SlideShare a Scribd company logo
WEBINAR
BALANCING SECURITY &
CUSTOMER EXPERIENCE
7/19/16
MAX ANHOURY , VP, Global Partnerships
AGENDA
2
n Introduction
n Fraud & Security Trends
n Frictionless Security Across the
Consumer Journey
n Summary
3
IOVATION INC.
SOLUTIONS: Authentication and Fraud Prevention
CUSTOMERS:450+, 6 Continents, 18 Time Zones
FOUNDED: 2004
CUSTOMERRETENTION: 96%
HEADQUARTERS: Portland, Oregon
EMPLOYEES: 125
INVESTORS: Intel Capital, Sapphire Ventures
COMMUNITY: 3,500 Fraud Professionals
TOTAL TRANSACTIONS: 20B
BRANDS PROTECTED:1,500+
4
Every device tells a story.
What stories do you care about?
Am I authorized for
this account?
Where am I located?
Do I have a fraud history?
What other devices does
this consumer have?
How many accounts
have I accessed?
Am I hiding from
detection?
5
If a device can connect to the internet,
we can recognize it.
6
Which device is this?
Is it associated with bad devices?
Are there real time risk indicators?
Is it associated with abuse?
DEEP DEVICE INTELLIGENCE:
BEYOND DEVICE RECOGNITION
7
EVIDENCE
GEOLOCATIONAGE-BASED
ANOMALY
RISK PROFILE
VELOCITY
DEEP DEVICE INTELLIGENCE
STOPPING A FRAUD
RING IN SO. CA.
9
Ø 150 transactions
Ø 50 Transactions
Ø 20 transactions
Ø 10 transactions
✪
✪
¤
¤
AT 30 , 0 0 0 F T, THE F RAUD RING L OOKS L IKE THIS
10
T H E T R E N D OF T R A N SA C T ION A C T IV IT Y OV E R T IME
0
10
20
30
40
50
60
15 16 17 18 19 20 21 22 23 24 25
TransactionCount
Week
Credit Bureaus
Financial Institutions
Retail
Other
actual activity noted with dashed lines
11
Results of activity over 4 months
• Searched for devices matching this profile:
• Devices with activity with 3 or more subscribers
• 2 of 3 subscribers within financial services industry
• Devices with fraud histories from at least 2 subscribers
2K+
ACTIVE DEVICES
100K+
TRANSACTIONS
50K
ACCOUNTS
Performing Involving
$
Step 1: Search existing fraud activity
12
Step 2: Review account and transaction velocity
Count of
Devices
Average
Accounts
Accessed
Average Total
Transactions
Average
Subscriber
Count
% with Credit
Bureau
Activity
All Devices Profiled 2,126 23 47 9 43%
20+ Accounts Accessed 880 40 79 12 55%
Highest was 259 accts
accessed by single device
100+ Total Transactions 211 64 165 15 66%
2 devices had over 1,300
transactions attempted
+10 Transactions/ Day 61 29 89 7 37%
Highest trans/day was 659
(21 trans. in 44 minutes)
13
Step 3: Associate devices & activity using data from our
global network of our subscribers
The group expands from 50k to 300k accounts
~16K+
ACTIVE DEVICES
~670K+
TRANSACTIONS
~300K
ACCOUNTS
Performing Involving
$
14
• This device is associated with 13 additional devices through common account access.
• Then we reviewed the prior history to understand the connected activity.
Step 4: Investigate details on an individual device
15
• The 28 new account apps from Riverside were across 8 subscribers, demonstrating the effort
taken to monetize stolen credentials.
• Additional activity not accounted for above:
3 Credit Report access attempts from another Riverside address on 4/27
2 Credit Card Apps and 3 Login attempts from Whittier, CA (near Whittier College) on 5/17
4 Credit Card Apps and 18 Credit Report access attempts from a T-Mobile cell connection
Subscriber Industry Transaction Type Riverside, CA Mira Loma, CA
Univ of California –
Riverside
Totals
Financial Services
New Acct Application
Online Account Login
28
28
5
1
1
34
29
Credit Reporting Agency Access Attempt 227 9 14 250
Retail Purchase 2 14 16
Telecommunications Online Account Login 1 1
Travel Purchase 2 2
Device Activity
Step 5: compile fraud activity by location
16
Ø 150 transactions
Ø 50 Transactions
Ø 20 transactions
Ø 10 transactions
✪
✪
¤
¤
AT 30 , 0 0 0 F T, THE F RAUD RING L OOKS L IKE THIS
17
T H E T R E N D OF T R A N SA C T ION A C T IV IT Y OV E R T IME
0
10
20
30
40
50
60
15 16 17 18 19 20 21 22 23 24 25
TransactionCount
Week
Credit Bureaus
Financial Institutions
Retail
Other
actual activity noted with dashed lines
FRAUD & SECURITY
TRENDS
19
are using a
password that is
47% 77%
5+ YEARS OLD 1+ YEARS OLD
are using a
password that is
20
73%
of accounts
use duplicate
passwords.
*********
21
Record high for data
breaches
TARGET
EBAY
ADOBESONY
70M 10M
145M
152M
1.32 BILLION
RECORDS EXPOSED
IDENTITY THEFT RESOURCE CENTER
HOME DEPOT
56M MySpace
Tumblr
Fling
LinkedIn
642M
22
DATA
BREACHES
$5B in 2014
$8B in 2018
Data breaches will drive a 60%
increase in Account Takeover
and New Account Fraud.
60%
SOURCE: JAVELIN, 2015
INCREASE
23
F RAUD F ROM IDENTITY THEF T
24
GROWTH IN SYNTHETIC F RAUD ATTEMPTS
For a blend of consumer loan issuers, syntheticidentity frauds
were 4X more frequent than true identity fraud (1st Party & 3rd Party)
Contributing Factors
Appeal of
victim-less fraud
SSN Randomization
Increasing availability of
valid PII
0%
2%
4%
6%
8%
10%
12%
14%
2010 2011 2012 2013 2014 2015
Synthetic Fraud Rate "True Identity" Fraud Rate
SSN Randomization
takes effect
© 2016 ID Analytics
25
The evolving
online experience
26
Every online
transaction
is a potential
source of risk.
ACCOUNT
CREATION
LOGIN
BROWSE
STORE
PURCHASE
USE
REWARD
POINTS
CHANGE
ACCOUNT
DETAILS
27
ACCOUNT
CREATION
LOGIN
BROWSE
STORE
PURCHASE
USE
REWARD
POINTS
CHANGE
ACCOUNT
DETAILS
Every online
transaction
represents
your brand.
28
ACCOUNT
CREATION
LOGIN
BROWSE
STORE
PURCHASE
USE
REWARD
POINTS
CHANGE
ACCOUNT
DETAILS
Mobile devices
are proliferating
and becoming an
extension of your
customers.
29
LOGIN
CHANGE
ACCOUNTDETAILS
ADD ITEMS
TO SHOPPING CART
REDEEM
REWARDS POINTS
Your customers expect a frictionless user experience
across multiple channels: web, mobile web, mobile app
ACCOUNT
CREATION
PURCHASEVIEW
ORDER
BROWSE
CATALOG
Your business depends on happy customers balanced with
minimizing fraud risks and security
TYPICAL CONSUMER JOURNEY FOR ONLINE RETAIL
30
LOGIN
CHANGE
ACCOUNTDETAILS
CHECK
BALANCE
VISITBRANCH OR
CONTACT CALL CENTER
LOAN ORIGINATION
OR
ACCOUNTCREATION
CHECK BALANCE,
DEPOSIT, PAYMENT
WITHDRAWAL,
TRANSFER
TYPICAL CONSUMER JOURNEY FOR FINANCIAL SERVICES
31
LOGIN
CHANGE
ACCOUNTDETAILS
ADD ITEMS
TO SHOPPING CART
REDEEM
REWARDS POINTS
ACCOUNT
CREATION
PURCHASEVIEW
ORDER
BROWSE
CATALOG
Your business depends on happy customers balanced with
minimizing fraud risks and security
Device Intelligence can help
achieve this balance
Your customers expect a frictionless user experience
across multiple channels: web, mobile web, mobile app
32
AUTHORIZED
FOR ACCOUNT
HISTORICAL
REPUTATION
ANOMALOUS
BEHAVIOR
SECURITY RISK
INDICATORS
LINKSAND
ASSOCIATIONS
Use the device as the invisible second factor.
Device intelligence can be used for
frictionless authentication.
33
The benefit of using device intelligence
across the consumer online journey
34
Concerns:
Fraud prevention: 1st or 3rd party
account creation fraud
Device Intelligence Indicators
• High velocity rate
• Previous associated fraud evidence
• Geo-location
• Device evasion
• History of device
Application
Origination
35
Application
Origination
“Since we deployed iovation, we have
experienced dramatically lower fraud
losses resulting from the online credit
card application channel.”
-- CristinaKoder,
Fraud Operations Supervisor
Significant reduction in fraudulent credit applications
iovation helped:
n Link fraudulent devices and accounts together
n Determine real location vs stated location
Case Study: Financial Services
Challenges:
n Fraudsters applying for credit with stolen identity
n Risky transactions coming from multiple
geographies
36
AUTHORIZED
FOR ACCOUNT
HISTORICAL
REPUTATION
ANOMALOUS
BEHAVIOR
SECURITY RISK
INDICATORS
LINKSAND
ASSOCIATIONS
Device-based Authentication
Use the device as the invisible second factor.
37
PASSWORD-BASED
AUTHENTICATION
STEP UP
1-Factor Experience & 2-Factor Security
Users expect a low-friction authentication experience for most logins.
Interacting with a 2nd
factor of authentication is not low-friction.
1-FACTOR 2-FACTOR
Desired User Experience Required Security
38
Concerns:
n Stolen payment credentials
n International fraud rings
n Chargebacks
Device Intelligence Indicators
n High velocity rate
n Links to other accounts and devices
n Previous associated fraud evidence
n Geo-location
n Device evasion
n History of device
Guest
Checkout
39
“iovation’s device reputation
technology adds an incredibly
important layer of protection
to our fraud efforts”
-- Fraud Manager
reduction in order fraud
n iovation helped:
n Find and link previously unrelated accounts & devices
n Reduce manual reviews
n Identify & stop high-risk transactions
Case Study:
Electronics Retailer
n Challenges:
n Fraudsters constantly evolve new techniques to escape
detection
n Stolen payment credentials
n Hard to shut down international fraud rings
Guest
Checkout
25%
40
Our story starts
with a stolen
identity…
41
Within just a
few days…
charged over $5,000
in online purchases
42
The device
had a history…
43
Fraud
evidence
was placed
44
The fraudster was arrested.
45
15 identity theft victims
20 major retailers targeted with CNP fraud
60 credit apps
$70K restitution
$100K in projected losses
1
Person
Fraud Ring
46
LOGIN
CHANGE
ACCOUNTDETAILS
CHECK
BALANCE
WITHDRAWAL, FUND
TRANSFER
iovation helps you balance security with user experience
across the consumer journey
LOAN ORIGINATION
OR
ACCOUNTCREATION
CHECK BALANCE,
DEPOSIT
MAKE PAYMENTS
CUSTOMER
AUTHENTICATION
FRAUD
PREVENTION
Q&A
48
ANNUAL F RAUD F ORCE SUMMIT
R EGISTER @ www.fraudforcesummit.com
U S E P R O M O C O D E ‘ w e b i n a r 1 0 0 ’ T O S A V E $ 1 0 0
K E Y N O T E SPE AK E R :
THERESA PAYTON
FORMER WHITE HOUSE CIO
49
THANK YOU!

More Related Content

What's hot

Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
TransUnion
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
NEC Public Safety
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
rkappear
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Knowledge Group
 
Enterprise Fraud Management
Enterprise Fraud ManagementEnterprise Fraud Management
Enterprise Fraud Management
Manish Desai
 
A guide to Financial Crime Management
A guide to Financial Crime ManagementA guide to Financial Crime Management
A guide to Financial Crime Management
CustomerXPs Software Private Limited
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
Cartesian (formerly CSMG)
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
Ken Lam
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
Teo Leonard
 

What's hot (10)

Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee Seng
 
Enterprise Fraud Management
Enterprise Fraud ManagementEnterprise Fraud Management
Enterprise Fraud Management
 
A guide to Financial Crime Management
A guide to Financial Crime ManagementA guide to Financial Crime Management
A guide to Financial Crime Management
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
 

Viewers also liked

“Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World “Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World
Internet Society
 
Leveraging security to develop new digital banking models
Leveraging security to develop new digital banking modelsLeveraging security to develop new digital banking models
Leveraging security to develop new digital banking models
Luis Saiz Gimeno
 
E banking & security
E banking & securityE banking & security
E banking & security
Sumeer Sharma
 
Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?
Ocean9, Inc.
 
E-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-Commerce
E-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-CommerceE-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-Commerce
E-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-Commerce
E-Commerce Berlin EXPO
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
Syed Akhtar-Uz-Zaman
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Knowledge Group
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
Chiheb Chebbi
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
Clarice_Wilson
 
E banking security
E banking securityE banking security
E banking security
Iman Rahmanian
 
Banking Industry and Information Technology
Banking Industry and Information TechnologyBanking Industry and Information Technology
Banking Industry and Information TechnologyChandan Pahelwani
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
Prabhat Singh
 
Tech developments in banking sector
Tech developments in banking sectorTech developments in banking sector
Tech developments in banking sector
suhasmcomplex
 
ATM Awareness Guide
ATM Awareness GuideATM Awareness Guide
ATM Awareness Guide
Daniel Cheah
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.
worldstuff
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Siya Agarwal
 

Viewers also liked (17)

“Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World “Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World
 
Leveraging security to develop new digital banking models
Leveraging security to develop new digital banking modelsLeveraging security to develop new digital banking models
Leveraging security to develop new digital banking models
 
E banking & security
E banking & securityE banking & security
E banking & security
 
Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?
 
E-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-Commerce
E-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-CommerceE-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-Commerce
E-commerce Berlin Expo 2017 - Scaling Facebook Advertising in E-Commerce
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
E banking security
E banking securityE banking security
E banking security
 
Atm security
Atm securityAtm security
Atm security
 
Banking Industry and Information Technology
Banking Industry and Information TechnologyBanking Industry and Information Technology
Banking Industry and Information Technology
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
 
Tech developments in banking sector
Tech developments in banking sectorTech developments in banking sector
Tech developments in banking sector
 
ATM Awareness Guide
ATM Awareness GuideATM Awareness Guide
ATM Awareness Guide
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 

Similar to Balancing Security and Customer Experience

The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
TransUnion
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
TransUnion
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
Elizabeth Dimit
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
TransUnion
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
Ken Lam
 
Risk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechRisk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTech
Geo Coelho
 
Infographic - What is Vishing?
Infographic - What is Vishing?Infographic - What is Vishing?
Infographic - What is Vishing?
Futurism Technologies
 
ATM Fraud Prevention Management White Paper from ESQ
 ATM Fraud Prevention Management White Paper from ESQ ATM Fraud Prevention Management White Paper from ESQ
ATM Fraud Prevention Management White Paper from ESQ
ESQ Business Services
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
lgcdcpas
 
Rise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScanRise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScan
MicroWorld Software Services Pvt Ltd
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments FraudChristopher Uriarte
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
IBMgbsNA
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
IRJET Journal
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industry
itio Innovex Pvt Ltv
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
Laurent Pacalin
 
Greg Wolfond
Greg WolfondGreg Wolfond
Greg Wolfond
catalyticgov
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
FraudBusters
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Neo4j
 

Similar to Balancing Security and Customer Experience (20)

The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
 
Risk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechRisk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTech
 
Infographic - What is Vishing?
Infographic - What is Vishing?Infographic - What is Vishing?
Infographic - What is Vishing?
 
ATM Fraud Prevention Management White Paper from ESQ
 ATM Fraud Prevention Management White Paper from ESQ ATM Fraud Prevention Management White Paper from ESQ
ATM Fraud Prevention Management White Paper from ESQ
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
Rise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScanRise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScan
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industry
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
 
Greg Wolfond
Greg WolfondGreg Wolfond
Greg Wolfond
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 

More from TransUnion

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
TransUnion
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
TransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
TransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
TransUnion
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
TransUnion
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
TransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
TransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
TransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
TransUnion
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
TransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
TransUnion
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
TransUnion
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
TransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
TransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
TransUnion
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
TransUnion
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
TransUnion
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
TransUnion
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
TransUnion
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
TransUnion
 

More from TransUnion (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 

Recently uploaded

Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 

Recently uploaded (20)

Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 

Balancing Security and Customer Experience

  • 1. WEBINAR BALANCING SECURITY & CUSTOMER EXPERIENCE 7/19/16 MAX ANHOURY , VP, Global Partnerships
  • 2. AGENDA 2 n Introduction n Fraud & Security Trends n Frictionless Security Across the Consumer Journey n Summary
  • 3. 3 IOVATION INC. SOLUTIONS: Authentication and Fraud Prevention CUSTOMERS:450+, 6 Continents, 18 Time Zones FOUNDED: 2004 CUSTOMERRETENTION: 96% HEADQUARTERS: Portland, Oregon EMPLOYEES: 125 INVESTORS: Intel Capital, Sapphire Ventures COMMUNITY: 3,500 Fraud Professionals TOTAL TRANSACTIONS: 20B BRANDS PROTECTED:1,500+
  • 4. 4 Every device tells a story. What stories do you care about? Am I authorized for this account? Where am I located? Do I have a fraud history? What other devices does this consumer have? How many accounts have I accessed? Am I hiding from detection?
  • 5. 5 If a device can connect to the internet, we can recognize it.
  • 6. 6 Which device is this? Is it associated with bad devices? Are there real time risk indicators? Is it associated with abuse? DEEP DEVICE INTELLIGENCE: BEYOND DEVICE RECOGNITION
  • 9. 9 Ø 150 transactions Ø 50 Transactions Ø 20 transactions Ø 10 transactions ✪ ✪ ¤ ¤ AT 30 , 0 0 0 F T, THE F RAUD RING L OOKS L IKE THIS
  • 10. 10 T H E T R E N D OF T R A N SA C T ION A C T IV IT Y OV E R T IME 0 10 20 30 40 50 60 15 16 17 18 19 20 21 22 23 24 25 TransactionCount Week Credit Bureaus Financial Institutions Retail Other actual activity noted with dashed lines
  • 11. 11 Results of activity over 4 months • Searched for devices matching this profile: • Devices with activity with 3 or more subscribers • 2 of 3 subscribers within financial services industry • Devices with fraud histories from at least 2 subscribers 2K+ ACTIVE DEVICES 100K+ TRANSACTIONS 50K ACCOUNTS Performing Involving $ Step 1: Search existing fraud activity
  • 12. 12 Step 2: Review account and transaction velocity Count of Devices Average Accounts Accessed Average Total Transactions Average Subscriber Count % with Credit Bureau Activity All Devices Profiled 2,126 23 47 9 43% 20+ Accounts Accessed 880 40 79 12 55% Highest was 259 accts accessed by single device 100+ Total Transactions 211 64 165 15 66% 2 devices had over 1,300 transactions attempted +10 Transactions/ Day 61 29 89 7 37% Highest trans/day was 659 (21 trans. in 44 minutes)
  • 13. 13 Step 3: Associate devices & activity using data from our global network of our subscribers The group expands from 50k to 300k accounts ~16K+ ACTIVE DEVICES ~670K+ TRANSACTIONS ~300K ACCOUNTS Performing Involving $
  • 14. 14 • This device is associated with 13 additional devices through common account access. • Then we reviewed the prior history to understand the connected activity. Step 4: Investigate details on an individual device
  • 15. 15 • The 28 new account apps from Riverside were across 8 subscribers, demonstrating the effort taken to monetize stolen credentials. • Additional activity not accounted for above: 3 Credit Report access attempts from another Riverside address on 4/27 2 Credit Card Apps and 3 Login attempts from Whittier, CA (near Whittier College) on 5/17 4 Credit Card Apps and 18 Credit Report access attempts from a T-Mobile cell connection Subscriber Industry Transaction Type Riverside, CA Mira Loma, CA Univ of California – Riverside Totals Financial Services New Acct Application Online Account Login 28 28 5 1 1 34 29 Credit Reporting Agency Access Attempt 227 9 14 250 Retail Purchase 2 14 16 Telecommunications Online Account Login 1 1 Travel Purchase 2 2 Device Activity Step 5: compile fraud activity by location
  • 16. 16 Ø 150 transactions Ø 50 Transactions Ø 20 transactions Ø 10 transactions ✪ ✪ ¤ ¤ AT 30 , 0 0 0 F T, THE F RAUD RING L OOKS L IKE THIS
  • 17. 17 T H E T R E N D OF T R A N SA C T ION A C T IV IT Y OV E R T IME 0 10 20 30 40 50 60 15 16 17 18 19 20 21 22 23 24 25 TransactionCount Week Credit Bureaus Financial Institutions Retail Other actual activity noted with dashed lines
  • 19. 19 are using a password that is 47% 77% 5+ YEARS OLD 1+ YEARS OLD are using a password that is
  • 21. 21 Record high for data breaches TARGET EBAY ADOBESONY 70M 10M 145M 152M 1.32 BILLION RECORDS EXPOSED IDENTITY THEFT RESOURCE CENTER HOME DEPOT 56M MySpace Tumblr Fling LinkedIn 642M
  • 22. 22 DATA BREACHES $5B in 2014 $8B in 2018 Data breaches will drive a 60% increase in Account Takeover and New Account Fraud. 60% SOURCE: JAVELIN, 2015 INCREASE
  • 23. 23 F RAUD F ROM IDENTITY THEF T
  • 24. 24 GROWTH IN SYNTHETIC F RAUD ATTEMPTS For a blend of consumer loan issuers, syntheticidentity frauds were 4X more frequent than true identity fraud (1st Party & 3rd Party) Contributing Factors Appeal of victim-less fraud SSN Randomization Increasing availability of valid PII 0% 2% 4% 6% 8% 10% 12% 14% 2010 2011 2012 2013 2014 2015 Synthetic Fraud Rate "True Identity" Fraud Rate SSN Randomization takes effect © 2016 ID Analytics
  • 26. 26 Every online transaction is a potential source of risk. ACCOUNT CREATION LOGIN BROWSE STORE PURCHASE USE REWARD POINTS CHANGE ACCOUNT DETAILS
  • 29. 29 LOGIN CHANGE ACCOUNTDETAILS ADD ITEMS TO SHOPPING CART REDEEM REWARDS POINTS Your customers expect a frictionless user experience across multiple channels: web, mobile web, mobile app ACCOUNT CREATION PURCHASEVIEW ORDER BROWSE CATALOG Your business depends on happy customers balanced with minimizing fraud risks and security TYPICAL CONSUMER JOURNEY FOR ONLINE RETAIL
  • 30. 30 LOGIN CHANGE ACCOUNTDETAILS CHECK BALANCE VISITBRANCH OR CONTACT CALL CENTER LOAN ORIGINATION OR ACCOUNTCREATION CHECK BALANCE, DEPOSIT, PAYMENT WITHDRAWAL, TRANSFER TYPICAL CONSUMER JOURNEY FOR FINANCIAL SERVICES
  • 31. 31 LOGIN CHANGE ACCOUNTDETAILS ADD ITEMS TO SHOPPING CART REDEEM REWARDS POINTS ACCOUNT CREATION PURCHASEVIEW ORDER BROWSE CATALOG Your business depends on happy customers balanced with minimizing fraud risks and security Device Intelligence can help achieve this balance Your customers expect a frictionless user experience across multiple channels: web, mobile web, mobile app
  • 32. 32 AUTHORIZED FOR ACCOUNT HISTORICAL REPUTATION ANOMALOUS BEHAVIOR SECURITY RISK INDICATORS LINKSAND ASSOCIATIONS Use the device as the invisible second factor. Device intelligence can be used for frictionless authentication.
  • 33. 33 The benefit of using device intelligence across the consumer online journey
  • 34. 34 Concerns: Fraud prevention: 1st or 3rd party account creation fraud Device Intelligence Indicators • High velocity rate • Previous associated fraud evidence • Geo-location • Device evasion • History of device Application Origination
  • 35. 35 Application Origination “Since we deployed iovation, we have experienced dramatically lower fraud losses resulting from the online credit card application channel.” -- CristinaKoder, Fraud Operations Supervisor Significant reduction in fraudulent credit applications iovation helped: n Link fraudulent devices and accounts together n Determine real location vs stated location Case Study: Financial Services Challenges: n Fraudsters applying for credit with stolen identity n Risky transactions coming from multiple geographies
  • 37. 37 PASSWORD-BASED AUTHENTICATION STEP UP 1-Factor Experience & 2-Factor Security Users expect a low-friction authentication experience for most logins. Interacting with a 2nd factor of authentication is not low-friction. 1-FACTOR 2-FACTOR Desired User Experience Required Security
  • 38. 38 Concerns: n Stolen payment credentials n International fraud rings n Chargebacks Device Intelligence Indicators n High velocity rate n Links to other accounts and devices n Previous associated fraud evidence n Geo-location n Device evasion n History of device Guest Checkout
  • 39. 39 “iovation’s device reputation technology adds an incredibly important layer of protection to our fraud efforts” -- Fraud Manager reduction in order fraud n iovation helped: n Find and link previously unrelated accounts & devices n Reduce manual reviews n Identify & stop high-risk transactions Case Study: Electronics Retailer n Challenges: n Fraudsters constantly evolve new techniques to escape detection n Stolen payment credentials n Hard to shut down international fraud rings Guest Checkout 25%
  • 40. 40 Our story starts with a stolen identity…
  • 41. 41 Within just a few days… charged over $5,000 in online purchases
  • 42. 42 The device had a history…
  • 44. 44 The fraudster was arrested.
  • 45. 45 15 identity theft victims 20 major retailers targeted with CNP fraud 60 credit apps $70K restitution $100K in projected losses 1 Person Fraud Ring
  • 46. 46 LOGIN CHANGE ACCOUNTDETAILS CHECK BALANCE WITHDRAWAL, FUND TRANSFER iovation helps you balance security with user experience across the consumer journey LOAN ORIGINATION OR ACCOUNTCREATION CHECK BALANCE, DEPOSIT MAKE PAYMENTS CUSTOMER AUTHENTICATION FRAUD PREVENTION
  • 47. Q&A
  • 48. 48 ANNUAL F RAUD F ORCE SUMMIT R EGISTER @ www.fraudforcesummit.com U S E P R O M O C O D E ‘ w e b i n a r 1 0 0 ’ T O S A V E $ 1 0 0 K E Y N O T E SPE AK E R : THERESA PAYTON FORMER WHITE HOUSE CIO