SlideShare a Scribd company logo
1 of 34
Download to read offline
November 15, 2017
Preventing ATO in a Post-
Equifax Breach World
2© 2017 Guardian Analytics. All Rights Reserved
Guardian Analytics Presents
Speakers:
Eric Tran-Le
VP Product Management
Andras Cser
VP, Principal Analyst
in Security & Risk
&
© 2017 Forrester Research, Inc. Reproduction Prohibited 4
We work with business and
technology leaders to develop
customer-obsessed strategies
that drive growth.
Is Your Fraud & Compliance
Strategy Ready for the Future?
Andras Cser, VP Principal Analyst
November 15, 2017
6© 2017 Forrester Research, Inc. Reproduction Prohibited
It’s a difficult balance and a hard
problem to solve
Customer
satisfaction
Security
Operational
efficiency
7© 2017 Forrester Research, Inc. Reproduction Prohibited
› Fraudsters don’t have to be compliant – banks
do (AML, KYC, etc.)
› Fraudsters only have to get it right once – banks
have to get it right all the time
› Omnichannel models are behind
› EFM Data and analytics skills are hard and
expensive to get
Fraudsters are one step ahead of banks
8© 2017 Forrester Research, Inc. Reproduction Prohibited
Source: LexisNexis 2016 True Cost of Fraud Study, Source https://www.lexisnexis.com/risk/downloads/assets/true-cost-fraud-2016.pdf, page 9
Cost of online and mobile fraud is increasing fast
9© 2017 Forrester Research, Inc. Reproduction Prohibited
Source: LexisNexis 2016 True Cost of Fraud Study, Source https://www.lexisnexis.com/risk/downloads/assets/true-cost-fraud-2016.pdf, page 26
Proportion of online and mobile fraud is increasing fast
10© 2017 Forrester Research, Inc. Reproduction Prohibited
› Card (credit and debit, CP and CNP)
› ACH
› Wire
› ATM
› Online banking
› Real time
› Peer to Peer
Fraud impacts many transaction types
11© 2017 Forrester Research, Inc. Reproduction Prohibited
› Online and mobile web
› Mobile app
› POS
› In-person
› Call center
› Kiosk
› Chat and Chatbot
› Email
› Snail-mail
For all the channels
12© 2017 Forrester Research, Inc. Reproduction Prohibited
› Business has a higher tolerance for mobile fraud
› IP addresses of mobile devices change frequently
› Old MITB detection techniques do not work
› 3DSecure was not designed for mobile devices
› Legacy EFM tools can’t cope with real-time device and
location data
› MNO payment schemes are relatively closed and hard to
monitor
Mobile Fraud Is Difficult To Detect
13© 2017 Forrester Research, Inc. Reproduction Prohibited
› Get the data
› Integrate the data
› Use Machine Learning
› Use Risk Based Authentication
› Use biometrics
› Use passive/behavioral authentication
› Tune your models and expectations
Recommendations
14© 2017 Forrester Research, Inc. Reproduction Prohibited
› AML, Cyber and Fraud
› True GPS location
› Device power settings
› Touchscreen attributes
› Biometric data from sensors
(fingerprint, microphone, camera, etc.)
› Jailbreaking and rooting information
› IMEI and SIM
Recommendation: Get Data, Lots of It
15© 2017 Forrester Research, Inc. Reproduction Prohibited
› Create link graphs, SNA
› Identify broader customer activity and
segmentation dynamically
› Integrate mobile fraud management
with other channels
› Build user and device behavioral
profiles to detect anomalous and
fraudulent behaviors
Recommendation: Integrate the Data
16© 2017 Forrester Research, Inc. Reproduction Prohibited
› Support decision making shift to real time
› Don’t rely on static rules
• Static rules are inaccurate over long periods
• Require less rule maintenance, lower cost
› Don’t rely on training data
• Often it is not even readily available
› Reduce EFM transparency to fraudsters
• No fixed limits, etc.
Recommendation: Use Machine Learning
17© 2017 Forrester Research, Inc. Reproduction Prohibited
What you know
Passwords
What you have
One Time Password Tokens, Text
messages, Context
Who you are
Legacy biometrics: fingerprint,
facial print
What you do
Behavioral biometrics and
voice biometrics
Recommendation: Use Behavioral Biometrics
18© 2017 Forrester Research, Inc. Reproduction Prohibited
› User & devices behavior profiles should be fed
into ML models to detect anomalies
› Risk factors can be derived from device activities
fingerprinting
› How we can derive risk insights from device
access patterns
Tune your models and expectations appropriately
19© 2017 Forrester Research, Inc. Reproduction Prohibited
› Inconvenience users only when necessary: new device,
new location, uncharacteristic profile, bigger distance
from archetype
› Across all channels: online web, mobile app, call center,
branch, POS, etc.
› Include online web, mobile web and mobile apps.
› Monitor and look at device sensor data, touch/swipe,
mouse movements, typing, etc.
› Terminate session if there is an anomaly
Use passive/behavioral authentication
20© 2017 Forrester Research, Inc. Reproduction Prohibited
› Social engineering is going to play a greater role in fraud
and money laundering, the role of training employees to
detect fraud is going to be greater
› Unsupervised learning gains ground
› More vertical specific modeling
› Cryptocurrency support
› Blockchain used in AML and EFM
› Real time model adaption and selection
› Monitoring of suspicious behavior at account creation,
login and updates
› Provide a non-intrusive way to detect fraudulent activity
w/o actually having to buy new sensors
Forrester’s Predictions
21© 2017 Guardian Analytics. All Rights Reserved© 2017 Forrester Research, Inc. Reproduction Prohibited
Move from
Signatures and
Rules to
Behavioral
Profiles
AI/Machine Learning &
Behavioral Analytics
to Combat Commerce Fraud
Eric Tran-Le
Vice President Product Management
“
SOURCE: Dell SecureWorks
On the Black Market a Social Security
Number is ~ $30, a Visa or MasterCard
Credentials is $4, a Bank Account Number
is ~ $300, a Full Identity (Healthcare
data/documents is $1200-$1300)…
Pre Equifax
“
SOURCE: http://www.foxbusiness.com/markets/2017/09/12/equifax-hack-
how-much-your-stolen-info-is-worth-on-black-market.html
A stolen credit card is worth $1 in the black
market…this number multiplies 5x with each
added associated piece of information…Unlike
normal hack, the Equifax hack gave thieves
access to an entire correlated set of data
points for each victim”
Post Equifax
25© 2017 Guardian Analytics. All Rights Reserved
Guardian Analytics Fraud Detection Solutions
Malware
Social Engineering
Phishing
Vishing,SMishing
Email Compromise
Online Fraud Offline
Transactions
• Wire fraud
o Fax
o Email
o Call Center
o Online
Chat
• Check Fraud
Online
Transactions
• Wire fraud
• ACH
• Bill Pay
• External
Transfers
Payment Fraud
• Detect Online Suspicious
Activities
• Detect Device Suspicious
Patterns
• Avoid Chargebacks By
Averting Fraudulent
Transactions
SENTINEL Commercial
Accounts
Retail
Accounts
• Analyze All Online Banking
Activities From Login to
Logout
• Prioritize Alerts Based on
Risk Score
• Reduce Fraud Losses & Risk
Fraud Cockpit
Omni-Channel Visual Analytics
Online Mobile ACH Wire Supplier AML
Omni-Channel Risk Engine
Enterprise API Integrated Risk Database
26© 2017 Guardian Analytics. All Rights Reserved
Guardian Analytics Fraud Detection Solutions
Online Supplier Portal Fraud Detection
Guardian Analytics Sentinel™ is the most advanced fraud protection based on
machine learning & behavioral analytics for enterprise B2B web portals
SENTINEL
Real-time User
Behavior Risk
Scoring
Real-time Risk
Insights From
Device Access
Patterns
Account Creation,
Login & Updates
Activities Monitoring
Guardian Analytics API
Guardian Analytics
Policy Workflows
BUYER
SUPPLIER
PORTAL
SUPPLIER
INVOICE
BUYER
ACCOUNTS
PAYABLE
BUYER
PAYMENT
PLATFORM
27© 2017 Guardian Analytics. All Rights Reserved
Detecting Account Take Over Scheme with Behavioral Analytics
Machine Learning & Behavioral Analytics
Enter
Amount to
be Wired
Enter Wired
Routing
Number
Submit
Wire
RequestLogin
Point of Compromise
Normal
User
Behavior
Fraudster
Behavior
Disable
Security
Alerts
Enter New
Phone # of
Email Address
for
Confirmation
Enter
Unusual
Amount to
be Wired
Enter Wired
Routing
Number
Submit
Wire
Request
Ex: Bank Account Holder
One Example of Account Takeover Scheme
Behavioral Analytics
Fraud Detection
• Baseline User Behavioral to
Build a Profile of Normal
Profile
• Suspicious Behavior Deviating
Too Far From the Norm Are
Single Out
• Provide Context for All
Anomalous Activity (prior
activity, specific details,…)
FailedLogin
FailedLogin
Login
28© 2017 Guardian Analytics. All Rights Reserved
What is the Difference With Rule-Based?
Machine Learning Behavioral Analytics
Rule-Based
Machine
Learning
Static Upper Bound
Static Lower Bound
Alerts
Alerts No Alert
Alerts
Alerts
Transactions Volume Velocity
Transactions IP Velocity
Transactions Risk Scoring
User Behavior Scoring
Device Access Patterns Scoring
Detected
Shipping-Billing Mismatch
Transactions IP Velocity
Bad IP Addresses Blocking
Address Verification
29© 2017 Guardian Analytics. All Rights Reserved
Avoiding a Linear Growth of Fraud Resources
# of Daily
Fraud
Detected
# of Fraud Analysts
Required Fraud Resources
Daily Fraud Alerts
Conventional Rule-Based
Fraud Detection System
Fraud Desk Resources
Risk Exposure
Risk Avoidance
Fraud Alerts Efficiency Ratio
Stays Constant Which Means
The More Fraud Alerts The
More Fraud Analysts Needed
30© 2017 Guardian Analytics. All Rights Reserved
Managing More Fraud Alerts With Same Fraud
Resources
# of Daily
Fraud
Detected
Daily Fraud Alerts
Machine Learning & Behavior Analytics
Fraud Detection System
Fraud Detection
Efficiency Ratio
Fraud Alerts Efficiency Ratio
Increases With # of Fraud Alerts
Which Means The Fraud Team
Becomes More Efficient Over
Time
Required Fraud Resources
Models Accuracy
and False Positives
or Negatives
# of Fraud Analysts
Risk Avoidance
31© 2017 Guardian Analytics. All Rights Reserved
What If You Don’t Have a Fraud Management
Team?
FraudDESK Managed Services Will Protect You
32© 2017 Guardian Analytics. All Rights Reserved
Financial
institutions
Commercial & retail
account holders
Banking
activities
450 40M 5B
Accomplishments at a Glance
33© 2017 Guardian Analytics. All Rights Reserved
Q&A
Please add your questions to the
questions module on your control panel.
34© 2017 Guardian Analytics. All Rights Reserved
Contact Us
success@guardiananalytics.com
www.linkedin.com/company/guardiananalytics
www.youtube.com/user/GuardianAnalytics
@GuardAnalytics

More Related Content

What's hot

Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise ScamGuardian Analytics
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsHappiest Minds Technologies
 
The CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber InsuranceThe CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber InsuranceJoseph Brunsman
 
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...Guardian Analytics
 
Audit,fraud detection Using Picalo
Audit,fraud detection Using PicaloAudit,fraud detection Using Picalo
Audit,fraud detection Using Picaloguest4ea866f
 
Cognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityCognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityRishi Kant
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management Rishi Kant
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeLaurent Pacalin
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityDr. Umesh Rao.Hodeghatta
 
Same day ach bec fraud detection prevention webinar 3 1-18
Same day ach bec fraud detection  prevention webinar 3 1-18 Same day ach bec fraud detection  prevention webinar 3 1-18
Same day ach bec fraud detection prevention webinar 3 1-18 Laurent Pacalin
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention Guardian Analytics
 
New Requirements of Fraud Prevention
New Requirements of Fraud PreventionNew Requirements of Fraud Prevention
New Requirements of Fraud PreventionGuardian Analytics
 
Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Universidad Cenfotec
 
Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3Sunny Fei
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramMatt Moneypenny
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptCapgemini
 

What's hot (20)

Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
The CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber InsuranceThe CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber Insurance
 
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
 
Audit,fraud detection Using Picalo
Audit,fraud detection Using PicaloAudit,fraud detection Using Picalo
Audit,fraud detection Using Picalo
 
Cognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityCognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber security
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
 
Same day ach bec fraud detection prevention webinar 3 1-18
Same day ach bec fraud detection  prevention webinar 3 1-18 Same day ach bec fraud detection  prevention webinar 3 1-18
Same day ach bec fraud detection prevention webinar 3 1-18
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention
 
New Requirements of Fraud Prevention
New Requirements of Fraud PreventionNew Requirements of Fraud Prevention
New Requirements of Fraud Prevention
 
Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.
 
Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness Program
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 

Similar to Preventing ATO in a post Equifax breach world

From Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data BreachFrom Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data BreachPaymetric, Inc.
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceNowSecure
 
Artificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud PreventionArtificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud PreventionJérôme Kehrli
 
CWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growthCWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growthCapgemini
 
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...Capgemini
 
Experiment
ExperimentExperiment
Experimentjbashask
 
Big Data Analytics Fraud Detection and Risk Management in Fintech.pdf
Big Data Analytics Fraud Detection and Risk Management in Fintech.pdfBig Data Analytics Fraud Detection and Risk Management in Fintech.pdf
Big Data Analytics Fraud Detection and Risk Management in Fintech.pdfSmartinfologiks
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
IBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin
IBM InterConnect 2013: Big Data and Analytics Presented by Mike RhodinIBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin
IBM InterConnect 2013: Big Data and Analytics Presented by Mike RhodinIBM Events
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral AnalyticsInterset
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...Institute of Contemporary Sciences
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Anil Jain
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 

Similar to Preventing ATO in a post Equifax breach world (20)

Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017
 
From Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data BreachFrom Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data Breach
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
Artificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud PreventionArtificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud Prevention
 
CWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growthCWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growth
 
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
 
Experiment
ExperimentExperiment
Experiment
 
Opportunities derived by AI
Opportunities derived by AIOpportunities derived by AI
Opportunities derived by AI
 
Big Data Analytics Fraud Detection and Risk Management in Fintech.pdf
Big Data Analytics Fraud Detection and Risk Management in Fintech.pdfBig Data Analytics Fraud Detection and Risk Management in Fintech.pdf
Big Data Analytics Fraud Detection and Risk Management in Fintech.pdf
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
IBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin
IBM InterConnect 2013: Big Data and Analytics Presented by Mike RhodinIBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin
IBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
The 10 most trusted fraud detection solution providers 2019
The 10 most trusted fraud detection solution providers 2019The 10 most trusted fraud detection solution providers 2019
The 10 most trusted fraud detection solution providers 2019
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 

More from Laurent Pacalin

Blockchain and Cryptocurrency evolution - A PwC whitepaper
Blockchain and Cryptocurrency evolution - A PwC whitepaperBlockchain and Cryptocurrency evolution - A PwC whitepaper
Blockchain and Cryptocurrency evolution - A PwC whitepaperLaurent Pacalin
 
New Frontiers in Fraud Detection
New Frontiers in Fraud DetectionNew Frontiers in Fraud Detection
New Frontiers in Fraud DetectionLaurent Pacalin
 
ROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchLaurent Pacalin
 
Stop wire fraud aug 2016
Stop wire fraud aug 2016Stop wire fraud aug 2016
Stop wire fraud aug 2016Laurent Pacalin
 
Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Laurent Pacalin
 
New fraud protection solutions
New fraud protection solutionsNew fraud protection solutions
New fraud protection solutionsLaurent Pacalin
 
Insight driven infographic
Insight driven infographicInsight driven infographic
Insight driven infographicLaurent Pacalin
 
Retail Banking Infographics
Retail Banking InfographicsRetail Banking Infographics
Retail Banking InfographicsLaurent Pacalin
 
Oracle Sales Cloud: Mobile and productive
Oracle Sales Cloud: Mobile and productiveOracle Sales Cloud: Mobile and productive
Oracle Sales Cloud: Mobile and productiveLaurent Pacalin
 
Hitachi Consulting: Migrating from Salesforce.com to Oracle Sales Cloud
Hitachi Consulting: Migrating from Salesforce.com to Oracle Sales CloudHitachi Consulting: Migrating from Salesforce.com to Oracle Sales Cloud
Hitachi Consulting: Migrating from Salesforce.com to Oracle Sales CloudLaurent Pacalin
 
Modern sales in the cloud with Oracle Sales Cloud
Modern sales in the cloud with Oracle Sales CloudModern sales in the cloud with Oracle Sales Cloud
Modern sales in the cloud with Oracle Sales CloudLaurent Pacalin
 
Oracle Sales Cloud Release 9 by Ventana Research
Oracle Sales Cloud Release 9  by Ventana ResearchOracle Sales Cloud Release 9  by Ventana Research
Oracle Sales Cloud Release 9 by Ventana ResearchLaurent Pacalin
 
Benefits of Oracle Sales Cloud Release 9 by Nucleus Research
Benefits of Oracle Sales Cloud Release 9 by Nucleus ResearchBenefits of Oracle Sales Cloud Release 9 by Nucleus Research
Benefits of Oracle Sales Cloud Release 9 by Nucleus ResearchLaurent Pacalin
 
Migrate from Salesforce.com to the Oracle Sales Cloud with Conemis
Migrate from Salesforce.com to the Oracle Sales Cloud with ConemisMigrate from Salesforce.com to the Oracle Sales Cloud with Conemis
Migrate from Salesforce.com to the Oracle Sales Cloud with ConemisLaurent Pacalin
 

More from Laurent Pacalin (15)

Blockchain and Cryptocurrency evolution - A PwC whitepaper
Blockchain and Cryptocurrency evolution - A PwC whitepaperBlockchain and Cryptocurrency evolution - A PwC whitepaper
Blockchain and Cryptocurrency evolution - A PwC whitepaper
 
New Frontiers in Fraud Detection
New Frontiers in Fraud DetectionNew Frontiers in Fraud Detection
New Frontiers in Fraud Detection
 
ROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus Research
 
Stop wire fraud aug 2016
Stop wire fraud aug 2016Stop wire fraud aug 2016
Stop wire fraud aug 2016
 
Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016
 
New fraud protection solutions
New fraud protection solutionsNew fraud protection solutions
New fraud protection solutions
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
 
Insight driven infographic
Insight driven infographicInsight driven infographic
Insight driven infographic
 
Retail Banking Infographics
Retail Banking InfographicsRetail Banking Infographics
Retail Banking Infographics
 
Oracle Sales Cloud: Mobile and productive
Oracle Sales Cloud: Mobile and productiveOracle Sales Cloud: Mobile and productive
Oracle Sales Cloud: Mobile and productive
 
Hitachi Consulting: Migrating from Salesforce.com to Oracle Sales Cloud
Hitachi Consulting: Migrating from Salesforce.com to Oracle Sales CloudHitachi Consulting: Migrating from Salesforce.com to Oracle Sales Cloud
Hitachi Consulting: Migrating from Salesforce.com to Oracle Sales Cloud
 
Modern sales in the cloud with Oracle Sales Cloud
Modern sales in the cloud with Oracle Sales CloudModern sales in the cloud with Oracle Sales Cloud
Modern sales in the cloud with Oracle Sales Cloud
 
Oracle Sales Cloud Release 9 by Ventana Research
Oracle Sales Cloud Release 9  by Ventana ResearchOracle Sales Cloud Release 9  by Ventana Research
Oracle Sales Cloud Release 9 by Ventana Research
 
Benefits of Oracle Sales Cloud Release 9 by Nucleus Research
Benefits of Oracle Sales Cloud Release 9 by Nucleus ResearchBenefits of Oracle Sales Cloud Release 9 by Nucleus Research
Benefits of Oracle Sales Cloud Release 9 by Nucleus Research
 
Migrate from Salesforce.com to the Oracle Sales Cloud with Conemis
Migrate from Salesforce.com to the Oracle Sales Cloud with ConemisMigrate from Salesforce.com to the Oracle Sales Cloud with Conemis
Migrate from Salesforce.com to the Oracle Sales Cloud with Conemis
 

Recently uploaded

Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Onlineanilsa9823
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Delhi Call girls
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...shivangimorya083
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Zuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxZuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxolyaivanovalion
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 

Recently uploaded (20)

Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Zuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxZuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptx
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 

Preventing ATO in a post Equifax breach world

  • 1. November 15, 2017 Preventing ATO in a Post- Equifax Breach World
  • 2. 2© 2017 Guardian Analytics. All Rights Reserved Guardian Analytics Presents Speakers: Eric Tran-Le VP Product Management Andras Cser VP, Principal Analyst in Security & Risk &
  • 3.
  • 4. © 2017 Forrester Research, Inc. Reproduction Prohibited 4 We work with business and technology leaders to develop customer-obsessed strategies that drive growth.
  • 5. Is Your Fraud & Compliance Strategy Ready for the Future? Andras Cser, VP Principal Analyst November 15, 2017
  • 6. 6© 2017 Forrester Research, Inc. Reproduction Prohibited It’s a difficult balance and a hard problem to solve Customer satisfaction Security Operational efficiency
  • 7. 7© 2017 Forrester Research, Inc. Reproduction Prohibited › Fraudsters don’t have to be compliant – banks do (AML, KYC, etc.) › Fraudsters only have to get it right once – banks have to get it right all the time › Omnichannel models are behind › EFM Data and analytics skills are hard and expensive to get Fraudsters are one step ahead of banks
  • 8. 8© 2017 Forrester Research, Inc. Reproduction Prohibited Source: LexisNexis 2016 True Cost of Fraud Study, Source https://www.lexisnexis.com/risk/downloads/assets/true-cost-fraud-2016.pdf, page 9 Cost of online and mobile fraud is increasing fast
  • 9. 9© 2017 Forrester Research, Inc. Reproduction Prohibited Source: LexisNexis 2016 True Cost of Fraud Study, Source https://www.lexisnexis.com/risk/downloads/assets/true-cost-fraud-2016.pdf, page 26 Proportion of online and mobile fraud is increasing fast
  • 10. 10© 2017 Forrester Research, Inc. Reproduction Prohibited › Card (credit and debit, CP and CNP) › ACH › Wire › ATM › Online banking › Real time › Peer to Peer Fraud impacts many transaction types
  • 11. 11© 2017 Forrester Research, Inc. Reproduction Prohibited › Online and mobile web › Mobile app › POS › In-person › Call center › Kiosk › Chat and Chatbot › Email › Snail-mail For all the channels
  • 12. 12© 2017 Forrester Research, Inc. Reproduction Prohibited › Business has a higher tolerance for mobile fraud › IP addresses of mobile devices change frequently › Old MITB detection techniques do not work › 3DSecure was not designed for mobile devices › Legacy EFM tools can’t cope with real-time device and location data › MNO payment schemes are relatively closed and hard to monitor Mobile Fraud Is Difficult To Detect
  • 13. 13© 2017 Forrester Research, Inc. Reproduction Prohibited › Get the data › Integrate the data › Use Machine Learning › Use Risk Based Authentication › Use biometrics › Use passive/behavioral authentication › Tune your models and expectations Recommendations
  • 14. 14© 2017 Forrester Research, Inc. Reproduction Prohibited › AML, Cyber and Fraud › True GPS location › Device power settings › Touchscreen attributes › Biometric data from sensors (fingerprint, microphone, camera, etc.) › Jailbreaking and rooting information › IMEI and SIM Recommendation: Get Data, Lots of It
  • 15. 15© 2017 Forrester Research, Inc. Reproduction Prohibited › Create link graphs, SNA › Identify broader customer activity and segmentation dynamically › Integrate mobile fraud management with other channels › Build user and device behavioral profiles to detect anomalous and fraudulent behaviors Recommendation: Integrate the Data
  • 16. 16© 2017 Forrester Research, Inc. Reproduction Prohibited › Support decision making shift to real time › Don’t rely on static rules • Static rules are inaccurate over long periods • Require less rule maintenance, lower cost › Don’t rely on training data • Often it is not even readily available › Reduce EFM transparency to fraudsters • No fixed limits, etc. Recommendation: Use Machine Learning
  • 17. 17© 2017 Forrester Research, Inc. Reproduction Prohibited What you know Passwords What you have One Time Password Tokens, Text messages, Context Who you are Legacy biometrics: fingerprint, facial print What you do Behavioral biometrics and voice biometrics Recommendation: Use Behavioral Biometrics
  • 18. 18© 2017 Forrester Research, Inc. Reproduction Prohibited › User & devices behavior profiles should be fed into ML models to detect anomalies › Risk factors can be derived from device activities fingerprinting › How we can derive risk insights from device access patterns Tune your models and expectations appropriately
  • 19. 19© 2017 Forrester Research, Inc. Reproduction Prohibited › Inconvenience users only when necessary: new device, new location, uncharacteristic profile, bigger distance from archetype › Across all channels: online web, mobile app, call center, branch, POS, etc. › Include online web, mobile web and mobile apps. › Monitor and look at device sensor data, touch/swipe, mouse movements, typing, etc. › Terminate session if there is an anomaly Use passive/behavioral authentication
  • 20. 20© 2017 Forrester Research, Inc. Reproduction Prohibited › Social engineering is going to play a greater role in fraud and money laundering, the role of training employees to detect fraud is going to be greater › Unsupervised learning gains ground › More vertical specific modeling › Cryptocurrency support › Blockchain used in AML and EFM › Real time model adaption and selection › Monitoring of suspicious behavior at account creation, login and updates › Provide a non-intrusive way to detect fraudulent activity w/o actually having to buy new sensors Forrester’s Predictions
  • 21. 21© 2017 Guardian Analytics. All Rights Reserved© 2017 Forrester Research, Inc. Reproduction Prohibited Move from Signatures and Rules to Behavioral Profiles
  • 22. AI/Machine Learning & Behavioral Analytics to Combat Commerce Fraud Eric Tran-Le Vice President Product Management
  • 23. “ SOURCE: Dell SecureWorks On the Black Market a Social Security Number is ~ $30, a Visa or MasterCard Credentials is $4, a Bank Account Number is ~ $300, a Full Identity (Healthcare data/documents is $1200-$1300)… Pre Equifax
  • 24. “ SOURCE: http://www.foxbusiness.com/markets/2017/09/12/equifax-hack- how-much-your-stolen-info-is-worth-on-black-market.html A stolen credit card is worth $1 in the black market…this number multiplies 5x with each added associated piece of information…Unlike normal hack, the Equifax hack gave thieves access to an entire correlated set of data points for each victim” Post Equifax
  • 25. 25© 2017 Guardian Analytics. All Rights Reserved Guardian Analytics Fraud Detection Solutions Malware Social Engineering Phishing Vishing,SMishing Email Compromise Online Fraud Offline Transactions • Wire fraud o Fax o Email o Call Center o Online Chat • Check Fraud Online Transactions • Wire fraud • ACH • Bill Pay • External Transfers Payment Fraud • Detect Online Suspicious Activities • Detect Device Suspicious Patterns • Avoid Chargebacks By Averting Fraudulent Transactions SENTINEL Commercial Accounts Retail Accounts • Analyze All Online Banking Activities From Login to Logout • Prioritize Alerts Based on Risk Score • Reduce Fraud Losses & Risk Fraud Cockpit Omni-Channel Visual Analytics Online Mobile ACH Wire Supplier AML Omni-Channel Risk Engine Enterprise API Integrated Risk Database
  • 26. 26© 2017 Guardian Analytics. All Rights Reserved Guardian Analytics Fraud Detection Solutions Online Supplier Portal Fraud Detection Guardian Analytics Sentinel™ is the most advanced fraud protection based on machine learning & behavioral analytics for enterprise B2B web portals SENTINEL Real-time User Behavior Risk Scoring Real-time Risk Insights From Device Access Patterns Account Creation, Login & Updates Activities Monitoring Guardian Analytics API Guardian Analytics Policy Workflows BUYER SUPPLIER PORTAL SUPPLIER INVOICE BUYER ACCOUNTS PAYABLE BUYER PAYMENT PLATFORM
  • 27. 27© 2017 Guardian Analytics. All Rights Reserved Detecting Account Take Over Scheme with Behavioral Analytics Machine Learning & Behavioral Analytics Enter Amount to be Wired Enter Wired Routing Number Submit Wire RequestLogin Point of Compromise Normal User Behavior Fraudster Behavior Disable Security Alerts Enter New Phone # of Email Address for Confirmation Enter Unusual Amount to be Wired Enter Wired Routing Number Submit Wire Request Ex: Bank Account Holder One Example of Account Takeover Scheme Behavioral Analytics Fraud Detection • Baseline User Behavioral to Build a Profile of Normal Profile • Suspicious Behavior Deviating Too Far From the Norm Are Single Out • Provide Context for All Anomalous Activity (prior activity, specific details,…) FailedLogin FailedLogin Login
  • 28. 28© 2017 Guardian Analytics. All Rights Reserved What is the Difference With Rule-Based? Machine Learning Behavioral Analytics Rule-Based Machine Learning Static Upper Bound Static Lower Bound Alerts Alerts No Alert Alerts Alerts Transactions Volume Velocity Transactions IP Velocity Transactions Risk Scoring User Behavior Scoring Device Access Patterns Scoring Detected Shipping-Billing Mismatch Transactions IP Velocity Bad IP Addresses Blocking Address Verification
  • 29. 29© 2017 Guardian Analytics. All Rights Reserved Avoiding a Linear Growth of Fraud Resources # of Daily Fraud Detected # of Fraud Analysts Required Fraud Resources Daily Fraud Alerts Conventional Rule-Based Fraud Detection System Fraud Desk Resources Risk Exposure Risk Avoidance Fraud Alerts Efficiency Ratio Stays Constant Which Means The More Fraud Alerts The More Fraud Analysts Needed
  • 30. 30© 2017 Guardian Analytics. All Rights Reserved Managing More Fraud Alerts With Same Fraud Resources # of Daily Fraud Detected Daily Fraud Alerts Machine Learning & Behavior Analytics Fraud Detection System Fraud Detection Efficiency Ratio Fraud Alerts Efficiency Ratio Increases With # of Fraud Alerts Which Means The Fraud Team Becomes More Efficient Over Time Required Fraud Resources Models Accuracy and False Positives or Negatives # of Fraud Analysts Risk Avoidance
  • 31. 31© 2017 Guardian Analytics. All Rights Reserved What If You Don’t Have a Fraud Management Team? FraudDESK Managed Services Will Protect You
  • 32. 32© 2017 Guardian Analytics. All Rights Reserved Financial institutions Commercial & retail account holders Banking activities 450 40M 5B Accomplishments at a Glance
  • 33. 33© 2017 Guardian Analytics. All Rights Reserved Q&A Please add your questions to the questions module on your control panel.
  • 34. 34© 2017 Guardian Analytics. All Rights Reserved Contact Us success@guardiananalytics.com www.linkedin.com/company/guardiananalytics www.youtube.com/user/GuardianAnalytics @GuardAnalytics