SlideShare a Scribd company logo
WEBINAR
EIGHT MONTHS OF EMV
EARLY FRAUD SHIFTS AND TRAJECTORY
JUNE 2016
2
The transition to EMV card
types will drive major
changes in consumer
behavior, in infrastructure and
liablility, and in fraud
patterns.
How do experiences in other
countries help us prepare
for these shifts?
3
JU LIE C ON R OY
R E S E A R C H D I R E C T O R
 Head of Aite Group’s Retail Banking & Payments practice, covering
fraud, data security, anti-money laundering, and compliance.
 VP-level product management roles in financial services, risk
management and payment processing.
MICHAEL THELANDER
P R O D U C T M A R K E T I N G M A N A G E R , A U T H E N T I C A T I O N
 Manages go-to-market, launch and customer education activities for
iovation’s authentication products.
 20 years in VP- and director-level product management and product
marketing roles for information security companies.
4
AGENDA
1
2
3
4
WHY & WHAT
Understanding EMV transition
Goals and desired outcomes
LESSONS LEARNED
Experiences in other countries
Fraud trends and directions
EXPECT THE EXPECTED What will we see in the U.S.?
HOW TO PREPARE
What tools are at your disposal
What’s next for card-not-present fraud?
WHY & WHAT
WHAT PROBLEM IS EMV SUPPOSED TO
SOLVE?
6
WHY EMV?
P R O B L E M S S O L V E D B Y E M V C A R D S A N D T E R M I N A L S
EMV cards (EMV stands for “Europay”, “MasterCard” and “Visa”) add a chip
that makes it virtually impossible to use a counterfeit card
Business who use EMV cards throughout their payment process will not be
liable for purchases on lost, stolen or counterfeit cards
The verification data embedded on the chip includes a continually changing
algorithm that makes it easier to detect or deny stolen cards
Like around one-third of the EMV deployments in the world, the U.S. is
primarily chip-and-signature, since lost/stolen fraud is relatively minor in the
U.S. market
7
PROGRESS IN TRANSITION
8 1 % O F C R E D I T C A R D S , 5 7 % O F D E B I T
8
PROGRESS IN TRANSITION
9 4 % O F C R E D I T C A R D D O L L A R S , 7 2 % O F D E B I T D O L L A R S
9
LESSONS LEARNED
“THOSE WHO DON’T REMEMBER THE PAST … REPEAT
IT.”
11
CNP LESSONS FROM THE U.K.
“ S Q U E E Z I N G T H E B A L L O O N ”
From 2012 to 2015
counterfeit fraud
increased marginally, by
less than 7%
But at the same time
Card-Not-Present fraud
increased by over 60%
12
CNP LESSONS, CANADA & AUSTRALIA
“ S Q U E E Z I N G T H E B A L L O O N ”
From 2012 to 2014,
Canada saw a $91
million increase in CNP
fraud – more than 33%
Australia’s transition was
similar, with 60% more
CNP fraud and a $117M
increase in losses
13
TWO TYPES OF CARD -LESS FRAUD
A C C O U N T T A K E O V E R
Criminals fish for info, pretend to
be the cardholder, and then
request a replacement card
CARD-BASED ATO
Access a legitimate account
through hacking or fraud, and
transfer funds to another account
ONLINE BANKING ATO
14
ACCOUNT TAKEOVER IN THE U.K.
“ S Q U E E Z I N G T H E B A L L O O N ”
From 2012 to 2015, the
U.K. saw a £1M
decrease in card-based
ATO
While online-based
account takeover
increased £61M, or
250%
EXPECT THE
EXPECTEDPROJECTING THE IMPACT OF EMV ROLLOUT IN THE
U.S.
16
PROJECTED IMPACTS IN THE U.S.
E S T I M A T I N G U . S . C O U N T E R F E I T C A R D L O S S E S
Stem the sharp increase
that was seen from 2012
through 2015
Begin a precipitous
decline in counterfeit
fraud activity
17
18
PROJECTED IMPACTS IN THE U.S.
A C C O U N T T A K E O V E R L O S S E S T H R O U G H 2 0 2 0
Expect a $330 million
increase in U.S. account
takeover losses
19
PROJECTED IMPACTS IN THE U.S.
“ S Q U E E Z I N G T H E B A L L O O N ”
But worse a potentially
disastrous increase in
CNP fraud
CNP fraud is projected
to see a 80% increase
over the next 4+ years
20
A word about
cyber criminals
21
Fraud Inc.
22
ORGANIZED CRIME RINGS ARE QUICK TO FIND
GAPS
N I M B L E A N D E A G E R T O A D A P T
HOW TO PREPARE
WHAT TO DO, AND THE FUTURE OF CNP FRAUD
24
FIGHTING CNP FRAUD
8 T O O L S A T Y O U R D I S P O S A L
Device fingerprinting and digital identity
Behavioral analytics & behavioral
biometrics
Malware detection
Mobile operator data
Knowledge Based Authentication (KBA)
Out-of-Band Authentication
Transaction Signing
Biometrics
25
Device fingerprinting and digital identity
FIGHTING CNP FRAUD
8 T O O L S A T Y O U R D I S P O S A L
Behavioral analytics & behavioral
biometrics
Malware detection
Mobile operator data
Knowledge Based Authentication (KBA)
Out-of-Band Authentication
Transaction Signing
Biometrics
LOW FRICTION
LOW FRICTION
LOW FRICTION
LOW FRICTION
HIGH FRICTION
HIGH FRICTION
HIGH FRICTION
HIGH FRICTION
26
HISTORICAL
REPUTATION
ANOMALOUS
BEHAVIOR SECURITY RISK
INDICATORS
AUTHORIZED
FOR ACCOUNT
LINKS AND
ASSOCIATIONS
CUSTOMER
AUTHENTICATION
THE GOOD NEWS: YOU ALREADY HAVE THE TOOLS
FRAUD
PREVENTION
27
ACCOUNT
LOGIN
CHANGE
ACCOUNT DETAILS
CHECK
BALANCE
WITHDRAWAL,
FUND TRANSFER
THE GOOD NEWS: YOU ALREADY HAVE THE TOOLS
LOAN ORIGINATION
OR
ACCOUNT CREATION
CHECK BALANCE,
DEPOSIT
MAKE
PAYMENTS
CUSTOMER
AUTHENTICATION
FRAUD
PREVENTION
FRAUD
PREVENTION
28
RECOMMENDATIONS
FOR ISSUERS FOR MERCHANTS
INVEST IN
SOLUTIONS
ACCELERATE
BOLSTER CNP
CONTROLS
BEWARE OF
ATM ATTACKS EDUCATE
PRIORITIZE
RETERMINALIZATION
29
THE EVOLUTION OF FRAUD, INC?
8400 miles, 1600 forged cards, 1400 transactions, $13 million …..
… in less than three hours.
30
THE EVOLUTION OF FRAUD, INC?
8400 miles, 1600 forged cards, 1400 transactions, $13 million …..
… in less than three hours.
31
G O T O W W W . I O V A T I O N . C O M / R E S O U R C E S
RESOURCES
“AUTHENTITHINGS” WEBINAR
A review of the overall state of
authentication in consumer-oriented,
“Internet-of-Things” technologies.
AITE REPORT ON EMV TRANSITION
The full report on EMV migration and the
impact of shrinking counterfeit card
opportunity on other forms of fraud.
Q&A

More Related Content

What's hot

What We Learned Working with Forter
What We Learned Working with ForterWhat We Learned Working with Forter
What We Learned Working with Forter
Simplifilm
 
Malwarebytes - Global Impact of Ransomware on Business
Malwarebytes - Global Impact of Ransomware on BusinessMalwarebytes - Global Impact of Ransomware on Business
Malwarebytes - Global Impact of Ransomware on Business
Infographic Box IDS
 
RSA Online Fraud Report - July 2014
RSA Online Fraud Report - July 2014RSA Online Fraud Report - July 2014
RSA Online Fraud Report - July 2014
EMC
 
Detecting fraud through traffic analytics
Detecting fraud through traffic analyticsDetecting fraud through traffic analytics
Detecting fraud through traffic analytics
Sven Hezel
 
Insurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesInsurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slides
Callcredit123
 
Challenge Accepted
Challenge AcceptedChallenge Accepted
Challenge Accepted
Edward Jackson
 
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present FraudKnow your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Noam Inbar
 
How to detect affiliate fraud
How to detect affiliate fraudHow to detect affiliate fraud
How to detect affiliate fraud
Sven Hezel
 
Bucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalBucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in Digital
Eric Bozinny
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
TransUnion
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire Fraud
Michael Holden
 
Fraudshield: Innovative affiliate fraud solution
Fraudshield: Innovative affiliate fraud solutionFraudshield: Innovative affiliate fraud solution
Fraudshield: Innovative affiliate fraud solution
alexander24metrics
 
Dynamic authentication rollin'
Dynamic authentication rollin'Dynamic authentication rollin'
Dynamic authentication rollin'
TransUnion
 
Apsalar App Fraud Index Report - July 2015
Apsalar App Fraud Index Report - July 2015Apsalar App Fraud Index Report - July 2015
Apsalar App Fraud Index Report - July 2015
James Nichols
 
Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In EcommerceLarry_Moffatt
 
eCommerce – Fraud
eCommerce – FraudeCommerce – Fraud
eCommerce – Fraud
paul young cpa, cga
 
Crypto traders study / 2019
Crypto traders study / 2019Crypto traders study / 2019
Crypto traders study / 2019
Alessandro Benigni 🌕
 
Rise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScanRise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScan
MicroWorld Software Services Pvt Ltd
 
Infographic: Global Mobile Payment Methods: First Half 2016
Infographic: Global Mobile Payment Methods: First Half 2016Infographic: Global Mobile Payment Methods: First Half 2016
Infographic: Global Mobile Payment Methods: First Half 2016
yStats.com
 

What's hot (19)

What We Learned Working with Forter
What We Learned Working with ForterWhat We Learned Working with Forter
What We Learned Working with Forter
 
Malwarebytes - Global Impact of Ransomware on Business
Malwarebytes - Global Impact of Ransomware on BusinessMalwarebytes - Global Impact of Ransomware on Business
Malwarebytes - Global Impact of Ransomware on Business
 
RSA Online Fraud Report - July 2014
RSA Online Fraud Report - July 2014RSA Online Fraud Report - July 2014
RSA Online Fraud Report - July 2014
 
Detecting fraud through traffic analytics
Detecting fraud through traffic analyticsDetecting fraud through traffic analytics
Detecting fraud through traffic analytics
 
Insurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesInsurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slides
 
Challenge Accepted
Challenge AcceptedChallenge Accepted
Challenge Accepted
 
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present FraudKnow your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
 
How to detect affiliate fraud
How to detect affiliate fraudHow to detect affiliate fraud
How to detect affiliate fraud
 
Bucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalBucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in Digital
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire Fraud
 
Fraudshield: Innovative affiliate fraud solution
Fraudshield: Innovative affiliate fraud solutionFraudshield: Innovative affiliate fraud solution
Fraudshield: Innovative affiliate fraud solution
 
Dynamic authentication rollin'
Dynamic authentication rollin'Dynamic authentication rollin'
Dynamic authentication rollin'
 
Apsalar App Fraud Index Report - July 2015
Apsalar App Fraud Index Report - July 2015Apsalar App Fraud Index Report - July 2015
Apsalar App Fraud Index Report - July 2015
 
Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In Ecommerce
 
eCommerce – Fraud
eCommerce – FraudeCommerce – Fraud
eCommerce – Fraud
 
Crypto traders study / 2019
Crypto traders study / 2019Crypto traders study / 2019
Crypto traders study / 2019
 
Rise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScanRise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScan
 
Infographic: Global Mobile Payment Methods: First Half 2016
Infographic: Global Mobile Payment Methods: First Half 2016Infographic: Global Mobile Payment Methods: First Half 2016
Infographic: Global Mobile Payment Methods: First Half 2016
 

Viewers also liked

Protect Your SMB from Payment Security Breaches
Protect Your SMB from Payment Security BreachesProtect Your SMB from Payment Security Breaches
Protect Your SMB from Payment Security Breaches
Verifone
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
NowSecure
 
NTXISSACSC3 - EMV and the Future of Payments by Branden Williams
NTXISSACSC3 - EMV and the Future of Payments by Branden WilliamsNTXISSACSC3 - EMV and the Future of Payments by Branden Williams
NTXISSACSC3 - EMV and the Future of Payments by Branden Williams
North Texas Chapter of the ISSA
 
7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar
Ingenico Group
 
2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data
Kelvin Medina, CISSP, PA-QSA, QSA, GCIH, CISA, ITIL
 
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
Ingenico Group
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of Sale
Tripwire
 
CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017Joseph John
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
ISACA
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
Ramiro Cid
 
The Future of Retail 2017: Trends Shaping the Digital Experience
The Future of Retail 2017: Trends Shaping the Digital ExperienceThe Future of Retail 2017: Trends Shaping the Digital Experience
The Future of Retail 2017: Trends Shaping the Digital Experience
National Retail Federation
 
Modern Retail Guide to EPOS
Modern Retail Guide to EPOSModern Retail Guide to EPOS
Modern Retail Guide to EPOS
ModernRetailUK
 
Digital marketing Trends 2017
Digital marketing Trends 2017Digital marketing Trends 2017
Digital marketing Trends 2017
Infocrest
 
What retailers want you to know about data security
What retailers want you to know about data securityWhat retailers want you to know about data security
What retailers want you to know about data security
National Retail Federation
 

Viewers also liked (14)

Protect Your SMB from Payment Security Breaches
Protect Your SMB from Payment Security BreachesProtect Your SMB from Payment Security Breaches
Protect Your SMB from Payment Security Breaches
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
NTXISSACSC3 - EMV and the Future of Payments by Branden Williams
NTXISSACSC3 - EMV and the Future of Payments by Branden WilliamsNTXISSACSC3 - EMV and the Future of Payments by Branden Williams
NTXISSACSC3 - EMV and the Future of Payments by Branden Williams
 
7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar
 
2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data
 
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of Sale
 
CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
The Future of Retail 2017: Trends Shaping the Digital Experience
The Future of Retail 2017: Trends Shaping the Digital ExperienceThe Future of Retail 2017: Trends Shaping the Digital Experience
The Future of Retail 2017: Trends Shaping the Digital Experience
 
Modern Retail Guide to EPOS
Modern Retail Guide to EPOSModern Retail Guide to EPOS
Modern Retail Guide to EPOS
 
Digital marketing Trends 2017
Digital marketing Trends 2017Digital marketing Trends 2017
Digital marketing Trends 2017
 
What retailers want you to know about data security
What retailers want you to know about data securityWhat retailers want you to know about data security
What retailers want you to know about data security
 

Similar to Eight Months of EMV: Early Fraud Shifts and Trajectory

2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
TransUnion
 
The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention
TransUnion
 
Consumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupConsumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite Group
TransUnion
 
Fraud Prevention in International Commerce
Fraud Prevention in International CommerceFraud Prevention in International Commerce
Fraud Prevention in International Commerce
Secure Trading
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
Alireza Ghahrood
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
Alireza Ghahrood
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
TransUnion
 
Optimising Payments for Strong Customer Authentication (SCA)
Optimising Payments for Strong Customer Authentication (SCA)Optimising Payments for Strong Customer Authentication (SCA)
Optimising Payments for Strong Customer Authentication (SCA)
Elliott Barton
 
Get Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present FraudGet Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present Fraud
TransUnion
 
Chipping Away at EMV Myths
Chipping Away at EMV MythsChipping Away at EMV Myths
Chipping Away at EMV Myths
Experian
 
World Payments Report 2014 Key Findings Presentation
World Payments Report 2014 Key Findings PresentationWorld Payments Report 2014 Key Findings Presentation
World Payments Report 2014 Key Findings Presentation
Capgemini
 
Leveraging graph technology to fight financial fraud
Leveraging graph technology to fight financial fraudLeveraging graph technology to fight financial fraud
Leveraging graph technology to fight financial fraud
Neo4j
 
Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?
Uniphore
 
Blockchain - creating more transparent economy
Blockchain - creating more transparent economy Blockchain - creating more transparent economy
Blockchain - creating more transparent economy
Paweł Kuskowski
 
Achieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerAchieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the Customer
TransUnion
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
TransUnion
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissectedamiable_indian
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008ClubHack
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Merchants
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET Journal
 

Similar to Eight Months of EMV: Early Fraud Shifts and Trajectory (20)

2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention
 
Consumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupConsumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite Group
 
Fraud Prevention in International Commerce
Fraud Prevention in International CommerceFraud Prevention in International Commerce
Fraud Prevention in International Commerce
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Optimising Payments for Strong Customer Authentication (SCA)
Optimising Payments for Strong Customer Authentication (SCA)Optimising Payments for Strong Customer Authentication (SCA)
Optimising Payments for Strong Customer Authentication (SCA)
 
Get Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present FraudGet Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present Fraud
 
Chipping Away at EMV Myths
Chipping Away at EMV MythsChipping Away at EMV Myths
Chipping Away at EMV Myths
 
World Payments Report 2014 Key Findings Presentation
World Payments Report 2014 Key Findings PresentationWorld Payments Report 2014 Key Findings Presentation
World Payments Report 2014 Key Findings Presentation
 
Leveraging graph technology to fight financial fraud
Leveraging graph technology to fight financial fraudLeveraging graph technology to fight financial fraud
Leveraging graph technology to fight financial fraud
 
Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?
 
Blockchain - creating more transparent economy
Blockchain - creating more transparent economy Blockchain - creating more transparent economy
Blockchain - creating more transparent economy
 
Achieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerAchieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the Customer
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid Models
 

More from TransUnion

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
TransUnion
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
TransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
TransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
TransUnion
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
TransUnion
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
TransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
TransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
TransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
TransUnion
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
TransUnion
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
TransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
TransUnion
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
TransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
TransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
TransUnion
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
TransUnion
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
TransUnion
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
TransUnion
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
TransUnion
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
TransUnion
 

More from TransUnion (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
 

Recently uploaded

Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 

Recently uploaded (20)

Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 

Eight Months of EMV: Early Fraud Shifts and Trajectory

  • 1. WEBINAR EIGHT MONTHS OF EMV EARLY FRAUD SHIFTS AND TRAJECTORY JUNE 2016
  • 2. 2 The transition to EMV card types will drive major changes in consumer behavior, in infrastructure and liablility, and in fraud patterns. How do experiences in other countries help us prepare for these shifts?
  • 3. 3 JU LIE C ON R OY R E S E A R C H D I R E C T O R  Head of Aite Group’s Retail Banking & Payments practice, covering fraud, data security, anti-money laundering, and compliance.  VP-level product management roles in financial services, risk management and payment processing. MICHAEL THELANDER P R O D U C T M A R K E T I N G M A N A G E R , A U T H E N T I C A T I O N  Manages go-to-market, launch and customer education activities for iovation’s authentication products.  20 years in VP- and director-level product management and product marketing roles for information security companies.
  • 4. 4 AGENDA 1 2 3 4 WHY & WHAT Understanding EMV transition Goals and desired outcomes LESSONS LEARNED Experiences in other countries Fraud trends and directions EXPECT THE EXPECTED What will we see in the U.S.? HOW TO PREPARE What tools are at your disposal What’s next for card-not-present fraud?
  • 5. WHY & WHAT WHAT PROBLEM IS EMV SUPPOSED TO SOLVE?
  • 6. 6 WHY EMV? P R O B L E M S S O L V E D B Y E M V C A R D S A N D T E R M I N A L S EMV cards (EMV stands for “Europay”, “MasterCard” and “Visa”) add a chip that makes it virtually impossible to use a counterfeit card Business who use EMV cards throughout their payment process will not be liable for purchases on lost, stolen or counterfeit cards The verification data embedded on the chip includes a continually changing algorithm that makes it easier to detect or deny stolen cards Like around one-third of the EMV deployments in the world, the U.S. is primarily chip-and-signature, since lost/stolen fraud is relatively minor in the U.S. market
  • 7. 7 PROGRESS IN TRANSITION 8 1 % O F C R E D I T C A R D S , 5 7 % O F D E B I T
  • 8. 8 PROGRESS IN TRANSITION 9 4 % O F C R E D I T C A R D D O L L A R S , 7 2 % O F D E B I T D O L L A R S
  • 9. 9
  • 10. LESSONS LEARNED “THOSE WHO DON’T REMEMBER THE PAST … REPEAT IT.”
  • 11. 11 CNP LESSONS FROM THE U.K. “ S Q U E E Z I N G T H E B A L L O O N ” From 2012 to 2015 counterfeit fraud increased marginally, by less than 7% But at the same time Card-Not-Present fraud increased by over 60%
  • 12. 12 CNP LESSONS, CANADA & AUSTRALIA “ S Q U E E Z I N G T H E B A L L O O N ” From 2012 to 2014, Canada saw a $91 million increase in CNP fraud – more than 33% Australia’s transition was similar, with 60% more CNP fraud and a $117M increase in losses
  • 13. 13 TWO TYPES OF CARD -LESS FRAUD A C C O U N T T A K E O V E R Criminals fish for info, pretend to be the cardholder, and then request a replacement card CARD-BASED ATO Access a legitimate account through hacking or fraud, and transfer funds to another account ONLINE BANKING ATO
  • 14. 14 ACCOUNT TAKEOVER IN THE U.K. “ S Q U E E Z I N G T H E B A L L O O N ” From 2012 to 2015, the U.K. saw a £1M decrease in card-based ATO While online-based account takeover increased £61M, or 250%
  • 15. EXPECT THE EXPECTEDPROJECTING THE IMPACT OF EMV ROLLOUT IN THE U.S.
  • 16. 16 PROJECTED IMPACTS IN THE U.S. E S T I M A T I N G U . S . C O U N T E R F E I T C A R D L O S S E S Stem the sharp increase that was seen from 2012 through 2015 Begin a precipitous decline in counterfeit fraud activity
  • 17. 17
  • 18. 18 PROJECTED IMPACTS IN THE U.S. A C C O U N T T A K E O V E R L O S S E S T H R O U G H 2 0 2 0 Expect a $330 million increase in U.S. account takeover losses
  • 19. 19 PROJECTED IMPACTS IN THE U.S. “ S Q U E E Z I N G T H E B A L L O O N ” But worse a potentially disastrous increase in CNP fraud CNP fraud is projected to see a 80% increase over the next 4+ years
  • 22. 22 ORGANIZED CRIME RINGS ARE QUICK TO FIND GAPS N I M B L E A N D E A G E R T O A D A P T
  • 23. HOW TO PREPARE WHAT TO DO, AND THE FUTURE OF CNP FRAUD
  • 24. 24 FIGHTING CNP FRAUD 8 T O O L S A T Y O U R D I S P O S A L Device fingerprinting and digital identity Behavioral analytics & behavioral biometrics Malware detection Mobile operator data Knowledge Based Authentication (KBA) Out-of-Band Authentication Transaction Signing Biometrics
  • 25. 25 Device fingerprinting and digital identity FIGHTING CNP FRAUD 8 T O O L S A T Y O U R D I S P O S A L Behavioral analytics & behavioral biometrics Malware detection Mobile operator data Knowledge Based Authentication (KBA) Out-of-Band Authentication Transaction Signing Biometrics LOW FRICTION LOW FRICTION LOW FRICTION LOW FRICTION HIGH FRICTION HIGH FRICTION HIGH FRICTION HIGH FRICTION
  • 26. 26 HISTORICAL REPUTATION ANOMALOUS BEHAVIOR SECURITY RISK INDICATORS AUTHORIZED FOR ACCOUNT LINKS AND ASSOCIATIONS CUSTOMER AUTHENTICATION THE GOOD NEWS: YOU ALREADY HAVE THE TOOLS FRAUD PREVENTION
  • 27. 27 ACCOUNT LOGIN CHANGE ACCOUNT DETAILS CHECK BALANCE WITHDRAWAL, FUND TRANSFER THE GOOD NEWS: YOU ALREADY HAVE THE TOOLS LOAN ORIGINATION OR ACCOUNT CREATION CHECK BALANCE, DEPOSIT MAKE PAYMENTS CUSTOMER AUTHENTICATION FRAUD PREVENTION FRAUD PREVENTION
  • 28. 28 RECOMMENDATIONS FOR ISSUERS FOR MERCHANTS INVEST IN SOLUTIONS ACCELERATE BOLSTER CNP CONTROLS BEWARE OF ATM ATTACKS EDUCATE PRIORITIZE RETERMINALIZATION
  • 29. 29 THE EVOLUTION OF FRAUD, INC? 8400 miles, 1600 forged cards, 1400 transactions, $13 million ….. … in less than three hours.
  • 30. 30 THE EVOLUTION OF FRAUD, INC? 8400 miles, 1600 forged cards, 1400 transactions, $13 million ….. … in less than three hours.
  • 31. 31 G O T O W W W . I O V A T I O N . C O M / R E S O U R C E S RESOURCES “AUTHENTITHINGS” WEBINAR A review of the overall state of authentication in consumer-oriented, “Internet-of-Things” technologies. AITE REPORT ON EMV TRANSITION The full report on EMV migration and the impact of shrinking counterfeit card opportunity on other forms of fraud.
  • 32. Q&A

Editor's Notes

  1. Michael will build out, Julie comment on the available tools