10 transactions
✪
✪
¤
¤
AT 30 , 0 0 0 F T, THE F RAUD RING L OOKS L IKE THIS
10
T H E T R E N D OF T R A N SA C T ION A C T IV IT Y OV E R T IME
0
10
20
30
40
50
60
15 16 17 18 19 20 21 22 23 24 25
TransactionCount
Week
Credit Bureaus
Financial Institutions
Retail
Other
actual activity noted with dashed lines
11
Results of activity over 4 months
• Searched for devices matching this profile:
• Devices with activity with 3 or more subscribers
• 2 of 3 subscribers within financial services industry
• Devices with fraud histories from at least 2 subscribers
2K+
ACTIVE DEVICES
100K+
TRANSACTIONS
50K
ACCOUNTS
Performing Involving
$
Step 1: Search existing fraud activity
12
Step 2: Review account and transaction velocity
Count of
Devices
Average
Accounts
Accessed
Average Total
Transactions
Average
Subscriber
Count
% with Credit
Bureau
Activity
All Devices Profiled 2,126 23 47 9 43%
20+ Accounts Accessed 880 40 79 12 55%
Highest was 259 accts
accessed by single device
100+ Total Transactions 211 64 165 15 66%
2 devices had over 1,300
transactions attempted
+10 Transactions/ Day 61 29 89 7 37%
Highest trans/day was 659
(21 trans. in 44 minutes)
13
Step 3: Associate devices & activity using data from our
global network of our subscribers
The group expands from 50k to 300k accounts
~16K+
ACTIVE DEVICES
~670K+
TRANSACTIONS
~300K
ACCOUNTS
Performing Involving
$
14
• This device is associated with 13 additional devices through common account access.
• Then we reviewed the prior history to understand the connected activity.
Step 4: Investigate details on an individual device
15
• The 28 new account apps from Riverside were across 8 subscribers, demonstrating the effort
taken to monetize stolen credentials.
• Additional activity not accounted for above:
3 Credit Report access attempts from another Riverside address on 4/27
2 Credit Card Apps and 3 Login attempts from Whittier, CA (near Whittier College) on 5/17
4 Credit Card Apps and 18 Credit Report access attempts from a T-Mobile cell connection
Subscriber Industry Transaction Type Riverside, CA Mira Loma, CA
Univ of California –
Riverside
Totals
Financial Services
New Acct Application
Online Account Login
28
28
5
1
1
34
29
Credit Reporting Agency Access Attempt 227 9 14 250
Retail Purchase 2 14 16
Telecommunications Online Account Login 1 1
Travel Purchase 2 2
Device Activity
Step 5: compile fraud activity by location
16
Ø 150 transactions
Ø 50 Transactions
Ø 20 transactions
Ø 10 transactions
✪
✪
¤
¤
AT 30 , 0 0 0 F T, THE F RAUD RING L OOKS L IKE THIS
17
T H E T R E N D OF T R A N SA C T ION A C T IV IT Y OV E R T IME
0
10
20
30
40
50
60
15 16 17 18 19 20 21 22 23 24 25
TransactionCount
Week
Credit Bureaus
Financial Institutions
Retail
Other
actual activity noted with dashed lines
FRAUD & SECURITY
TRENDS
19
are using a
password that is
47% 77%
5+ YEARS OLD 1+ YEARS OLD
are using a
password that is
20
73%
of accounts
use duplicate
passwords.
*********
21
Record high for data
breaches
TARGET
EBAY
ADOBESONY
70M 10M
145M
152M
1.32 BILLION
RECORDS EXPOSED
IDENTITY THEFT RESOURCE CENTER
HOME DEPOT
56M MySpace
Tumblr
Fling
LinkedIn
642M
22
DATA
BREACHES
$5B in 2014
$8B in 2018
Data breaches will drive a 60%
increase in Account Takeover
and New Account Fraud.
60%
SOURCE: JAVELIN, 2015
INCREASE
23
F RAUD F ROM IDENTITY THEF T
24
GROWTH IN SYNTHETIC F RAUD ATTEMPTS
For a blend of consumer loan issuers, syntheticidentity frauds
were 4X more frequent than true identity fraud (1st Party & 3rd Party)
Contributing Factors
Appeal of
victim-less fraud
SSN Randomization
Increasing availability of
valid PII
0%
2%
4%
6%
8%
10%
12%
14%
2010 2011 2012 2013 2014 2015
Synthetic Fraud Rate "True Identity" Fraud Rate
SSN Randomization
takes effect
© 2016 ID Analytics
25
The evolving
online experience
26
Every online
transaction
is a potential
source of risk.
ACCOUNT
CREATION
LOGIN
BROWSE
STORE
PURCHASE
USE
REWARD
POINTS
CHANGE
ACCOUNT
DETAILS
27
ACCOUNT
CREATION
LOGIN
BROWSE
STORE
PURCHASE
USE
REWARD
POINTS
CHANGE
ACCOUNT
DETAILS
Every online
transaction
represents
your brand.
28
ACCOUNT
CREATION
LOGIN
BROWSE
STORE
PURCHASE
USE
REWARD
POINTS
CHANGE
ACCOUNT
DETAILS
Mobile devices
are proliferating
and becoming an
extension of your
customers.
29
LOGIN
CHANGE
ACCOUNTDETAILS
ADD ITEMS
TO SHOPPING CART
REDEEM
REWARDS POINTS
Your customers expect a frictionless user experience
across multiple channels: web, mobile web, mobile app
ACCOUNT
CREATION
PURCHASEVIEW
ORDER
BROWSE
CATALOG
Your business depends on happy customers balanced with
minimizing fraud risks and security
TYPICAL CONSUMER JOURNEY FOR ONLINE RETAIL
30
LOGIN
CHANGE
ACCOUNTDETAILS
CHECK
BALANCE
VISITBRANCH OR
CONTACT CALL CENTER
LOAN ORIGINATION
OR
ACCOUNTCREATION
CHECK BALANCE,
DEPOSIT, PAYMENT
WITHDRAWAL,
TRANSFER
TYPICAL CONSUMER JOURNEY FOR FINANCIAL SERVICES
31
LOGIN
CHANGE
ACCOUNTDETAILS
ADD ITEMS
TO SHOPPING CART
REDEEM
REWARDS POINTS
ACCOUNT
CREATION
PURCHASEVIEW
ORDER
BROWSE
CATALOG
Your business depends on happy customers balanced with
minimizing fraud risks and security
Device Intelligence can help
achieve this balance
Your customers expect a frictionless user experience
across multiple channels: web, mobile web, mobile app
32
AUTHORIZED
FOR ACCOUNT
HISTORICAL
REPUTATION
ANOMALOUS
BEHAVIOR
SECURITY RISK
INDICATORS
LINKSAND
ASSOCIATIONS
Use the device as the invisible second factor.
Device intelligence can be used for
frictionless authentication.
33
The benefit of using device intelligence
across the consumer online journey
34
Concerns:
Fraud prevention: 1st or 3rd party
account creation fraud
Device Intelligence Indicators
• High velocity rate
• Previous associated fraud evidence
• Geo-location
• Device evasion
• History of device
Application
Origination
35
Application
Origination
“Since we deployed iovation, we have
experienced dramatically lower fraud
losses resulting from the online credit
card application channel.”
-- CristinaKoder,
Fraud Operations Supervisor
Significant reduction in fraudulent credit applications
iovation helped:
n Link fraudulent devices and accounts together
n Determine real location vs stated location
Case Study: Financial Services
Challenges:
n Fraudsters applying for credit with stolen identity
n Risky transactions coming from multiple
geographies
36
AUTHORIZED
FOR ACCOUNT
HISTORICAL
REPUTATION
ANOMALOUS
BEHAVIOR
SECURITY RISK
INDICATORS
LINKSAND
ASSOCIATIONS
Device-based Authentication
Use the device as the invisible second factor.
37
PASSWORD-BASED
AUTHENTICATION
STEP UP
1-Factor Experience & 2-Factor Security
Users expect a low-friction authentication experience for most logins.
Interacting with a 2nd
factor of authentication is not low-friction.
1-FACTOR 2-FACTOR
Desired User Experience Required Security
38
Concerns:
n Stolen payment credentials
n International fraud rings
n Chargebacks
Device Intelligence Indicators
n High velocity rate
n Links to other accounts and devices
n Previous associated fraud evidence
n Geo-location
n Device evasion
n History of device
Guest
Checkout
39
“iovation’s device reputation
technology adds an incredibly
important layer of protection
to our fraud efforts”
-- Fraud Manager
reduction in order fraud
n iovation helped:
n Find and link previously unrelated accounts & devices
n Reduce manual reviews
n Identify & stop high-risk transactions
Case Study:
Electronics Retailer
n Challenges:
n Fraudsters constantly evolve new techniques to escape
detection
n Stolen payment credentials
n Hard to shut down international fraud rings
Guest
Checkout
25%
40
Our story starts
with a stolen
identity…
41
Within just a
few days…
charged over $5,000
in online purchases
42
The device
had a history…
43
Fraud
evidence
was placed
44
The fraudster was arrested.
45
15 identity theft victims
20 major retailers targeted with CNP fraud
60 credit apps
$70K restitution
$100K in projected losses
1
Person
Fraud Ring
46
LOGIN
CHANGE
ACCOUNTDETAILS
CHECK
BALANCE
WITHDRAWAL, FUND
TRANSFER
iovation helps you balance security with user experience
across the consumer journey
LOAN ORIGINATION
OR
ACCOUNTCREATION
CHECK BALANCE,
DEPOSIT
MAKE PAYMENTS
CUSTOMER
AUTHENTICATION
FRAUD
PREVENTION
Q&A
48
ANNUAL F RAUD F ORCE SUMMIT
R EGISTER @ www.fraudforcesummit.com
U S E P R O M O C O D E ‘ w e b i n a r 1 0 0 ’ T O S A V E $ 1 0 0
K E Y N O T E SPE AK E R :
THERESA PAYTON
FORMER WHITE HOUSE CIO
49
THANK YOU!

More Related Content

What's hot

Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesTransUnion
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud managementrkappear
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengKnowledge Group
 
Enterprise Fraud Management
Enterprise Fraud ManagementEnterprise Fraud Management
Enterprise Fraud ManagementManish Desai
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...Ken Lam
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule GeneralTeo Leonard
 

What's hot (10)

Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee Seng
 
Enterprise Fraud Management
Enterprise Fraud ManagementEnterprise Fraud Management
Enterprise Fraud Management
 
A guide to Financial Crime Management
A guide to Financial Crime ManagementA guide to Financial Crime Management
A guide to Financial Crime Management
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
 

Viewers also liked

“Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World “Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World Internet Society
 
Leveraging security to develop new digital banking models
Leveraging security to develop new digital banking modelsLeveraging security to develop new digital banking models
Leveraging security to develop new digital banking modelsLuis Saiz Gimeno
 
E banking & security
E banking & securityE banking & security
E banking & securitySumeer Sharma
 
Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?Ocean9, Inc.
 
E-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-Commerce
E-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-CommerceE-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-Commerce
E-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-CommerceE-Commerce Berlin EXPO
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet BankingChiheb Chebbi
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and SolutionsClarice_Wilson
 
Banking Industry and Information Technology
Banking Industry and Information TechnologyBanking Industry and Information Technology
Banking Industry and Information TechnologyChandan Pahelwani
 
Tech developments in banking sector
Tech developments in banking sectorTech developments in banking sector
Tech developments in banking sectorsuhasmcomplex
 
ATM Awareness Guide
ATM Awareness GuideATM Awareness Guide
ATM Awareness GuideDaniel Cheah
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.worldstuff
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Siya Agarwal
 

Viewers also liked (17)

“Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World “Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World
 
Leveraging security to develop new digital banking models
Leveraging security to develop new digital banking modelsLeveraging security to develop new digital banking models
Leveraging security to develop new digital banking models
 
E banking & security
E banking & securityE banking & security
E banking & security
 
Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?
 
E-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-Commerce
E-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-CommerceE-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-Commerce
E-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-Commerce
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
E banking security
E banking securityE banking security
E banking security
 
Atm security
Atm securityAtm security
Atm security
 
Banking Industry and Information Technology
Banking Industry and Information TechnologyBanking Industry and Information Technology
Banking Industry and Information Technology
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
 
Tech developments in banking sector
Tech developments in banking sectorTech developments in banking sector
Tech developments in banking sector
 
ATM Awareness Guide
ATM Awareness GuideATM Awareness Guide
ATM Awareness Guide
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 

Similar to Balancing Security and CX Webinar Summary

The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...Elizabeth Dimit
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionTransUnion
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganKen Lam
 
Risk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechRisk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechGeo Coelho
 
ATM Fraud Prevention Management White Paper from ESQ
 ATM Fraud Prevention Management White Paper from ESQ ATM Fraud Prevention Management White Paper from ESQ
ATM Fraud Prevention Management White Paper from ESQESQ Business Services
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacylgcdcpas
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments FraudChristopher Uriarte
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industryitio Innovex Pvt Ltv
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeLaurent Pacalin
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Brunswick Group
 

Similar to Balancing Security and CX Webinar Summary (20)

The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
 
Risk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechRisk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTech
 
Infographic - What is Vishing?
Infographic - What is Vishing?Infographic - What is Vishing?
Infographic - What is Vishing?
 
ATM Fraud Prevention Management White Paper from ESQ
 ATM Fraud Prevention Management White Paper from ESQ ATM Fraud Prevention Management White Paper from ESQ
ATM Fraud Prevention Management White Paper from ESQ
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
Rise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScanRise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScan
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industry
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
 
Greg Wolfond
Greg WolfondGreg Wolfond
Greg Wolfond
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
 

More from TransUnion

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...TransUnion
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesTransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipTransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar TransUnion
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4TransUnion
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayTransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedTransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalTransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingTransUnion
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...TransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropeTransUnion
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsTransUnion
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report HighlightsTransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityTransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...TransUnion
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...TransUnion
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...TransUnion
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...TransUnion
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)TransUnion
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPRTransUnion
 

More from TransUnion (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 

Recently uploaded

(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 

Recently uploaded (20)

(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 

Balancing Security and CX Webinar Summary

  • 1. WEBINAR BALANCING SECURITY & CUSTOMER EXPERIENCE 7/19/16 MAX ANHOURY , VP, Global Partnerships
  • 2. AGENDA 2 n Introduction n Fraud & Security Trends n Frictionless Security Across the Consumer Journey n Summary
  • 3. 3 IOVATION INC. SOLUTIONS: Authentication and Fraud Prevention CUSTOMERS:450+, 6 Continents, 18 Time Zones FOUNDED: 2004 CUSTOMERRETENTION: 96% HEADQUARTERS: Portland, Oregon EMPLOYEES: 125 INVESTORS: Intel Capital, Sapphire Ventures COMMUNITY: 3,500 Fraud Professionals TOTAL TRANSACTIONS: 20B BRANDS PROTECTED:1,500+
  • 4. 4 Every device tells a story. What stories do you care about? Am I authorized for this account? Where am I located? Do I have a fraud history? What other devices does this consumer have? How many accounts have I accessed? Am I hiding from detection?
  • 5. 5 If a device can connect to the internet, we can recognize it.
  • 6. 6 Which device is this? Is it associated with bad devices? Are there real time risk indicators? Is it associated with abuse? DEEP DEVICE INTELLIGENCE: BEYOND DEVICE RECOGNITION
  • 9. 9 Ø 150 transactions Ø 50 Transactions Ø 20 transactions Ø 10 transactions ✪ ✪ ¤ ¤ AT 30 , 0 0 0 F T, THE F RAUD RING L OOKS L IKE THIS
  • 10. 10 T H E T R E N D OF T R A N SA C T ION A C T IV IT Y OV E R T IME 0 10 20 30 40 50 60 15 16 17 18 19 20 21 22 23 24 25 TransactionCount Week Credit Bureaus Financial Institutions Retail Other actual activity noted with dashed lines
  • 11. 11 Results of activity over 4 months • Searched for devices matching this profile: • Devices with activity with 3 or more subscribers • 2 of 3 subscribers within financial services industry • Devices with fraud histories from at least 2 subscribers 2K+ ACTIVE DEVICES 100K+ TRANSACTIONS 50K ACCOUNTS Performing Involving $ Step 1: Search existing fraud activity
  • 12. 12 Step 2: Review account and transaction velocity Count of Devices Average Accounts Accessed Average Total Transactions Average Subscriber Count % with Credit Bureau Activity All Devices Profiled 2,126 23 47 9 43% 20+ Accounts Accessed 880 40 79 12 55% Highest was 259 accts accessed by single device 100+ Total Transactions 211 64 165 15 66% 2 devices had over 1,300 transactions attempted +10 Transactions/ Day 61 29 89 7 37% Highest trans/day was 659 (21 trans. in 44 minutes)
  • 13. 13 Step 3: Associate devices & activity using data from our global network of our subscribers The group expands from 50k to 300k accounts ~16K+ ACTIVE DEVICES ~670K+ TRANSACTIONS ~300K ACCOUNTS Performing Involving $
  • 14. 14 • This device is associated with 13 additional devices through common account access. • Then we reviewed the prior history to understand the connected activity. Step 4: Investigate details on an individual device
  • 15. 15 • The 28 new account apps from Riverside were across 8 subscribers, demonstrating the effort taken to monetize stolen credentials. • Additional activity not accounted for above: 3 Credit Report access attempts from another Riverside address on 4/27 2 Credit Card Apps and 3 Login attempts from Whittier, CA (near Whittier College) on 5/17 4 Credit Card Apps and 18 Credit Report access attempts from a T-Mobile cell connection Subscriber Industry Transaction Type Riverside, CA Mira Loma, CA Univ of California – Riverside Totals Financial Services New Acct Application Online Account Login 28 28 5 1 1 34 29 Credit Reporting Agency Access Attempt 227 9 14 250 Retail Purchase 2 14 16 Telecommunications Online Account Login 1 1 Travel Purchase 2 2 Device Activity Step 5: compile fraud activity by location
  • 16. 16 Ø 150 transactions Ø 50 Transactions Ø 20 transactions Ø 10 transactions ✪ ✪ ¤ ¤ AT 30 , 0 0 0 F T, THE F RAUD RING L OOKS L IKE THIS
  • 17. 17 T H E T R E N D OF T R A N SA C T ION A C T IV IT Y OV E R T IME 0 10 20 30 40 50 60 15 16 17 18 19 20 21 22 23 24 25 TransactionCount Week Credit Bureaus Financial Institutions Retail Other actual activity noted with dashed lines
  • 19. 19 are using a password that is 47% 77% 5+ YEARS OLD 1+ YEARS OLD are using a password that is
  • 21. 21 Record high for data breaches TARGET EBAY ADOBESONY 70M 10M 145M 152M 1.32 BILLION RECORDS EXPOSED IDENTITY THEFT RESOURCE CENTER HOME DEPOT 56M MySpace Tumblr Fling LinkedIn 642M
  • 22. 22 DATA BREACHES $5B in 2014 $8B in 2018 Data breaches will drive a 60% increase in Account Takeover and New Account Fraud. 60% SOURCE: JAVELIN, 2015 INCREASE
  • 23. 23 F RAUD F ROM IDENTITY THEF T
  • 24. 24 GROWTH IN SYNTHETIC F RAUD ATTEMPTS For a blend of consumer loan issuers, syntheticidentity frauds were 4X more frequent than true identity fraud (1st Party & 3rd Party) Contributing Factors Appeal of victim-less fraud SSN Randomization Increasing availability of valid PII 0% 2% 4% 6% 8% 10% 12% 14% 2010 2011 2012 2013 2014 2015 Synthetic Fraud Rate "True Identity" Fraud Rate SSN Randomization takes effect © 2016 ID Analytics
  • 26. 26 Every online transaction is a potential source of risk. ACCOUNT CREATION LOGIN BROWSE STORE PURCHASE USE REWARD POINTS CHANGE ACCOUNT DETAILS
  • 29. 29 LOGIN CHANGE ACCOUNTDETAILS ADD ITEMS TO SHOPPING CART REDEEM REWARDS POINTS Your customers expect a frictionless user experience across multiple channels: web, mobile web, mobile app ACCOUNT CREATION PURCHASEVIEW ORDER BROWSE CATALOG Your business depends on happy customers balanced with minimizing fraud risks and security TYPICAL CONSUMER JOURNEY FOR ONLINE RETAIL
  • 30. 30 LOGIN CHANGE ACCOUNTDETAILS CHECK BALANCE VISITBRANCH OR CONTACT CALL CENTER LOAN ORIGINATION OR ACCOUNTCREATION CHECK BALANCE, DEPOSIT, PAYMENT WITHDRAWAL, TRANSFER TYPICAL CONSUMER JOURNEY FOR FINANCIAL SERVICES
  • 31. 31 LOGIN CHANGE ACCOUNTDETAILS ADD ITEMS TO SHOPPING CART REDEEM REWARDS POINTS ACCOUNT CREATION PURCHASEVIEW ORDER BROWSE CATALOG Your business depends on happy customers balanced with minimizing fraud risks and security Device Intelligence can help achieve this balance Your customers expect a frictionless user experience across multiple channels: web, mobile web, mobile app
  • 32. 32 AUTHORIZED FOR ACCOUNT HISTORICAL REPUTATION ANOMALOUS BEHAVIOR SECURITY RISK INDICATORS LINKSAND ASSOCIATIONS Use the device as the invisible second factor. Device intelligence can be used for frictionless authentication.
  • 33. 33 The benefit of using device intelligence across the consumer online journey
  • 34. 34 Concerns: Fraud prevention: 1st or 3rd party account creation fraud Device Intelligence Indicators • High velocity rate • Previous associated fraud evidence • Geo-location • Device evasion • History of device Application Origination
  • 35. 35 Application Origination “Since we deployed iovation, we have experienced dramatically lower fraud losses resulting from the online credit card application channel.” -- CristinaKoder, Fraud Operations Supervisor Significant reduction in fraudulent credit applications iovation helped: n Link fraudulent devices and accounts together n Determine real location vs stated location Case Study: Financial Services Challenges: n Fraudsters applying for credit with stolen identity n Risky transactions coming from multiple geographies
  • 37. 37 PASSWORD-BASED AUTHENTICATION STEP UP 1-Factor Experience & 2-Factor Security Users expect a low-friction authentication experience for most logins. Interacting with a 2nd factor of authentication is not low-friction. 1-FACTOR 2-FACTOR Desired User Experience Required Security
  • 38. 38 Concerns: n Stolen payment credentials n International fraud rings n Chargebacks Device Intelligence Indicators n High velocity rate n Links to other accounts and devices n Previous associated fraud evidence n Geo-location n Device evasion n History of device Guest Checkout
  • 39. 39 “iovation’s device reputation technology adds an incredibly important layer of protection to our fraud efforts” -- Fraud Manager reduction in order fraud n iovation helped: n Find and link previously unrelated accounts & devices n Reduce manual reviews n Identify & stop high-risk transactions Case Study: Electronics Retailer n Challenges: n Fraudsters constantly evolve new techniques to escape detection n Stolen payment credentials n Hard to shut down international fraud rings Guest Checkout 25%
  • 40. 40 Our story starts with a stolen identity…
  • 41. 41 Within just a few days… charged over $5,000 in online purchases
  • 42. 42 The device had a history…
  • 44. 44 The fraudster was arrested.
  • 45. 45 15 identity theft victims 20 major retailers targeted with CNP fraud 60 credit apps $70K restitution $100K in projected losses 1 Person Fraud Ring
  • 46. 46 LOGIN CHANGE ACCOUNTDETAILS CHECK BALANCE WITHDRAWAL, FUND TRANSFER iovation helps you balance security with user experience across the consumer journey LOAN ORIGINATION OR ACCOUNTCREATION CHECK BALANCE, DEPOSIT MAKE PAYMENTS CUSTOMER AUTHENTICATION FRAUD PREVENTION
  • 47. Q&A
  • 48. 48 ANNUAL F RAUD F ORCE SUMMIT R EGISTER @ www.fraudforcesummit.com U S E P R O M O C O D E ‘ w e b i n a r 1 0 0 ’ T O S A V E $ 1 0 0 K E Y N O T E SPE AK E R : THERESA PAYTON FORMER WHITE HOUSE CIO