SlideShare a Scribd company logo
by: Easysolver 
Easy Solutions Demonstration – Proactive approach to Fraud Detection
>Agenda 
>Introduction 
>Proactive approach to Fraud Detection 
>3 Stages of Fraud 
>Proactive vs Reactive 
>Demonstration 
>Fraud Stage 1 
>Fraud Stage 2 
>Fraud Stage 3
>Introduction –Easy Solutions 
Easy Solutions 
>Venture-backed, Medina Capital (May, 2013) 
>US: Miami, Atlanta 
>International: London, Bogota 
>200+ clients (financial services, travel, telecom) 
>50M+ users protected 
Total Fraud Protection 
>End-to-end Electronic Fraud Prevention 
>Integration of Intelligence and Action 
>Complete Solution / Reference Architecture 
>Combined strengths 
Visionary - Gartner Web Fraud MQ
>Gartner Web Fraud MQ 
›“Easy Solutions has a full range of fraud prevention and detection products.” 
›“…one-stop shop for most related fraud prevention services”. 
›“Easy Solutions’ …solutions can be and have been used across multiple channels, enabling organizations to stop cross-channel fraud”.
>What is Fraud? 
>Account Takeover–Malware, Phishing, Social Engineering 
>New Account –Malware, Phishing, Social Engineering, account opening process gaps (KYC/CIP) 
>True-person / Mule -Malware, Phishing, Social Engineering, account opening process gaps (KYC/CIP) 
All channel fraud happens in one of these fraud types 
*Internal fraud is also a concern, but non-customer facing
>Total Fraud Protection
>Agenda 
>Introduction 
>Proactive approach to Fraud Detection 
>3 Stages of Fraud 
>Proactive vs Reactive 
>Demonstration 
>Fraud Stage 1 
>Fraud Stage 2 
>Fraud Stage 3
>3 Stages of Fraud 
Planning and Targeting 
Setup and Launch 
Cashing
>Stage 1 -Planning and Targeting 
Setup and Launch 
Cashing 
Intelligence Gathering and Targeting; 
Web presence; Brand details; Social; Mobile Apps; 
Threat Intelligence
>Stage 2 –Setup and Launch 
Planning and Targeting 
Cashing 
Setup and Launch 
Account Takeover; 
Phishing/Pharming attacks; Malware 
Client Protection Analytics 
Takedown
>Stage 3 –Cashing 
Planning and Targeting 
Setup and Launch 
Cashing 
Realisation; 
ATM; Debit; ACH/Wire 
Anomaly Detection 
Multi Factor Authentication
>Total Fraud Protection 
Planning and Targeting 
Setup and Launch 
Cashing 
Anomaly Detection 
Multi Factor Authentication 
Threat Intelligence 
Client Protection Analytics 
Takedown
>Proactive vs. Reactive Detection 
Detect Monitoring Service
>Script Integration
>Scraping Attack Sequence 
DMS Script on banks website 
DMS Script copied when the website was scrapped 
Phishing site being created from files scrapped 
Formatting site for web deployment / testing forms and fields 
Deployed phishing site at host
>Proactive Detection Preventing Attacks
>Agenda 
>Introduction 
>Proactive approach to Fraud Detection 
>3 Stages of Fraud 
>Proactive vs Reactive 
>Demonstration 
>Fraud Stage 1 
>Fraud Stage 2 
>Fraud Stage 3
>Stage 1 -Planning and Targeting 
Planning and Targeting 
Setup and Launch 
Cashing 
Intelligence Gathering and Targeting; 
Web presence; Brand details; Social; Mobile Apps
>Fraudster’s Main Activities 
Stage 1: The fraudster is: 
>Accessing genuine websites/apps 
>Taking local copies of genuine websites/apps 
>Creating modified versions of genuine websites/apps 
>Determining customers and end users to target
>Response 
Stage 1: To cover the Planning and Targeting stage of the fraud cycle: 
>Monitor for suspicious and malicious activity 
>Process activity 
>Manage the event 
>Pro-Actively Shut Down Threats 
DEMO
>Stage 2 –Setup and Launch 
Planning and Targeting 
Cashing 
Setup and Launch 
Account Takeover; 
Phishing/Pharming attacks; Malware
>Fraudster’s Main Activities 
Stage 2: The fraudster is now launching the attacks: 
>Launching Malware attack 
>Deploying modified versions of genuine websites/apps 
>Pharming -Host File/DNS Attack 
>Selling acquired Credit/Debit Card details
>Response 
Stage 2: To cover the attack stage of the fraud cycle: 
>Provide a safe browsing environment 
>Scan customer devices for threats 
>Block the threat 
>Protected Sites 
>Provide feedback to Threat Intelligence Element 
>Threat takedown for device indentifiedattacks 
>Collaborative protection 
DEMO
>Stage 3 –Cashing 
Planning and Targeting 
Setup and Launch 
Cashing 
Realisationof attack; 
ATM; Debit; ACH/Wire
>Fraudster’s Main Activities 
Stage 3: The fraudster has acquired information to take cash from an account via: 
>ATM 
>Debit 
>Purchase 
>Top Up 
>Transfer 
>Account transfer (Wire/ACH) 
>P2P Payment
>Response 
Stage 3: To cover the cashing stage of the fraud cycle: 
>Authentication 
>Implement appropriate 2ndfactor authentication 
>Provide Step Up, Risk Based, Authentication 
>Anomaly Detection 
>Detect Unusual Account Behaviour 
>Scores the Risk in Real Time 
>Rules 
>Heuristic Engine 
>Case Management 
DEMO
Thank You

More Related Content

Similar to 02 Easy Solutions

Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
Anil Jain
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money Safe
SafeDeposit
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
CXO 2.0 Conference
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568IJRAT
 
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperHai Nguyen
 
ThreatMetrix for 3d-secure
ThreatMetrix for 3d-secureThreatMetrix for 3d-secure
ThreatMetrix for 3d-secure
Ken Lam
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
KalponikPrem
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
Imperva
 
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Telefónica
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacks
Sangram Gayal
 
Easy Solutions Product Brochure
Easy Solutions Product BrochureEasy Solutions Product Brochure
Easy Solutions Product BrochureBen Massey
 
Coordinated Malware Eradication & Remediation Project (CMERP) - The Way Forward
Coordinated Malware Eradication & Remediation Project (CMERP) - The Way ForwardCoordinated Malware Eradication & Remediation Project (CMERP) - The Way Forward
Coordinated Malware Eradication & Remediation Project (CMERP) - The Way Forward
APNIC
 
What is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web FraudWhat is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web Fraud
NuData Security
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware Attacks
Marco Morana
 
Major Prc.pptx
Major Prc.pptxMajor Prc.pptx
Major Prc.pptx
DatlaSravya1
 
What Are Social Engineering Attacks .pdf
What Are Social Engineering Attacks  .pdfWhat Are Social Engineering Attacks  .pdf
What Are Social Engineering Attacks .pdf
Sysvoot Antivirus
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
SharmilaMore5
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...Alan McSweeney
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
Jose Lopez
 

Similar to 02 Easy Solutions (20)

Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money Safe
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
 
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaper
 
ThreatMetrix for 3d-secure
ThreatMetrix for 3d-secureThreatMetrix for 3d-secure
ThreatMetrix for 3d-secure
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
 
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacks
 
Easy Solutions Product Brochure
Easy Solutions Product BrochureEasy Solutions Product Brochure
Easy Solutions Product Brochure
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Coordinated Malware Eradication & Remediation Project (CMERP) - The Way Forward
Coordinated Malware Eradication & Remediation Project (CMERP) - The Way ForwardCoordinated Malware Eradication & Remediation Project (CMERP) - The Way Forward
Coordinated Malware Eradication & Remediation Project (CMERP) - The Way Forward
 
What is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web FraudWhat is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web Fraud
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware Attacks
 
Major Prc.pptx
Major Prc.pptxMajor Prc.pptx
Major Prc.pptx
 
What Are Social Engineering Attacks .pdf
What Are Social Engineering Attacks  .pdfWhat Are Social Engineering Attacks  .pdf
What Are Social Engineering Attacks .pdf
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
 

More from #TheFraudTube

09 bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee
09   bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee09   bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee
09 bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee
#TheFraudTube
 
FCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer JobsFCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer Jobs
#TheFraudTube
 
FCF 5th Feb 2015 04 - FDB Tech
FCF 5th Feb 2015 04 - FDB TechFCF 5th Feb 2015 04 - FDB Tech
FCF 5th Feb 2015 04 - FDB Tech
#TheFraudTube
 
FCF 5th Feb 2015 03 - Local Authority Fraud
FCF 5th Feb 2015 03 - Local Authority FraudFCF 5th Feb 2015 03 - Local Authority Fraud
FCF 5th Feb 2015 03 - Local Authority Fraud
#TheFraudTube
 
FCF 5th Feb 2015 02 - Landscape of Alcohol Fraud
FCF 5th Feb 2015 02 - Landscape of Alcohol FraudFCF 5th Feb 2015 02 - Landscape of Alcohol Fraud
FCF 5th Feb 2015 02 - Landscape of Alcohol Fraud
#TheFraudTube
 
FCF 5th Feb 2015 01 - Welcome & Introductions
FCF 5th Feb 2015 01 - Welcome & IntroductionsFCF 5th Feb 2015 01 - Welcome & Introductions
FCF 5th Feb 2015 01 - Welcome & Introductions
#TheFraudTube
 
The Fraud & Cybercrime Forum: Agenda 5th Feb 2015
The Fraud & Cybercrime Forum: Agenda 5th Feb 2015The Fraud & Cybercrime Forum: Agenda 5th Feb 2015
The Fraud & Cybercrime Forum: Agenda 5th Feb 2015#TheFraudTube
 
00 FCF Agenda 15th July 2014
00   FCF Agenda 15th July 201400   FCF Agenda 15th July 2014
00 FCF Agenda 15th July 2014
#TheFraudTube
 
10 fraud bribery-and_money_laundering_offences_-_definitive_guideline
10   fraud bribery-and_money_laundering_offences_-_definitive_guideline10   fraud bribery-and_money_laundering_offences_-_definitive_guideline
10 fraud bribery-and_money_laundering_offences_-_definitive_guideline
#TheFraudTube
 
07 FCF Resources 15th July 2014
07   FCF Resources 15th July 201407   FCF Resources 15th July 2014
07 FCF Resources 15th July 2014
#TheFraudTube
 
06 Minutes - FCF May 2014
06   Minutes - FCF May 201406   Minutes - FCF May 2014
06 Minutes - FCF May 2014
#TheFraudTube
 
05 Identity Theft (C6)
05   Identity Theft (C6)05   Identity Theft (C6)
05 Identity Theft (C6)
#TheFraudTube
 
04 A-Z of Fraud & Cybercrime (Workshop)
04   A-Z of Fraud & Cybercrime (Workshop)04   A-Z of Fraud & Cybercrime (Workshop)
04 A-Z of Fraud & Cybercrime (Workshop)
#TheFraudTube
 
03 Member Spotlight (Virgin Media)
03   Member Spotlight (Virgin Media)03   Member Spotlight (Virgin Media)
03 Member Spotlight (Virgin Media)
#TheFraudTube
 
01 Welcome & Introductions - FCF 15th July 2014
01   Welcome & Introductions - FCF 15th July 201401   Welcome & Introductions - FCF 15th July 2014
01 Welcome & Introductions - FCF 15th July 2014
#TheFraudTube
 
The Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, London
The Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, LondonThe Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, London
The Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, London
#TheFraudTube
 
FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...
 FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra... FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...
FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...#TheFraudTube
 
FCF June 2014 - 00 fcf agenda 19th may 2014
 FCF June 2014 - 00 fcf agenda 19th may 2014 FCF June 2014 - 00 fcf agenda 19th may 2014
FCF June 2014 - 00 fcf agenda 19th may 2014#TheFraudTube
 

More from #TheFraudTube (20)

09 bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee
09   bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee09   bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee
09 bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee
 
FCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer JobsFCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer Jobs
 
FCF 5th Feb 2015 04 - FDB Tech
FCF 5th Feb 2015 04 - FDB TechFCF 5th Feb 2015 04 - FDB Tech
FCF 5th Feb 2015 04 - FDB Tech
 
FCF 5th Feb 2015 03 - Local Authority Fraud
FCF 5th Feb 2015 03 - Local Authority FraudFCF 5th Feb 2015 03 - Local Authority Fraud
FCF 5th Feb 2015 03 - Local Authority Fraud
 
FCF 5th Feb 2015 02 - Landscape of Alcohol Fraud
FCF 5th Feb 2015 02 - Landscape of Alcohol FraudFCF 5th Feb 2015 02 - Landscape of Alcohol Fraud
FCF 5th Feb 2015 02 - Landscape of Alcohol Fraud
 
FCF 5th Feb 2015 01 - Welcome & Introductions
FCF 5th Feb 2015 01 - Welcome & IntroductionsFCF 5th Feb 2015 01 - Welcome & Introductions
FCF 5th Feb 2015 01 - Welcome & Introductions
 
The Fraud & Cybercrime Forum: Agenda 5th Feb 2015
The Fraud & Cybercrime Forum: Agenda 5th Feb 2015The Fraud & Cybercrime Forum: Agenda 5th Feb 2015
The Fraud & Cybercrime Forum: Agenda 5th Feb 2015
 
00 FCF Agenda 15th July 2014
00   FCF Agenda 15th July 201400   FCF Agenda 15th July 2014
00 FCF Agenda 15th July 2014
 
10 fraud bribery-and_money_laundering_offences_-_definitive_guideline
10   fraud bribery-and_money_laundering_offences_-_definitive_guideline10   fraud bribery-and_money_laundering_offences_-_definitive_guideline
10 fraud bribery-and_money_laundering_offences_-_definitive_guideline
 
09 pdf show-240
09   pdf show-24009   pdf show-240
09 pdf show-240
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
07 FCF Resources 15th July 2014
07   FCF Resources 15th July 201407   FCF Resources 15th July 2014
07 FCF Resources 15th July 2014
 
06 Minutes - FCF May 2014
06   Minutes - FCF May 201406   Minutes - FCF May 2014
06 Minutes - FCF May 2014
 
05 Identity Theft (C6)
05   Identity Theft (C6)05   Identity Theft (C6)
05 Identity Theft (C6)
 
04 A-Z of Fraud & Cybercrime (Workshop)
04   A-Z of Fraud & Cybercrime (Workshop)04   A-Z of Fraud & Cybercrime (Workshop)
04 A-Z of Fraud & Cybercrime (Workshop)
 
03 Member Spotlight (Virgin Media)
03   Member Spotlight (Virgin Media)03   Member Spotlight (Virgin Media)
03 Member Spotlight (Virgin Media)
 
01 Welcome & Introductions - FCF 15th July 2014
01   Welcome & Introductions - FCF 15th July 201401   Welcome & Introductions - FCF 15th July 2014
01 Welcome & Introductions - FCF 15th July 2014
 
The Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, London
The Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, LondonThe Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, London
The Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, London
 
FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...
 FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra... FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...
FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...
 
FCF June 2014 - 00 fcf agenda 19th may 2014
 FCF June 2014 - 00 fcf agenda 19th may 2014 FCF June 2014 - 00 fcf agenda 19th may 2014
FCF June 2014 - 00 fcf agenda 19th may 2014
 

Recently uploaded

TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
Tata Consultancy Services
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
A. F. M. Rubayat-Ul Jannat
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
gcljeuzdu
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
Muhammad Adil Jamil
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
akaash13
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
Jim Smith
 
Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
Amir H. Fassihi
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
William (Bill) H. Bender, FCSI
 
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
CIOWomenMagazine
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
juniourjohnstone
 

Recently uploaded (10)

TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
 
Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
 
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
 

02 Easy Solutions

  • 1. by: Easysolver Easy Solutions Demonstration – Proactive approach to Fraud Detection
  • 2. >Agenda >Introduction >Proactive approach to Fraud Detection >3 Stages of Fraud >Proactive vs Reactive >Demonstration >Fraud Stage 1 >Fraud Stage 2 >Fraud Stage 3
  • 3. >Introduction –Easy Solutions Easy Solutions >Venture-backed, Medina Capital (May, 2013) >US: Miami, Atlanta >International: London, Bogota >200+ clients (financial services, travel, telecom) >50M+ users protected Total Fraud Protection >End-to-end Electronic Fraud Prevention >Integration of Intelligence and Action >Complete Solution / Reference Architecture >Combined strengths Visionary - Gartner Web Fraud MQ
  • 4. >Gartner Web Fraud MQ ›“Easy Solutions has a full range of fraud prevention and detection products.” ›“…one-stop shop for most related fraud prevention services”. ›“Easy Solutions’ …solutions can be and have been used across multiple channels, enabling organizations to stop cross-channel fraud”.
  • 5. >What is Fraud? >Account Takeover–Malware, Phishing, Social Engineering >New Account –Malware, Phishing, Social Engineering, account opening process gaps (KYC/CIP) >True-person / Mule -Malware, Phishing, Social Engineering, account opening process gaps (KYC/CIP) All channel fraud happens in one of these fraud types *Internal fraud is also a concern, but non-customer facing
  • 7. >Agenda >Introduction >Proactive approach to Fraud Detection >3 Stages of Fraud >Proactive vs Reactive >Demonstration >Fraud Stage 1 >Fraud Stage 2 >Fraud Stage 3
  • 8. >3 Stages of Fraud Planning and Targeting Setup and Launch Cashing
  • 9. >Stage 1 -Planning and Targeting Setup and Launch Cashing Intelligence Gathering and Targeting; Web presence; Brand details; Social; Mobile Apps; Threat Intelligence
  • 10. >Stage 2 –Setup and Launch Planning and Targeting Cashing Setup and Launch Account Takeover; Phishing/Pharming attacks; Malware Client Protection Analytics Takedown
  • 11. >Stage 3 –Cashing Planning and Targeting Setup and Launch Cashing Realisation; ATM; Debit; ACH/Wire Anomaly Detection Multi Factor Authentication
  • 12. >Total Fraud Protection Planning and Targeting Setup and Launch Cashing Anomaly Detection Multi Factor Authentication Threat Intelligence Client Protection Analytics Takedown
  • 13. >Proactive vs. Reactive Detection Detect Monitoring Service
  • 15. >Scraping Attack Sequence DMS Script on banks website DMS Script copied when the website was scrapped Phishing site being created from files scrapped Formatting site for web deployment / testing forms and fields Deployed phishing site at host
  • 17. >Agenda >Introduction >Proactive approach to Fraud Detection >3 Stages of Fraud >Proactive vs Reactive >Demonstration >Fraud Stage 1 >Fraud Stage 2 >Fraud Stage 3
  • 18. >Stage 1 -Planning and Targeting Planning and Targeting Setup and Launch Cashing Intelligence Gathering and Targeting; Web presence; Brand details; Social; Mobile Apps
  • 19. >Fraudster’s Main Activities Stage 1: The fraudster is: >Accessing genuine websites/apps >Taking local copies of genuine websites/apps >Creating modified versions of genuine websites/apps >Determining customers and end users to target
  • 20. >Response Stage 1: To cover the Planning and Targeting stage of the fraud cycle: >Monitor for suspicious and malicious activity >Process activity >Manage the event >Pro-Actively Shut Down Threats DEMO
  • 21. >Stage 2 –Setup and Launch Planning and Targeting Cashing Setup and Launch Account Takeover; Phishing/Pharming attacks; Malware
  • 22. >Fraudster’s Main Activities Stage 2: The fraudster is now launching the attacks: >Launching Malware attack >Deploying modified versions of genuine websites/apps >Pharming -Host File/DNS Attack >Selling acquired Credit/Debit Card details
  • 23. >Response Stage 2: To cover the attack stage of the fraud cycle: >Provide a safe browsing environment >Scan customer devices for threats >Block the threat >Protected Sites >Provide feedback to Threat Intelligence Element >Threat takedown for device indentifiedattacks >Collaborative protection DEMO
  • 24. >Stage 3 –Cashing Planning and Targeting Setup and Launch Cashing Realisationof attack; ATM; Debit; ACH/Wire
  • 25. >Fraudster’s Main Activities Stage 3: The fraudster has acquired information to take cash from an account via: >ATM >Debit >Purchase >Top Up >Transfer >Account transfer (Wire/ACH) >P2P Payment
  • 26. >Response Stage 3: To cover the cashing stage of the fraud cycle: >Authentication >Implement appropriate 2ndfactor authentication >Provide Step Up, Risk Based, Authentication >Anomaly Detection >Detect Unusual Account Behaviour >Scores the Risk in Real Time >Rules >Heuristic Engine >Case Management DEMO