SlideShare a Scribd company logo
Prevent banking frauds through identity
management
Luca Sciortino – Information Security, Banca Esperia
Giuseppe Paternò – Director Digital, GARL
Milan, 24th September 2013
3
About us
•  Security manager with Banca
Esperia
•  Experience in similar roles for
international bank groups
•  Expert in programming, open source
and IT security
Twitter: @sciortlu
LinkedIn: www.linkedin.com/in/sciortlu
Web Site: www.gruppoesperia.it
•  Director Digital with GARL, bank of
digital data founded in Switzerland
in 2008
•  IT Consultant cooperating with
Canonical and other big firms
•  In the past with Red Hat, Sun
Microsystems and IBM
•  Researcher and professor at Trinity
College Dublin
Twitter: @gpaterno
LinkedIn:
www.linkedin.com/in/gpaterno
Web Site: www.garl.ch
Luca Sciortino – Banca Esperia Giuseppe Paternò - GARL
6
Boom time for frauds
Sources: Association of Certified Fraud Examiners, Clusit, Unicredit Group, CRIF
Daily identity
fraud attempts
in Italy
50 Time to
discover an
internal fraud
18MONTHS
8
How much does frauds cost?
5% of profits are lost for frauds
Cost of a single fraud discovered by one
the main American bank in march 2011
Average of 1 out of 5 internal frauds in a
calendar year
Unrecoverable losses
Sources: Association of Certified Fraud Examiners, Clusit, Unicredit Group, CRIF - July 2013
3TRILLION $
A YEAR
10
MILLION $
1
MILLION $
50%
11
Internal vs. external frauds
•  Many attempts
•  Low impact for the bank
Ex. Credit cards skimming, debit cards,
false bonds, false insurances, online
frauds, identity theft, wire transfers
•  Few attempts
•  High impact for the bank
Ex. Insider Trading, roundings off,
misappropriation of funds, confidential
information leaking
External frauds Internal frauds
13
Internal frauds
More
risks
More
trust
Internal
audit
policies
16
Private banking and frauds, point of interests
Few VIP customers
Risk for accounts with substantial capital
Trust in the banker
The banker’s role is key in the relationship with
customers
Market Speculation
Personal speculations made by internal
professionals
Reputation
Losing the trust of customers/market is a bigger
damage than the fraud itself
18
External frauds and private banking
Private Banking
Lower risk of external
frauds
(less visibility and access
compared to retail
banking)
Retail Banking
Higher risk of external
frauds
(public access to the core
services)
20
Human factor and frauds
Information leaking
Confidential data about VIP Customers,
personal assets, portfolio of investments
Mutual confidence among colleagues
Passwords exchange, use of applications
forbidden by the security policies, …
23
The role of identity in frauds
Transations
Logging
Frequent
access to VIP
and high
value
accounts
Physical and
logical
access
control
Application
Authorisation
Proven
identity
25
Identity management for frauds prevention
Forbidden and/or
off-hour access
Counterfeiting of
documents
Identity theft
26
KPI
Banca Esperia is the Private Banking boutique of
Mediobanca and Mediolanum, for private and
international clients.
Born in 2001, the group is specialized in advisory
services, financial services and wealth planning
About Banca Esperia
Branches
•  Personnel: 250
•  Private Banker: 76
•  Branches: 12
•  Total asset: € 14,3 mld
(june 2013)
30
SecurePass for digital identity protection
Identity management
The user is really who he
claims to be – multifactor
authentication
EMV cards
Identity cards for combined
physical and logical access
Compliance
Compliant to EU regulations
32
SecurePass guarantees digital identity of users
SecurePass manage the
lifecycle of users from an easy-
to-use web control panel
Group
management
Audit and
centralized
management
Hosted in
European
datacenters by
GARL
34
SecurePass cloud service for identity theft prevention
SecurePass is the platform for digital
identity protection
Military grade
protection level
Covered by an
insurance policy
From the experience
and in collaboration
with Swiss banks
36
SecurePass security architecture
•  SecurePass identity verifcation
•  Verification of the location context
(i.e. Internet, MPLS network, intranet,…)
•  Access authorization to applications
•  Centralized logging
(who’s accessing what, from which IP, with which
device/operating system and time of the day)
Centralized control
Double authorisation control
over applications and on
every application’s features
Tracking of single features,
Access to NDG, account
Number, etc.
Applications
39
Benefits for finance and banking
Outsouced
identity
management
Streamline
access
Reduced
operating
risks
41
Oousource identity management to a trusted third party
Reduce mantainance cost
Reduce internal fraud
attempts
Latest identity frauds
technologies
Guarantee personnel
identification
Relief the bank
responsability (service
covered by insurance)
Reducing human factor
risks
44
Centralized access
Single point of
management
Reduction of risks
related to
authorisation and
rights management
Improve users’
experience with
Single Sign-On
Compliant with EU
regulations (i.e.
italian “Garante
della privacy II” )
45
Operating risk reduction
Strenghten transaction
control
Prevent information
leaking
Double authorisation:
customer is guaranteed
of the truthfulness of the
transaction
47
Conclusions
Human factor is a risk for frauds in private
banking
Identity management can mitigate risks
Multifactor authentication to guard access
Audit & Compliance
49
Thank you

More Related Content

What's hot

Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensics
whbrown5
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
Yogi Schulz
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
Gerald Johnson
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management Consultants
EMAC Consulting Group
 
Fraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY IndiaFraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY India
Ernst & Young
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part ii
EMAC Consulting Group
 
Forensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolForensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection tool
Haládik Consulting, s.r.o.
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
Case IQ
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
Salih Islam
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
Veriti Consulting LLC
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
EMAC Consulting Group
 
Chapter 6 Check Fraud Final
Chapter 6 Check Fraud FinalChapter 6 Check Fraud Final
Chapter 6 Check Fraud Final
LucyndaGrider
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
Case IQ
 
Who Commits Fraud
Who Commits Fraud   Who Commits Fraud
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
John Hall, CPA - Keynote Speaker Consultant
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
SAS Institute India Pvt. Ltd
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryDecosimoCPAs
 
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
DecosimoCPAs
 
How to Prevent and Detect Fraud in Your Organization
How to Prevent and Detect Fraud in Your OrganizationHow to Prevent and Detect Fraud in Your Organization
How to Prevent and Detect Fraud in Your Organization
Gross, Mendelsohn & Associates
 

What's hot (20)

Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensics
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management Consultants
 
Fraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY IndiaFraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY India
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part ii
 
Forensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolForensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection tool
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
 
Chapter 6 Check Fraud Final
Chapter 6 Check Fraud FinalChapter 6 Check Fraud Final
Chapter 6 Check Fraud Final
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
Who Commits Fraud
Who Commits Fraud   Who Commits Fraud
Who Commits Fraud
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
 
Into to Fraud Examination
Into to Fraud ExaminationInto to Fraud Examination
Into to Fraud Examination
 
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
 
How to Prevent and Detect Fraud in Your Organization
How to Prevent and Detect Fraud in Your OrganizationHow to Prevent and Detect Fraud in Your Organization
How to Prevent and Detect Fraud in Your Organization
 

Similar to Prevent banking frauds through identity management

Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
OCTF Industry Engagement
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
inLabFIB
 
MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018
Match-Maker Ventures
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
CXO 2.0 Conference
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
wegdam
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
OCTF Industry Engagement
 
Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...
Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...
Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...
HarshitaMadhale
 
Best practices in Digital Payments to Minimize Security Threats.pdf
Best practices in Digital Payments to Minimize Security Threats.pdfBest practices in Digital Payments to Minimize Security Threats.pdf
Best practices in Digital Payments to Minimize Security Threats.pdf
Pay10
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
Ulf Mattsson
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
Deepak Kumar
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' Data
Hellmuth Broda
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
SecureAuth
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...
XeniT Solutions nv
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
Ulf Mattsson
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
ITIO Innovex
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
FinTech Belgium
 

Similar to Prevent banking frauds through identity management (20)

Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...
Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...
Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Best practices in Digital Payments to Minimize Security Threats.pdf
Best practices in Digital Payments to Minimize Security Threats.pdfBest practices in Digital Payments to Minimize Security Threats.pdf
Best practices in Digital Payments to Minimize Security Threats.pdf
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' Data
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Prevent banking frauds through identity management

  • 1. Prevent banking frauds through identity management Luca Sciortino – Information Security, Banca Esperia Giuseppe Paternò – Director Digital, GARL Milan, 24th September 2013
  • 2. 3 About us •  Security manager with Banca Esperia •  Experience in similar roles for international bank groups •  Expert in programming, open source and IT security Twitter: @sciortlu LinkedIn: www.linkedin.com/in/sciortlu Web Site: www.gruppoesperia.it •  Director Digital with GARL, bank of digital data founded in Switzerland in 2008 •  IT Consultant cooperating with Canonical and other big firms •  In the past with Red Hat, Sun Microsystems and IBM •  Researcher and professor at Trinity College Dublin Twitter: @gpaterno LinkedIn: www.linkedin.com/in/gpaterno Web Site: www.garl.ch Luca Sciortino – Banca Esperia Giuseppe Paternò - GARL
  • 3. 6 Boom time for frauds Sources: Association of Certified Fraud Examiners, Clusit, Unicredit Group, CRIF Daily identity fraud attempts in Italy 50 Time to discover an internal fraud 18MONTHS
  • 4. 8 How much does frauds cost? 5% of profits are lost for frauds Cost of a single fraud discovered by one the main American bank in march 2011 Average of 1 out of 5 internal frauds in a calendar year Unrecoverable losses Sources: Association of Certified Fraud Examiners, Clusit, Unicredit Group, CRIF - July 2013 3TRILLION $ A YEAR 10 MILLION $ 1 MILLION $ 50%
  • 5. 11 Internal vs. external frauds •  Many attempts •  Low impact for the bank Ex. Credit cards skimming, debit cards, false bonds, false insurances, online frauds, identity theft, wire transfers •  Few attempts •  High impact for the bank Ex. Insider Trading, roundings off, misappropriation of funds, confidential information leaking External frauds Internal frauds
  • 7. 16 Private banking and frauds, point of interests Few VIP customers Risk for accounts with substantial capital Trust in the banker The banker’s role is key in the relationship with customers Market Speculation Personal speculations made by internal professionals Reputation Losing the trust of customers/market is a bigger damage than the fraud itself
  • 8. 18 External frauds and private banking Private Banking Lower risk of external frauds (less visibility and access compared to retail banking) Retail Banking Higher risk of external frauds (public access to the core services)
  • 9. 20 Human factor and frauds Information leaking Confidential data about VIP Customers, personal assets, portfolio of investments Mutual confidence among colleagues Passwords exchange, use of applications forbidden by the security policies, …
  • 10. 23 The role of identity in frauds Transations Logging Frequent access to VIP and high value accounts Physical and logical access control Application Authorisation Proven identity
  • 11. 25 Identity management for frauds prevention Forbidden and/or off-hour access Counterfeiting of documents Identity theft
  • 12. 26 KPI Banca Esperia is the Private Banking boutique of Mediobanca and Mediolanum, for private and international clients. Born in 2001, the group is specialized in advisory services, financial services and wealth planning About Banca Esperia Branches •  Personnel: 250 •  Private Banker: 76 •  Branches: 12 •  Total asset: € 14,3 mld (june 2013)
  • 13. 30 SecurePass for digital identity protection Identity management The user is really who he claims to be – multifactor authentication EMV cards Identity cards for combined physical and logical access Compliance Compliant to EU regulations
  • 14. 32 SecurePass guarantees digital identity of users SecurePass manage the lifecycle of users from an easy- to-use web control panel Group management Audit and centralized management Hosted in European datacenters by GARL
  • 15. 34 SecurePass cloud service for identity theft prevention SecurePass is the platform for digital identity protection Military grade protection level Covered by an insurance policy From the experience and in collaboration with Swiss banks
  • 16. 36 SecurePass security architecture •  SecurePass identity verifcation •  Verification of the location context (i.e. Internet, MPLS network, intranet,…) •  Access authorization to applications •  Centralized logging (who’s accessing what, from which IP, with which device/operating system and time of the day) Centralized control Double authorisation control over applications and on every application’s features Tracking of single features, Access to NDG, account Number, etc. Applications
  • 17. 39 Benefits for finance and banking Outsouced identity management Streamline access Reduced operating risks
  • 18. 41 Oousource identity management to a trusted third party Reduce mantainance cost Reduce internal fraud attempts Latest identity frauds technologies Guarantee personnel identification Relief the bank responsability (service covered by insurance) Reducing human factor risks
  • 19. 44 Centralized access Single point of management Reduction of risks related to authorisation and rights management Improve users’ experience with Single Sign-On Compliant with EU regulations (i.e. italian “Garante della privacy II” )
  • 20. 45 Operating risk reduction Strenghten transaction control Prevent information leaking Double authorisation: customer is guaranteed of the truthfulness of the transaction
  • 21. 47 Conclusions Human factor is a risk for frauds in private banking Identity management can mitigate risks Multifactor authentication to guard access Audit & Compliance