SlideShare a Scribd company logo
1© Copyright 2014 EMC Corporation. All rights reserved.
Julie Conroy
Research Director
Aite Group
Rueben Rodriguez
Principal Product Marketing Manager
RSA
2014 Card and
Payments Fraud
Forecast
2© Copyright 2014 EMC Corporation. All rights reserved.
Agenda
• EMV: Coming soon to a card near you
• E-commerce fraud trends
• Best practices for securing payment cards
• Case studies in financial and retail
3© Copyright 2013 EMC Corporation. All rights reserved.
EMV: Coming Soon to a
Card Near You
©2014 Aite Group LLC.
Page 4
The last G-20 country to embrace the EMV standard
©2014 Aite Group LLC.
Page 5
EMV: Why now?
• Interoperability
• Mobile payments
• Increasing fraud
• Decreasing costs
©2014 Aite Group LLC.
Page 6
Important milestones
PCI annual assessment forgivenessOctober 2012
Acquirer processing updates in placeApril 2013
Maestro liability shiftApril 2013
POS liability shiftOctober 2015
ATM liability shift (MC)October 2016
ATM liability shift (Visa)October 2017
Fuel dispenser liability shiftOctober 2017
©2014 Aite Group LLC.
Page 7
EMV: Coming Soon
Source: Aite Group interviews with payment networks and 18 large U.S. issuers,
April to May 2014
0.4%
4%
25%
70%
91%
98%
2012 2013 e2014 e2015 e2016 e2017
Percentage of U.S. Credit Cards with EMVCapability
©2014 Aite Group LLC.
Page 8
EMV’s impact in other countries
$245.4
$199.6
$171.5
$152.6 $145.3
$111.5
$128.4
$140.4
$176.1
$259.5 $268.6
$299.4
2008 2009 2010 2011 2012 2013
Changes in Canadian Credit Card Fraud Losses, 2008 to 2013 (In millions
of CAD)
Source: Canadian Bankers Association
©2014 Aite Group LLC.
Page 9
The U.S. will not be an exception
$2.1
$2.6
$2.8 $2.9 $3.1
$3.8
$5.2
$6.4
2011 2012 2013 e2014 e2015 e2016 e2017 e2018
U.S. CNP Credit Card Fraud Losses,
2011 to e2018 (In US$ Billions)
Source: Aite Group interviews with payment networks and 18 large U.S. issuers,
April to May 2014
10© Copyright 2013 EMC Corporation. All rights reserved.
E-Commerce Fraud
Trends
11© Copyright 2014 EMC Corporation. All rights reserved.
Mobile Is The New “Web”
• Sky rocketing usage of mobile devices creates a new
opportunity for fraudsters
• Mobile OS malware and phishing scams on the rise
• Criminal underground is all pointing to mobile with
web variants
– CitMo, ZitMo, Perkele
Banking
App
12© Copyright 2014 EMC Corporation. All rights reserved.
Bank Mobile Traffic is on the Rise
~25% of confirmed fraud is from the mobile channel
13© Copyright 2014 EMC Corporation. All rights reserved.
Citadel – RSA Underground Analysis
Mobile Malware & HTML Injection
14© Copyright 2014 EMC Corporation. All rights reserved.
Citadel
15© Copyright 2014 EMC Corporation. All rights reserved.
Citadel
16© Copyright 2014 EMC Corporation. All rights reserved.
Citadel
17© Copyright 2014 EMC Corporation. All rights reserved.
ZitMO
18© Copyright 2014 EMC Corporation. All rights reserved.
CNP Is Getting The “Squeeze”
• Customers don’t just want but demand ability to shop
on-line at anytime
• Fraud liability and customer convenience are at odds
• Fraud is being pushed to the path of least resistance
• Ecommerce sites are being manipulated
– Stolen card testing – validate card before selling
– Buy physical/digital goods with stolen cards
• EMV is now in full effect or at least underway
19© Copyright 2014 EMC Corporation. All rights reserved.
• Attacks on ecommerce sites is becoming the norm
• Threats come in various forms
– Botnet – DDOS
– Business logic abuse
– Competitive intel & scraping
– eCoupons abuse
• Very hard to detect or prevent
• Impacts to sales and brand are significant
Ecommerce Website Attacks
On The Rise
20© Copyright 2014 EMC Corporation. All rights reserved.
RSA Survey: Financial & Brand Revenue
Impact
Average of 5% of total on-line revenues impacted by fraud
21© Copyright 2014 EMC Corporation. All rights reserved.
3DS Is Evolving….
For both Issuers & Merchants
• RSA 3DS card transaction volume has grown 19% YoY
• Fraudsters targeting username/password deployments
• RSA analysis shows top 3DS fraud focus:
– Travel in Europe
– “Mail Order” in US
• Merchants have significant flexibility
– Implications vary based upon which side of the coin you represent
• Risk-based authentication is now preferred method
• RSA risk-based issuers prevent fraud on average ~$3M+/month
22© Copyright 2014 EMC Corporation. All rights reserved.
Best Practices for
Securing Payment Cards
©2014 Aite Group LLC.
Page 23
Technology to the rescue
• Application layer
• Behavioral analytics
• 3-D Secure
• Behind the scenes
• Tokenization
o Issuer
o Merchant
©2014 Aite Group LLC.
Page 24
Merchants are embracing these solutions
3%
13%
6%
13%
13%
19%
13%
9%
31%
31%
19%
19%
31%
25%
9%
47%
Tokenization
Behavioral
analytics
3-D Secure
Q: Please indicate the effectiveness of each of these technologies at
reducing card fraud and data security issues. (n=32)
Very low impact Low impact Moderate impact
High impact Very high impact No opinion/Don't know
Source: Aite Group survey of fraud executives at 36 large merchants, March to May
2014
©2014 Aite Group LLC.
Page 25
Many merchants and FIs are actively
deploying technology to mitigate CNP fraud
44%
22%
22%
16%
3%
3%
13%
22%
Tokenization
(n=26)
3-D Secure (n=20)
Q: What is your plan to deploy the following technologies?
Using today
On the 1- to 2-
year roadmap
Plan to use, but
not in the next 2
years
No plansto use
Source: Aite Group survey of fraud executives at 36 large merchants, March to May
2014
26© Copyright 2014 EMC Corporation. All rights reserved.
Case Studies
27© Copyright 2014 EMC Corporation. All rights reserved.
3DS is REAL!! - Case Study For A Card Issuer
Protecting Transactions Without The Cardholder Hassle
28© Copyright 2013 EMC Corporation. All rights reserved.
29© Copyright 2011 EMC Corporation. All rights reserved.
~400,000
30© Copyright 2014 EMC Corporation. All rights reserved.
Questions and Additional Resources
 Join the fraud conversation in the
RSA Fraud & Risk Intelligence
Community!
– https://community.emc.com/co
mmunity/connect/rsaxchange/fr
aud
 Follow the RSA Fraud Research
team on Twitter
– @RSAFraudAction
 Visit the RSA Online Fraud
Resource Center
– www.emc.com/onlinefraud

More Related Content

What's hot

2015 IAD Survey Report, FINAL
2015 IAD Survey Report, FINAL2015 IAD Survey Report, FINAL
2015 IAD Survey Report, FINALBryan Bauer
 
Villiger Book Section #1
Villiger Book Section #1Villiger Book Section #1
Villiger Book Section #1
Peter Villiger
 
Huge And Smart Progressive Case
Huge And Smart   Progressive CaseHuge And Smart   Progressive Case
Huge And Smart Progressive Casesmehro
 
Villiger Book Section #2
Villiger Book Section #2 Villiger Book Section #2
Villiger Book Section #2
Peter Villiger
 
Tentacles of fraud
Tentacles of fraud Tentacles of fraud
Will Usage Based Insurance (UBI) disrupt the insurance industry?
Will Usage Based Insurance (UBI) disrupt the insurance industry?Will Usage Based Insurance (UBI) disrupt the insurance industry?
Will Usage Based Insurance (UBI) disrupt the insurance industry?
Mateusz Maj
 
ITL insurtech 5 value levers for auto telematics
ITL insurtech 5 value levers for auto telematicsITL insurtech 5 value levers for auto telematics
ITL insurtech 5 value levers for auto telematics
Matteo Carbone
 
Progressive Case Study.Scm
Progressive Case Study.ScmProgressive Case Study.Scm
Progressive Case Study.Scmsmehro
 
Progressive Corporation.Sssg
Progressive Corporation.SssgProgressive Corporation.Sssg
Progressive Corporation.Sssgsmehro
 
Mastergard vsib-2011
Mastergard vsib-2011Mastergard vsib-2011
Mastergard vsib-2011itiint
 
Enigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel AvivEnigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel Aviv
NOAH Advisors
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINALChris Evans
 
"Light Rises from the East" - Opportunities in the Orient for Payments
"Light Rises from the East" - Opportunities in the Orient for Payments"Light Rises from the East" - Opportunities in the Orient for Payments
"Light Rises from the East" - Opportunities in the Orient for Payments
iyzico
 
Progressive Corp..Ashky
Progressive Corp..AshkyProgressive Corp..Ashky
Progressive Corp..Ashkysmehro
 
Connected cars and insurance claims - a new paradigm
Connected cars and insurance claims  - a new paradigmConnected cars and insurance claims  - a new paradigm
Connected cars and insurance claims - a new paradigm
Matteo Carbone
 
Connected Insurance Observatory InsurTech
Connected Insurance Observatory InsurTechConnected Insurance Observatory InsurTech
Connected Insurance Observatory InsurTech
Matteo Carbone
 
Oseven at Open Coffee Athens LXXXII
Oseven at Open Coffee Athens LXXXIIOseven at Open Coffee Athens LXXXII
Oseven at Open Coffee Athens LXXXII
Open Coffee Greece
 
Connected car slides
Connected car slidesConnected car slides
Connected car slides
jasonmonahan76
 
IBM Telematics for Insurance
IBM Telematics for InsuranceIBM Telematics for Insurance
IBM Telematics for Insurance
IBM Analytics
 

What's hot (20)

2015 IAD Survey Report, FINAL
2015 IAD Survey Report, FINAL2015 IAD Survey Report, FINAL
2015 IAD Survey Report, FINAL
 
Villiger Book Section #1
Villiger Book Section #1Villiger Book Section #1
Villiger Book Section #1
 
Huge And Smart Progressive Case
Huge And Smart   Progressive CaseHuge And Smart   Progressive Case
Huge And Smart Progressive Case
 
Villiger Book Section #2
Villiger Book Section #2 Villiger Book Section #2
Villiger Book Section #2
 
Tentacles of fraud
Tentacles of fraud Tentacles of fraud
Tentacles of fraud
 
Will Usage Based Insurance (UBI) disrupt the insurance industry?
Will Usage Based Insurance (UBI) disrupt the insurance industry?Will Usage Based Insurance (UBI) disrupt the insurance industry?
Will Usage Based Insurance (UBI) disrupt the insurance industry?
 
ITL insurtech 5 value levers for auto telematics
ITL insurtech 5 value levers for auto telematicsITL insurtech 5 value levers for auto telematics
ITL insurtech 5 value levers for auto telematics
 
Progressive Case Study.Scm
Progressive Case Study.ScmProgressive Case Study.Scm
Progressive Case Study.Scm
 
Progressive Corporation.Sssg
Progressive Corporation.SssgProgressive Corporation.Sssg
Progressive Corporation.Sssg
 
Mastergard vsib-2011
Mastergard vsib-2011Mastergard vsib-2011
Mastergard vsib-2011
 
Enigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel AvivEnigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel Aviv
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINAL
 
"Light Rises from the East" - Opportunities in the Orient for Payments
"Light Rises from the East" - Opportunities in the Orient for Payments"Light Rises from the East" - Opportunities in the Orient for Payments
"Light Rises from the East" - Opportunities in the Orient for Payments
 
Top 10 Ubi Myths
Top 10 Ubi MythsTop 10 Ubi Myths
Top 10 Ubi Myths
 
Progressive Corp..Ashky
Progressive Corp..AshkyProgressive Corp..Ashky
Progressive Corp..Ashky
 
Connected cars and insurance claims - a new paradigm
Connected cars and insurance claims  - a new paradigmConnected cars and insurance claims  - a new paradigm
Connected cars and insurance claims - a new paradigm
 
Connected Insurance Observatory InsurTech
Connected Insurance Observatory InsurTechConnected Insurance Observatory InsurTech
Connected Insurance Observatory InsurTech
 
Oseven at Open Coffee Athens LXXXII
Oseven at Open Coffee Athens LXXXIIOseven at Open Coffee Athens LXXXII
Oseven at Open Coffee Athens LXXXII
 
Connected car slides
Connected car slidesConnected car slides
Connected car slides
 
IBM Telematics for Insurance
IBM Telematics for InsuranceIBM Telematics for Insurance
IBM Telematics for Insurance
 

Viewers also liked

The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
EMC
 
ISAC constitution
ISAC constitution ISAC constitution
ISAC constitution Anuj Ramaiya
 
Designing API for mobile apps (MobileWarsaw 19.01.2015)
Designing API for mobile apps (MobileWarsaw 19.01.2015)Designing API for mobile apps (MobileWarsaw 19.01.2015)
Designing API for mobile apps (MobileWarsaw 19.01.2015)
Wojtek Erbetowski
 
Provisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of ProvisioningProvisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of Provisioning
EMC
 
4 things you_cannot_recover
4 things you_cannot_recover4 things you_cannot_recover
4 things you_cannot_recoverChandan Dubey
 
Digipak research
Digipak researchDigipak research
Digipak researchloousmith
 
Webinar Tracker ABCs
Webinar Tracker ABCsWebinar Tracker ABCs
Webinar Tracker ABCs
Research Now
 
Windows Server 2012 Disk Dedupe
Windows Server 2012 Disk DedupeWindows Server 2012 Disk Dedupe
Windows Server 2012 Disk Dedupe
Microsoft TechNet - Belgium and Luxembourg
 
Flash Implications in Enterprise Storage Array Designs
Flash Implications in Enterprise Storage Array DesignsFlash Implications in Enterprise Storage Array Designs
Flash Implications in Enterprise Storage Array Designs
EMC
 
система профориентации и основные её направления
система профориентации и основные её направлениясистема профориентации и основные её направления
система профориентации и основные её направленияТатьяна Глинская
 
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגונית
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגוניתמנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגונית
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגונית
Shirley Kantor
 
4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)Khendle Christie
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
EMC
 
Math Orientation Summer 2015
Math Orientation Summer 2015Math Orientation Summer 2015
Math Orientation Summer 2015
Dan Etz
 
01 monday factors of production
01 monday factors of production01 monday factors of production
01 monday factors of production
Travis Klein
 

Viewers also liked (20)

Jose esteves 1
Jose esteves 1Jose esteves 1
Jose esteves 1
 
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
 
ISAC constitution
ISAC constitution ISAC constitution
ISAC constitution
 
Designing API for mobile apps (MobileWarsaw 19.01.2015)
Designing API for mobile apps (MobileWarsaw 19.01.2015)Designing API for mobile apps (MobileWarsaw 19.01.2015)
Designing API for mobile apps (MobileWarsaw 19.01.2015)
 
Provisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of ProvisioningProvisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of Provisioning
 
4 things you_cannot_recover
4 things you_cannot_recover4 things you_cannot_recover
4 things you_cannot_recover
 
Digipak research
Digipak researchDigipak research
Digipak research
 
Webinar Tracker ABCs
Webinar Tracker ABCsWebinar Tracker ABCs
Webinar Tracker ABCs
 
Windows Server 2012 Disk Dedupe
Windows Server 2012 Disk DedupeWindows Server 2012 Disk Dedupe
Windows Server 2012 Disk Dedupe
 
Day 2 rebellion
Day 2 rebellionDay 2 rebellion
Day 2 rebellion
 
Flash Implications in Enterprise Storage Array Designs
Flash Implications in Enterprise Storage Array DesignsFlash Implications in Enterprise Storage Array Designs
Flash Implications in Enterprise Storage Array Designs
 
система профориентации и основные её направления
система профориентации и основные её направлениясистема профориентации и основные её направления
система профориентации и основные её направления
 
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגונית
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגוניתמנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגונית
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגונית
 
4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)
 
Friday japan
Friday japanFriday japan
Friday japan
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Clientes2
Clientes2Clientes2
Clientes2
 
Formulario ventas
Formulario ventasFormulario ventas
Formulario ventas
 
Math Orientation Summer 2015
Math Orientation Summer 2015Math Orientation Summer 2015
Math Orientation Summer 2015
 
01 monday factors of production
01 monday factors of production01 monday factors of production
01 monday factors of production
 

Similar to 2014 Card and Payments Fraud Forecast

Get Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present FraudGet Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present Fraud
TransUnion
 
Emv for f_is_webinar
Emv for f_is_webinarEmv for f_is_webinar
Emv for f_is_webinar
WelchATM
 
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...
NAFCU Services Corporation
 
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach
 
Emv for merchants 031715
Emv for merchants 031715Emv for merchants 031715
Emv for merchants 031715
WCapra
 
EMV for Merchants
EMV for MerchantsEMV for Merchants
EMV for Merchants
WCapra
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
Anil Jain
 
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”
Werbeplanung.at Summit
 
EMV and Parking - 6 Months on
EMV and Parking - 6 Months onEMV and Parking - 6 Months on
EMV and Parking - 6 Months on
Creditcall
 
Aviso EMV webinar
Aviso EMV webinarAviso EMV webinar
Aviso EMV webinar
Avisoslides
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
IRJET Journal
 
Mobile Payment Security Trends for the Future
Mobile Payment Security Trends for the FutureMobile Payment Security Trends for the Future
Mobile Payment Security Trends for the Future
First American Payment Systems
 
Risk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechRisk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTech
Geo Coelho
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-securityKerri Lorch
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite Group
Laurent Pacalin
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The i-Capital Africa Institute
 
EMV: What you Need to Know
EMV: What you Need to KnowEMV: What you Need to Know
EMV: What you Need to Know
Total Merchant Services
 
Mobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk ManagementMobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk Management
Geo Coelho
 
Payment Gateway by iPay88
Payment Gateway by iPay88Payment Gateway by iPay88
Payment Gateway by iPay88
sitecmy
 

Similar to 2014 Card and Payments Fraud Forecast (20)

Get Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present FraudGet Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present Fraud
 
SBMS EMV Doc
SBMS EMV Doc SBMS EMV Doc
SBMS EMV Doc
 
Emv for f_is_webinar
Emv for f_is_webinarEmv for f_is_webinar
Emv for f_is_webinar
 
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...
 
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
 
Emv for merchants 031715
Emv for merchants 031715Emv for merchants 031715
Emv for merchants 031715
 
EMV for Merchants
EMV for MerchantsEMV for Merchants
EMV for Merchants
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”
 
EMV and Parking - 6 Months on
EMV and Parking - 6 Months onEMV and Parking - 6 Months on
EMV and Parking - 6 Months on
 
Aviso EMV webinar
Aviso EMV webinarAviso EMV webinar
Aviso EMV webinar
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Mobile Payment Security Trends for the Future
Mobile Payment Security Trends for the FutureMobile Payment Security Trends for the Future
Mobile Payment Security Trends for the Future
 
Risk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechRisk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTech
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-security
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite Group
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
 
EMV: What you Need to Know
EMV: What you Need to KnowEMV: What you Need to Know
EMV: What you Need to Know
 
Mobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk ManagementMobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk Management
 
Payment Gateway by iPay88
Payment Gateway by iPay88Payment Gateway by iPay88
Payment Gateway by iPay88
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
EMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
EMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
EMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
EMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
EMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
EMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
EMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
EMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
EMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
EMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

2014 Card and Payments Fraud Forecast

  • 1. 1© Copyright 2014 EMC Corporation. All rights reserved. Julie Conroy Research Director Aite Group Rueben Rodriguez Principal Product Marketing Manager RSA 2014 Card and Payments Fraud Forecast
  • 2. 2© Copyright 2014 EMC Corporation. All rights reserved. Agenda • EMV: Coming soon to a card near you • E-commerce fraud trends • Best practices for securing payment cards • Case studies in financial and retail
  • 3. 3© Copyright 2013 EMC Corporation. All rights reserved. EMV: Coming Soon to a Card Near You
  • 4. ©2014 Aite Group LLC. Page 4 The last G-20 country to embrace the EMV standard
  • 5. ©2014 Aite Group LLC. Page 5 EMV: Why now? • Interoperability • Mobile payments • Increasing fraud • Decreasing costs
  • 6. ©2014 Aite Group LLC. Page 6 Important milestones PCI annual assessment forgivenessOctober 2012 Acquirer processing updates in placeApril 2013 Maestro liability shiftApril 2013 POS liability shiftOctober 2015 ATM liability shift (MC)October 2016 ATM liability shift (Visa)October 2017 Fuel dispenser liability shiftOctober 2017
  • 7. ©2014 Aite Group LLC. Page 7 EMV: Coming Soon Source: Aite Group interviews with payment networks and 18 large U.S. issuers, April to May 2014 0.4% 4% 25% 70% 91% 98% 2012 2013 e2014 e2015 e2016 e2017 Percentage of U.S. Credit Cards with EMVCapability
  • 8. ©2014 Aite Group LLC. Page 8 EMV’s impact in other countries $245.4 $199.6 $171.5 $152.6 $145.3 $111.5 $128.4 $140.4 $176.1 $259.5 $268.6 $299.4 2008 2009 2010 2011 2012 2013 Changes in Canadian Credit Card Fraud Losses, 2008 to 2013 (In millions of CAD) Source: Canadian Bankers Association
  • 9. ©2014 Aite Group LLC. Page 9 The U.S. will not be an exception $2.1 $2.6 $2.8 $2.9 $3.1 $3.8 $5.2 $6.4 2011 2012 2013 e2014 e2015 e2016 e2017 e2018 U.S. CNP Credit Card Fraud Losses, 2011 to e2018 (In US$ Billions) Source: Aite Group interviews with payment networks and 18 large U.S. issuers, April to May 2014
  • 10. 10© Copyright 2013 EMC Corporation. All rights reserved. E-Commerce Fraud Trends
  • 11. 11© Copyright 2014 EMC Corporation. All rights reserved. Mobile Is The New “Web” • Sky rocketing usage of mobile devices creates a new opportunity for fraudsters • Mobile OS malware and phishing scams on the rise • Criminal underground is all pointing to mobile with web variants – CitMo, ZitMo, Perkele Banking App
  • 12. 12© Copyright 2014 EMC Corporation. All rights reserved. Bank Mobile Traffic is on the Rise ~25% of confirmed fraud is from the mobile channel
  • 13. 13© Copyright 2014 EMC Corporation. All rights reserved. Citadel – RSA Underground Analysis Mobile Malware & HTML Injection
  • 14. 14© Copyright 2014 EMC Corporation. All rights reserved. Citadel
  • 15. 15© Copyright 2014 EMC Corporation. All rights reserved. Citadel
  • 16. 16© Copyright 2014 EMC Corporation. All rights reserved. Citadel
  • 17. 17© Copyright 2014 EMC Corporation. All rights reserved. ZitMO
  • 18. 18© Copyright 2014 EMC Corporation. All rights reserved. CNP Is Getting The “Squeeze” • Customers don’t just want but demand ability to shop on-line at anytime • Fraud liability and customer convenience are at odds • Fraud is being pushed to the path of least resistance • Ecommerce sites are being manipulated – Stolen card testing – validate card before selling – Buy physical/digital goods with stolen cards • EMV is now in full effect or at least underway
  • 19. 19© Copyright 2014 EMC Corporation. All rights reserved. • Attacks on ecommerce sites is becoming the norm • Threats come in various forms – Botnet – DDOS – Business logic abuse – Competitive intel & scraping – eCoupons abuse • Very hard to detect or prevent • Impacts to sales and brand are significant Ecommerce Website Attacks On The Rise
  • 20. 20© Copyright 2014 EMC Corporation. All rights reserved. RSA Survey: Financial & Brand Revenue Impact Average of 5% of total on-line revenues impacted by fraud
  • 21. 21© Copyright 2014 EMC Corporation. All rights reserved. 3DS Is Evolving…. For both Issuers & Merchants • RSA 3DS card transaction volume has grown 19% YoY • Fraudsters targeting username/password deployments • RSA analysis shows top 3DS fraud focus: – Travel in Europe – “Mail Order” in US • Merchants have significant flexibility – Implications vary based upon which side of the coin you represent • Risk-based authentication is now preferred method • RSA risk-based issuers prevent fraud on average ~$3M+/month
  • 22. 22© Copyright 2014 EMC Corporation. All rights reserved. Best Practices for Securing Payment Cards
  • 23. ©2014 Aite Group LLC. Page 23 Technology to the rescue • Application layer • Behavioral analytics • 3-D Secure • Behind the scenes • Tokenization o Issuer o Merchant
  • 24. ©2014 Aite Group LLC. Page 24 Merchants are embracing these solutions 3% 13% 6% 13% 13% 19% 13% 9% 31% 31% 19% 19% 31% 25% 9% 47% Tokenization Behavioral analytics 3-D Secure Q: Please indicate the effectiveness of each of these technologies at reducing card fraud and data security issues. (n=32) Very low impact Low impact Moderate impact High impact Very high impact No opinion/Don't know Source: Aite Group survey of fraud executives at 36 large merchants, March to May 2014
  • 25. ©2014 Aite Group LLC. Page 25 Many merchants and FIs are actively deploying technology to mitigate CNP fraud 44% 22% 22% 16% 3% 3% 13% 22% Tokenization (n=26) 3-D Secure (n=20) Q: What is your plan to deploy the following technologies? Using today On the 1- to 2- year roadmap Plan to use, but not in the next 2 years No plansto use Source: Aite Group survey of fraud executives at 36 large merchants, March to May 2014
  • 26. 26© Copyright 2014 EMC Corporation. All rights reserved. Case Studies
  • 27. 27© Copyright 2014 EMC Corporation. All rights reserved. 3DS is REAL!! - Case Study For A Card Issuer Protecting Transactions Without The Cardholder Hassle
  • 28. 28© Copyright 2013 EMC Corporation. All rights reserved.
  • 29. 29© Copyright 2011 EMC Corporation. All rights reserved. ~400,000
  • 30. 30© Copyright 2014 EMC Corporation. All rights reserved. Questions and Additional Resources  Join the fraud conversation in the RSA Fraud & Risk Intelligence Community! – https://community.emc.com/co mmunity/connect/rsaxchange/fr aud  Follow the RSA Fraud Research team on Twitter – @RSAFraudAction  Visit the RSA Online Fraud Resource Center – www.emc.com/onlinefraud