SlideShare a Scribd company logo
1 of 32
WEBINAR
EIGHT MONTHS OF EMV
EARLY FRAUD SHIFTS AND TRAJECTORY
JUNE 2016
2
The transition to EMV card
types will drive major
changes in consumer
behavior, in infrastructure and
liablility, and in fraud
patterns.
How do experiences in other
countries help us prepare
for these shifts?
3
JU LIE C ON R OY
R E S E A R C H D I R E C T O R
 Head of Aite Group’s Retail Banking & Payments practice, covering
fraud, data security, anti-money laundering, and compliance.
 VP-level product management roles in financial services, risk
management and payment processing.
MICHAEL THELANDER
P R O D U C T M A R K E T I N G M A N A G E R , A U T H E N T I C A T I O N
 Manages go-to-market, launch and customer education activities for
iovation’s authentication products.
 20 years in VP- and director-level product management and product
marketing roles for information security companies.
4
AGENDA
1
2
3
4
WHY & WHAT
Understanding EMV transition
Goals and desired outcomes
LESSONS LEARNED
Experiences in other countries
Fraud trends and directions
EXPECT THE EXPECTED What will we see in the U.S.?
HOW TO PREPARE
What tools are at your disposal
What’s next for card-not-present fraud?
WHY & WHAT
WHAT PROBLEM IS EMV SUPPOSED TO
SOLVE?
6
WHY EMV?
P R O B L E M S S O L V E D B Y E M V C A R D S A N D T E R M I N A L S
EMV cards (EMV stands for “Europay”, “MasterCard” and “Visa”) add a chip
that makes it virtually impossible to use a counterfeit card
Business who use EMV cards throughout their payment process will not be
liable for purchases on lost, stolen or counterfeit cards
The verification data embedded on the chip includes a continually changing
algorithm that makes it easier to detect or deny stolen cards
Like around one-third of the EMV deployments in the world, the U.S. is
primarily chip-and-signature, since lost/stolen fraud is relatively minor in the
U.S. market
7
PROGRESS IN TRANSITION
8 1 % O F C R E D I T C A R D S , 5 7 % O F D E B I T
8
PROGRESS IN TRANSITION
9 4 % O F C R E D I T C A R D D O L L A R S , 7 2 % O F D E B I T D O L L A R S
9
LESSONS LEARNED
“THOSE WHO DON’T REMEMBER THE PAST … REPEAT
IT.”
11
CNP LESSONS FROM THE U.K.
“ S Q U E E Z I N G T H E B A L L O O N ”
From 2012 to 2015
counterfeit fraud
increased marginally, by
less than 7%
But at the same time
Card-Not-Present fraud
increased by over 60%
12
CNP LESSONS, CANADA & AUSTRALIA
“ S Q U E E Z I N G T H E B A L L O O N ”
From 2012 to 2014,
Canada saw a $91
million increase in CNP
fraud – more than 33%
Australia’s transition was
similar, with 60% more
CNP fraud and a $117M
increase in losses
13
TWO TYPES OF CARD -LESS FRAUD
A C C O U N T T A K E O V E R
Criminals fish for info, pretend to
be the cardholder, and then
request a replacement card
CARD-BASED ATO
Access a legitimate account
through hacking or fraud, and
transfer funds to another account
ONLINE BANKING ATO
14
ACCOUNT TAKEOVER IN THE U.K.
“ S Q U E E Z I N G T H E B A L L O O N ”
From 2012 to 2015, the
U.K. saw a £1M
decrease in card-based
ATO
While online-based
account takeover
increased £61M, or
250%
EXPECT THE
EXPECTEDPROJECTING THE IMPACT OF EMV ROLLOUT IN THE
U.S.
16
PROJECTED IMPACTS IN THE U.S.
E S T I M A T I N G U . S . C O U N T E R F E I T C A R D L O S S E S
Stem the sharp increase
that was seen from 2012
through 2015
Begin a precipitous
decline in counterfeit
fraud activity
17
18
PROJECTED IMPACTS IN THE U.S.
A C C O U N T T A K E O V E R L O S S E S T H R O U G H 2 0 2 0
Expect a $330 million
increase in U.S. account
takeover losses
19
PROJECTED IMPACTS IN THE U.S.
“ S Q U E E Z I N G T H E B A L L O O N ”
But worse a potentially
disastrous increase in
CNP fraud
CNP fraud is projected
to see a 80% increase
over the next 4+ years
20
A word about
cyber criminals
21
Fraud Inc.
22
ORGANIZED CRIME RINGS ARE QUICK TO FIND
GAPS
N I M B L E A N D E A G E R T O A D A P T
HOW TO PREPARE
WHAT TO DO, AND THE FUTURE OF CNP FRAUD
24
FIGHTING CNP FRAUD
8 T O O L S A T Y O U R D I S P O S A L
Device fingerprinting and digital identity
Behavioral analytics & behavioral
biometrics
Malware detection
Mobile operator data
Knowledge Based Authentication (KBA)
Out-of-Band Authentication
Transaction Signing
Biometrics
25
Device fingerprinting and digital identity
FIGHTING CNP FRAUD
8 T O O L S A T Y O U R D I S P O S A L
Behavioral analytics & behavioral
biometrics
Malware detection
Mobile operator data
Knowledge Based Authentication (KBA)
Out-of-Band Authentication
Transaction Signing
Biometrics
LOW FRICTION
LOW FRICTION
LOW FRICTION
LOW FRICTION
HIGH FRICTION
HIGH FRICTION
HIGH FRICTION
HIGH FRICTION
26
HISTORICAL
REPUTATION
ANOMALOUS
BEHAVIOR SECURITY RISK
INDICATORS
AUTHORIZED
FOR ACCOUNT
LINKS AND
ASSOCIATIONS
CUSTOMER
AUTHENTICATION
THE GOOD NEWS: YOU ALREADY HAVE THE TOOLS
FRAUD
PREVENTION
27
ACCOUNT
LOGIN
CHANGE
ACCOUNT DETAILS
CHECK
BALANCE
WITHDRAWAL,
FUND TRANSFER
THE GOOD NEWS: YOU ALREADY HAVE THE TOOLS
LOAN ORIGINATION
OR
ACCOUNT CREATION
CHECK BALANCE,
DEPOSIT
MAKE
PAYMENTS
CUSTOMER
AUTHENTICATION
FRAUD
PREVENTION
FRAUD
PREVENTION
28
RECOMMENDATIONS
FOR ISSUERS FOR MERCHANTS
INVEST IN
SOLUTIONS
ACCELERATE
BOLSTER CNP
CONTROLS
BEWARE OF
ATM ATTACKS EDUCATE
PRIORITIZE
RETERMINALIZATION
29
THE EVOLUTION OF FRAUD, INC?
8400 miles, 1600 forged cards, 1400 transactions, $13 million …..
… in less than three hours.
30
THE EVOLUTION OF FRAUD, INC?
8400 miles, 1600 forged cards, 1400 transactions, $13 million …..
… in less than three hours.
31
G O T O W W W . I O V A T I O N . C O M / R E S O U R C E S
RESOURCES
“AUTHENTITHINGS” WEBINAR
A review of the overall state of
authentication in consumer-oriented,
“Internet-of-Things” technologies.
AITE REPORT ON EMV TRANSITION
The full report on EMV migration and the
impact of shrinking counterfeit card
opportunity on other forms of fraud.
Q&A

More Related Content

What's hot

What We Learned Working with Forter
What We Learned Working with ForterWhat We Learned Working with Forter
What We Learned Working with ForterSimplifilm
 
Malwarebytes - Global Impact of Ransomware on Business
Malwarebytes - Global Impact of Ransomware on BusinessMalwarebytes - Global Impact of Ransomware on Business
Malwarebytes - Global Impact of Ransomware on BusinessInfographic Box IDS
 
RSA Online Fraud Report - July 2014
RSA Online Fraud Report - July 2014RSA Online Fraud Report - July 2014
RSA Online Fraud Report - July 2014EMC
 
Detecting fraud through traffic analytics
Detecting fraud through traffic analyticsDetecting fraud through traffic analytics
Detecting fraud through traffic analyticsSven Hezel
 
Insurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesInsurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesCallcredit123
 
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present FraudKnow your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present FraudNoam Inbar
 
How to detect affiliate fraud
How to detect affiliate fraudHow to detect affiliate fraud
How to detect affiliate fraudSven Hezel
 
Bucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalBucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalEric Bozinny
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionTransUnion
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudMichael Holden
 
Fraudshield: Innovative affiliate fraud solution
Fraudshield: Innovative affiliate fraud solutionFraudshield: Innovative affiliate fraud solution
Fraudshield: Innovative affiliate fraud solutionalexander24metrics
 
Dynamic authentication rollin'
Dynamic authentication rollin'Dynamic authentication rollin'
Dynamic authentication rollin'TransUnion
 
Apsalar App Fraud Index Report - July 2015
Apsalar App Fraud Index Report - July 2015Apsalar App Fraud Index Report - July 2015
Apsalar App Fraud Index Report - July 2015James Nichols
 
Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In EcommerceLarry_Moffatt
 
Infographic: Global Mobile Payment Methods: First Half 2016
Infographic: Global Mobile Payment Methods: First Half 2016Infographic: Global Mobile Payment Methods: First Half 2016
Infographic: Global Mobile Payment Methods: First Half 2016yStats.com
 

What's hot (19)

What We Learned Working with Forter
What We Learned Working with ForterWhat We Learned Working with Forter
What We Learned Working with Forter
 
Malwarebytes - Global Impact of Ransomware on Business
Malwarebytes - Global Impact of Ransomware on BusinessMalwarebytes - Global Impact of Ransomware on Business
Malwarebytes - Global Impact of Ransomware on Business
 
RSA Online Fraud Report - July 2014
RSA Online Fraud Report - July 2014RSA Online Fraud Report - July 2014
RSA Online Fraud Report - July 2014
 
Detecting fraud through traffic analytics
Detecting fraud through traffic analyticsDetecting fraud through traffic analytics
Detecting fraud through traffic analytics
 
Insurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesInsurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slides
 
Challenge Accepted
Challenge AcceptedChallenge Accepted
Challenge Accepted
 
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present FraudKnow your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
 
How to detect affiliate fraud
How to detect affiliate fraudHow to detect affiliate fraud
How to detect affiliate fraud
 
Bucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalBucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in Digital
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire Fraud
 
Fraudshield: Innovative affiliate fraud solution
Fraudshield: Innovative affiliate fraud solutionFraudshield: Innovative affiliate fraud solution
Fraudshield: Innovative affiliate fraud solution
 
Dynamic authentication rollin'
Dynamic authentication rollin'Dynamic authentication rollin'
Dynamic authentication rollin'
 
Apsalar App Fraud Index Report - July 2015
Apsalar App Fraud Index Report - July 2015Apsalar App Fraud Index Report - July 2015
Apsalar App Fraud Index Report - July 2015
 
Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In Ecommerce
 
eCommerce – Fraud
eCommerce – FraudeCommerce – Fraud
eCommerce – Fraud
 
Crypto traders study / 2019
Crypto traders study / 2019Crypto traders study / 2019
Crypto traders study / 2019
 
Rise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScanRise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScan
 
Infographic: Global Mobile Payment Methods: First Half 2016
Infographic: Global Mobile Payment Methods: First Half 2016Infographic: Global Mobile Payment Methods: First Half 2016
Infographic: Global Mobile Payment Methods: First Half 2016
 

Viewers also liked

Protect Your SMB from Payment Security Breaches
Protect Your SMB from Payment Security BreachesProtect Your SMB from Payment Security Breaches
Protect Your SMB from Payment Security BreachesVerifone
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseNowSecure
 
NTXISSACSC3 - EMV and the Future of Payments by Branden Williams
NTXISSACSC3 - EMV and the Future of Payments by Branden WilliamsNTXISSACSC3 - EMV and the Future of Payments by Branden Williams
NTXISSACSC3 - EMV and the Future of Payments by Branden WilliamsNorth Texas Chapter of the ISSA
 
7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / WebinarIngenico Group
 
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...Ingenico Group
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of SaleTripwire
 
CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017Joseph John
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
The Future of Retail 2017: Trends Shaping the Digital Experience
The Future of Retail 2017: Trends Shaping the Digital ExperienceThe Future of Retail 2017: Trends Shaping the Digital Experience
The Future of Retail 2017: Trends Shaping the Digital ExperienceNational Retail Federation
 
Modern Retail Guide to EPOS
Modern Retail Guide to EPOSModern Retail Guide to EPOS
Modern Retail Guide to EPOSModernRetailUK
 
Digital marketing Trends 2017
Digital marketing Trends 2017Digital marketing Trends 2017
Digital marketing Trends 2017Infocrest
 
What retailers want you to know about data security
What retailers want you to know about data securityWhat retailers want you to know about data security
What retailers want you to know about data securityNational Retail Federation
 

Viewers also liked (14)

Protect Your SMB from Payment Security Breaches
Protect Your SMB from Payment Security BreachesProtect Your SMB from Payment Security Breaches
Protect Your SMB from Payment Security Breaches
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
NTXISSACSC3 - EMV and the Future of Payments by Branden Williams
NTXISSACSC3 - EMV and the Future of Payments by Branden WilliamsNTXISSACSC3 - EMV and the Future of Payments by Branden Williams
NTXISSACSC3 - EMV and the Future of Payments by Branden Williams
 
7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar
 
2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data
 
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of Sale
 
CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
The Future of Retail 2017: Trends Shaping the Digital Experience
The Future of Retail 2017: Trends Shaping the Digital ExperienceThe Future of Retail 2017: Trends Shaping the Digital Experience
The Future of Retail 2017: Trends Shaping the Digital Experience
 
Modern Retail Guide to EPOS
Modern Retail Guide to EPOSModern Retail Guide to EPOS
Modern Retail Guide to EPOS
 
Digital marketing Trends 2017
Digital marketing Trends 2017Digital marketing Trends 2017
Digital marketing Trends 2017
 
What retailers want you to know about data security
What retailers want you to know about data securityWhat retailers want you to know about data security
What retailers want you to know about data security
 

Similar to Eight Months of EMV: Projecting Early Fraud Shifts and Trajectory

2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report HighlightsTransUnion
 
The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention TransUnion
 
Consumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupConsumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupTransUnion
 
Fraud Prevention in International Commerce
Fraud Prevention in International CommerceFraud Prevention in International Commerce
Fraud Prevention in International CommerceSecure Trading
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftAlireza Ghahrood
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactionsAlireza Ghahrood
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...TransUnion
 
Optimising Payments for Strong Customer Authentication (SCA)
Optimising Payments for Strong Customer Authentication (SCA)Optimising Payments for Strong Customer Authentication (SCA)
Optimising Payments for Strong Customer Authentication (SCA)Elliott Barton
 
Get Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present FraudGet Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present FraudTransUnion
 
Chipping Away at EMV Myths
Chipping Away at EMV MythsChipping Away at EMV Myths
Chipping Away at EMV MythsExperian
 
World Payments Report 2014 Key Findings Presentation
World Payments Report 2014 Key Findings PresentationWorld Payments Report 2014 Key Findings Presentation
World Payments Report 2014 Key Findings PresentationCapgemini
 
Leveraging graph technology to fight financial fraud
Leveraging graph technology to fight financial fraudLeveraging graph technology to fight financial fraud
Leveraging graph technology to fight financial fraudNeo4j
 
Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?Uniphore
 
Blockchain - creating more transparent economy
Blockchain - creating more transparent economy Blockchain - creating more transparent economy
Blockchain - creating more transparent economy Paweł Kuskowski
 
Achieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerAchieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerTransUnion
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008ClubHack
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissectedamiable_indian
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Merchants
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET Journal
 

Similar to Eight Months of EMV: Projecting Early Fraud Shifts and Trajectory (20)

2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention
 
Consumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupConsumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite Group
 
Fraud Prevention in International Commerce
Fraud Prevention in International CommerceFraud Prevention in International Commerce
Fraud Prevention in International Commerce
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Optimising Payments for Strong Customer Authentication (SCA)
Optimising Payments for Strong Customer Authentication (SCA)Optimising Payments for Strong Customer Authentication (SCA)
Optimising Payments for Strong Customer Authentication (SCA)
 
Get Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present FraudGet Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present Fraud
 
Chipping Away at EMV Myths
Chipping Away at EMV MythsChipping Away at EMV Myths
Chipping Away at EMV Myths
 
World Payments Report 2014 Key Findings Presentation
World Payments Report 2014 Key Findings PresentationWorld Payments Report 2014 Key Findings Presentation
World Payments Report 2014 Key Findings Presentation
 
Leveraging graph technology to fight financial fraud
Leveraging graph technology to fight financial fraudLeveraging graph technology to fight financial fraud
Leveraging graph technology to fight financial fraud
 
Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?
 
Blockchain - creating more transparent economy
Blockchain - creating more transparent economy Blockchain - creating more transparent economy
Blockchain - creating more transparent economy
 
Achieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerAchieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the Customer
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid Models
 

More from TransUnion

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...TransUnion
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesTransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipTransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar TransUnion
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4TransUnion
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayTransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedTransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalTransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingTransUnion
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...TransUnion
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropeTransUnion
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsTransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityTransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...TransUnion
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...TransUnion
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...TransUnion
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)TransUnion
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPRTransUnion
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?TransUnion
 

More from TransUnion (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
 

Recently uploaded

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 

Recently uploaded (20)

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 

Eight Months of EMV: Projecting Early Fraud Shifts and Trajectory

  • 1. WEBINAR EIGHT MONTHS OF EMV EARLY FRAUD SHIFTS AND TRAJECTORY JUNE 2016
  • 2. 2 The transition to EMV card types will drive major changes in consumer behavior, in infrastructure and liablility, and in fraud patterns. How do experiences in other countries help us prepare for these shifts?
  • 3. 3 JU LIE C ON R OY R E S E A R C H D I R E C T O R  Head of Aite Group’s Retail Banking & Payments practice, covering fraud, data security, anti-money laundering, and compliance.  VP-level product management roles in financial services, risk management and payment processing. MICHAEL THELANDER P R O D U C T M A R K E T I N G M A N A G E R , A U T H E N T I C A T I O N  Manages go-to-market, launch and customer education activities for iovation’s authentication products.  20 years in VP- and director-level product management and product marketing roles for information security companies.
  • 4. 4 AGENDA 1 2 3 4 WHY & WHAT Understanding EMV transition Goals and desired outcomes LESSONS LEARNED Experiences in other countries Fraud trends and directions EXPECT THE EXPECTED What will we see in the U.S.? HOW TO PREPARE What tools are at your disposal What’s next for card-not-present fraud?
  • 5. WHY & WHAT WHAT PROBLEM IS EMV SUPPOSED TO SOLVE?
  • 6. 6 WHY EMV? P R O B L E M S S O L V E D B Y E M V C A R D S A N D T E R M I N A L S EMV cards (EMV stands for “Europay”, “MasterCard” and “Visa”) add a chip that makes it virtually impossible to use a counterfeit card Business who use EMV cards throughout their payment process will not be liable for purchases on lost, stolen or counterfeit cards The verification data embedded on the chip includes a continually changing algorithm that makes it easier to detect or deny stolen cards Like around one-third of the EMV deployments in the world, the U.S. is primarily chip-and-signature, since lost/stolen fraud is relatively minor in the U.S. market
  • 7. 7 PROGRESS IN TRANSITION 8 1 % O F C R E D I T C A R D S , 5 7 % O F D E B I T
  • 8. 8 PROGRESS IN TRANSITION 9 4 % O F C R E D I T C A R D D O L L A R S , 7 2 % O F D E B I T D O L L A R S
  • 9. 9
  • 10. LESSONS LEARNED “THOSE WHO DON’T REMEMBER THE PAST … REPEAT IT.”
  • 11. 11 CNP LESSONS FROM THE U.K. “ S Q U E E Z I N G T H E B A L L O O N ” From 2012 to 2015 counterfeit fraud increased marginally, by less than 7% But at the same time Card-Not-Present fraud increased by over 60%
  • 12. 12 CNP LESSONS, CANADA & AUSTRALIA “ S Q U E E Z I N G T H E B A L L O O N ” From 2012 to 2014, Canada saw a $91 million increase in CNP fraud – more than 33% Australia’s transition was similar, with 60% more CNP fraud and a $117M increase in losses
  • 13. 13 TWO TYPES OF CARD -LESS FRAUD A C C O U N T T A K E O V E R Criminals fish for info, pretend to be the cardholder, and then request a replacement card CARD-BASED ATO Access a legitimate account through hacking or fraud, and transfer funds to another account ONLINE BANKING ATO
  • 14. 14 ACCOUNT TAKEOVER IN THE U.K. “ S Q U E E Z I N G T H E B A L L O O N ” From 2012 to 2015, the U.K. saw a £1M decrease in card-based ATO While online-based account takeover increased £61M, or 250%
  • 15. EXPECT THE EXPECTEDPROJECTING THE IMPACT OF EMV ROLLOUT IN THE U.S.
  • 16. 16 PROJECTED IMPACTS IN THE U.S. E S T I M A T I N G U . S . C O U N T E R F E I T C A R D L O S S E S Stem the sharp increase that was seen from 2012 through 2015 Begin a precipitous decline in counterfeit fraud activity
  • 17. 17
  • 18. 18 PROJECTED IMPACTS IN THE U.S. A C C O U N T T A K E O V E R L O S S E S T H R O U G H 2 0 2 0 Expect a $330 million increase in U.S. account takeover losses
  • 19. 19 PROJECTED IMPACTS IN THE U.S. “ S Q U E E Z I N G T H E B A L L O O N ” But worse a potentially disastrous increase in CNP fraud CNP fraud is projected to see a 80% increase over the next 4+ years
  • 22. 22 ORGANIZED CRIME RINGS ARE QUICK TO FIND GAPS N I M B L E A N D E A G E R T O A D A P T
  • 23. HOW TO PREPARE WHAT TO DO, AND THE FUTURE OF CNP FRAUD
  • 24. 24 FIGHTING CNP FRAUD 8 T O O L S A T Y O U R D I S P O S A L Device fingerprinting and digital identity Behavioral analytics & behavioral biometrics Malware detection Mobile operator data Knowledge Based Authentication (KBA) Out-of-Band Authentication Transaction Signing Biometrics
  • 25. 25 Device fingerprinting and digital identity FIGHTING CNP FRAUD 8 T O O L S A T Y O U R D I S P O S A L Behavioral analytics & behavioral biometrics Malware detection Mobile operator data Knowledge Based Authentication (KBA) Out-of-Band Authentication Transaction Signing Biometrics LOW FRICTION LOW FRICTION LOW FRICTION LOW FRICTION HIGH FRICTION HIGH FRICTION HIGH FRICTION HIGH FRICTION
  • 26. 26 HISTORICAL REPUTATION ANOMALOUS BEHAVIOR SECURITY RISK INDICATORS AUTHORIZED FOR ACCOUNT LINKS AND ASSOCIATIONS CUSTOMER AUTHENTICATION THE GOOD NEWS: YOU ALREADY HAVE THE TOOLS FRAUD PREVENTION
  • 27. 27 ACCOUNT LOGIN CHANGE ACCOUNT DETAILS CHECK BALANCE WITHDRAWAL, FUND TRANSFER THE GOOD NEWS: YOU ALREADY HAVE THE TOOLS LOAN ORIGINATION OR ACCOUNT CREATION CHECK BALANCE, DEPOSIT MAKE PAYMENTS CUSTOMER AUTHENTICATION FRAUD PREVENTION FRAUD PREVENTION
  • 28. 28 RECOMMENDATIONS FOR ISSUERS FOR MERCHANTS INVEST IN SOLUTIONS ACCELERATE BOLSTER CNP CONTROLS BEWARE OF ATM ATTACKS EDUCATE PRIORITIZE RETERMINALIZATION
  • 29. 29 THE EVOLUTION OF FRAUD, INC? 8400 miles, 1600 forged cards, 1400 transactions, $13 million ….. … in less than three hours.
  • 30. 30 THE EVOLUTION OF FRAUD, INC? 8400 miles, 1600 forged cards, 1400 transactions, $13 million ….. … in less than three hours.
  • 31. 31 G O T O W W W . I O V A T I O N . C O M / R E S O U R C E S RESOURCES “AUTHENTITHINGS” WEBINAR A review of the overall state of authentication in consumer-oriented, “Internet-of-Things” technologies. AITE REPORT ON EMV TRANSITION The full report on EMV migration and the impact of shrinking counterfeit card opportunity on other forms of fraud.
  • 32. Q&A

Editor's Notes

  1. Michael will build out, Julie comment on the available tools