SlideShare a Scribd company logo
1 of 37
Download to read offline
Asia Risk & Resilience Conference 2016
ThreatMetrix Q2 Cybercrime Report 2016
Asia Risk & Resilience Conference 2016
Are	Cybercriminals	winning	the	fight?
ThreatMetrix	saw	an	50%	
increase	in	fraud	attacks	since	
Q2	2015
In Q2 2016 More than 112
million attacks were detected
and stopped in real time;
More than 450 million bot attacks
were identified and stopped
during this last quarter, a 50%
increase over previous quarter.
Asia Risk & Resilience Conference 2016
What we know: Nearly 4 Billion User
Records Stolen Since 2013
Email	addresses	stolen
40M	customer	records	from	Ashley	Madison	
made	available	to	public
Health	Care	Data	Breached
80M	patient	records	stolen	in	Anthem	breach
Credit	bureau	data	stolen
hundreds	of	millions	of	records	in	various	countries	
stolen
e.g 27M	in	Korea	in	2014	
Google	and	Yahoo	Breach
272.3	million	stolen	accounts	details	from	are	
being	traded	in	Russia
Asia Risk & Resilience Conference 2016
Data Breaches Continue To Grow
User	Names	/	Passwords	
RIP:	There	is	now	longer	
any	security	value	in	the	
age	of	the	data	breach
With	278	million+	
consumer	records	
compromised	in	2015	
alone,	the	concept	of	
data	privacy	(and	
reliability)	is	now	an	
illusion
Asia Risk & Resilience Conference 2016
Customer Life Time Value Destruction
Asia Risk & Resilience Conference 2016
Getting Worse Not Better
Asia Risk & Resilience Conference 2016
We Need to Rethink Identity
Asia Risk & Resilience Conference 2016
What Can We Do?
First	Steps
Asia Risk & Resilience Conference 2016
Businesses are increasingly experiencing the
downstream effects of data breaches
We Now Live in a Post Data Breach World
Asia Risk & Resilience Conference 2016
Increased Friction
Asia Risk & Resilience Conference 2016
Band-Aid Solutions
Asia Risk & Resilience Conference 2016
Are your
customers/employees
/partners
Trusted User
or Cyber Threats?
Asia Risk & Resilience Conference 2016
Understand: Cyber Threat Attack vectors and the new
target
13
Trust	is	Critical
Digital	Debris
Rise	of	Machines
Mobile	First	
World
Global	Organized	
Cybercrime
Digital	Identities	are	the	
new	target	and	they	are	
compromised	at	alarming	
rates:
To	manage	your	risk	you	
need	to	understand:
• How	your	[employees,	
contractors,	customers,	
partners]	interact	with	
your	Omni-channels
• Who	they	really	are
• How	they	are	behaving	in	
real	time
Asia Risk & Resilience Conference 2016
Understand The Cyber Threat:
Predictions and Strategic Imperatives
• Botnet	attacks:	will	
continue	to	rise	and	evolve	
to	bypass	rate	control	
security
• Identity	/	credential	theft:	
will	continue	to	be	a	key	
issue	for	all	industries	
• Mobile	transactions:	will	
increase	particularly	in	the	
mobile	banking	sector
• Global	transaction	
context
• Single	Orchestration	
Platform
• Best	in	Class	Analytics
Asia Risk & Resilience Conference 2016
8am 10pm
Personal	
Persona
Business	
Persona
Enroll in
Insurance
from Laptop
Check
Email from
Mobile
Phone
Book a
Flight from
Tablet
Check
Email from
Tablet
Pay
Bills from
Laptop
Buy a
Shirt from
Laptop
Surf
Facebook
from Mobile
Phone
Account
Origination Fraud
Phishing CNP
CNP Social EngineeringPhishing Account Takeover
Understand your Vulnerability: We all have
Multiple Personas, Credentials, Devices, Locations, but One
Global Digital Identity - Your Digital DNA
https://vimeo.com/156917755
Asia Risk & Resilience Conference 2016
Apply Best Practice Cyber Threat
Management: Where to start?
1
• Global	Shared	Intelligence:
who,	how,	why,	behavior?
• Identity: real	time	data,	
discerning	technology,	
understand	vulnerabilities,	
training.	
• Social	Engineering/Phishing:
bad	guy	know	the	org	charts	
and	rely	on	careless	on-line	
behavior
• Give	to	Get	model
• Identity/virtual	persona	
amalgam
• Internal	Best	Practices
Asia Risk & Resilience Conference 2016
ThreatMetrix Unites the Facets of Digital Identities
Devices
Identity
Analytics
Associations
Behavior
Card	Issuance
Digital	Payments
Video	Streaming
Insurance
Mobile	Payments
Social	
Networks
Global	|	Shared	|	Intelligence
Asia Risk & Resilience Conference 2016
ThreatMetrix
has mapped
the Digital
Identity Graph.
Understanding
multi-variate
relationships
between a person
and associated
devices, credentials
and threat
behaviors…
Mapping Global Digital Identity Activity
Asia Risk & Resilience Conference 2016
…and more complex
relationships between
multiple personas now and
over time = > vulnerability
Asia Risk & Resilience Conference 2016
Threat: Most Legacy Customer Authentication Methods are
Insufficient and failing in the Mobile-First, Global Digital Age
ThreatMetrix Confidential2
Trusted forms of ID are mostly useless
in a post-data breach world
✓ Credit Scores
✓ AVS Checks
✓ State Issued IDs
✓ Step-up and OOB
Authentication
✓ Cross-Border Credit Cards
✓ Government Cyber Identity
Programs
Global business is
cross-border, 24/7
Asia Risk & Resilience Conference 2016
Threat: Our Behavior And Soft Targets Leave Us Vulnerable
Fraud Enablers The Players Soft Targets
• Unjustified Trust
• Lack of Global
Intelligence
• Social Network Impact
• Common Passwords
• Too Quick to Click
• Unwitting Insider
• Colluding Insider
• External Antagonists
• The Enterprise
• Customers
• Low Prep Enterprises
Asia Risk & Resilience Conference 2016
Real World Threat Scenarios: Our Behavior & Social
Engineering
Emails or phone calls your employees will probably open/take with little to no pause…
• Email: Hi Ted, here is your 2016
compensation plan
• Email: Hi Ted, its Greg. I’m doing a deal in
Australia and need you to wire 100K
today
• Phone call: Hi Ted, it’s Joe at Dell
checking on our outstanding
AR…................can you give me a
payment status? Thanks that was
very helpful...
• Calls back 15 minutes later: Hi Ted,
Joe again, I forgot to give you our
new ACH paymemt instructions.......
can you update these in your ERP?
• On payment...the ACH goes out to
the wrong vendor...
• A week or two later: Hi Ted, its AR
team at Dell, you are normally a
quick payer, is there any reason you
have not paid the outstanding
invoice due last month?
• Email: Hi Ted, its Mark from the
board…would you have a look at
this presentation from one of my
protfolio companies?
Asia Risk & Resilience Conference 2016
Impact: Today’s Cross-Border, Digital Business Reality
Complicates Fraud, Threat, and Authentication Decisions
Source:	ThreatMetrix	Q4,	2015	Cybercrime	Report
Asia Risk & Resilience Conference 2016
Impact: Attacks are Growing in Size, Frequency and
Complexity
Daily	Rejected	Transactions
Identity	Abuse	
Index
An	Identity	Abuse	Index	level	of	High	(shown	in	red)	represents	an	attack	rate	of	two	standard	deviations	
from	the	medium	term	trend.	Aggregated	over	all	global	transactions,	it	clearly	shows	that	the	exploitation	
of	data	breaches	and	stolen	identities	is	automated,	global	and	coordinated
Asia Risk & Resilience Conference 2016
Integrated
Database
Integration Hub
Impact: Identity Spoofing Continues to Rise Globally
Asia Risk & Resilience Conference 2016
Impact: Bot attacks are more constant and increasing
Asia Risk & Resilience Conference 2016
ThreatMetrix Global Intelligence Network
Asia Risk & Resilience Conference 2016
Recognition is key
Persona	(device,	identity,	behaviour)	recognition	is	key	to	ensuring	that	businesses	are	able	
to	effectively	differentiate	between	trusted	users	and	potential	threats
Asia Risk & Resilience Conference 2016
Integration: Integrating Digital Intelligence For True Digital
Identity Assessment is the Key to Prevention
Asia Risk & Resilience Conference 2016
The Reality: Global Markets Require
Frictionless, Secure Digital Experiences
Fraud Prevention Authentication Threat Detection
“I want to pinpoint
fraudsters using a
stolen or synthetic
identity the
moment they
apply.”
“I want to
Accurately
distinguish returning
users from
fraudsters.”
“Help me stop
costly Botnet
attacks from
happening as
customers are
accessing my
systems.”
Asia Risk & Resilience Conference 2016
Digital	Identity	Network
>2 billion	transactions	analyzed	per	
month	 15	billion	in	2015
Coverage	in	
240	countries
Up	to	98%
recognition	rate
Over 4,000	brands
Protecting	30,000
websites	&	apps
3	of	the	top	4	
credit	card	networks
400	million	deployed	
mobile	SDKs
+25M	per	month
Leverage Global Shared Intelligence
>	500,000 daily	transactions	analysed
for	France
Asia Risk & Resilience Conference 2016
Global Real-Time
Decisioning
Global Digital
Identity
Global Shared
Intelligence
70% reduction in false-positive rates; 90% reduction in fraud
• Build	a	global	shared	intelligence	network	to	beat	a	
global	fraud	network	
• Keep	Security	invisible	from	your	Customers	(and	
Cybercriminals)	
• Provide	the	Best-in-Class	Online	&	Mobile	Experience
• Combine:
Asia Risk & Resilience Conference 2016
Digital
Intelligence
Integration &
Orchestration
Real-Time
Analytics
Decision
Management
Machine
Learning
Behavior
Analytics
Business
Rules
Case
Management
Reporting
Search & Link
Analysis
Implement
Asia Risk & Resilience Conference 2016
Improve security together with the
customer experience?
95%	of	transactions	are	from	genuine	
users
Asia Risk & Resilience Conference 2016
Summary
1. Data Breaches and Bots driving cybercrime surge
2. User Names / Passwords are no longer any security value in the age
of the data breach
3. Mobile transactions are surging ahead of other online methods
4. We see an emergence of mobile bot attacks targeting mobile apps
5. Legacy Customer Authentication Methods are Insufficient and failing
in the Mobile-First, Global Digital Age
6. Cybercriminals are targeting our Behavior & Social Engineering
7. We need to build a global shared intelligence network to beat a global
fraud network
8. Keep Security invisible while anonymising, securing and encrypting
data
9. Provide the Best-in-Class Online & Mobile Experience
10. Integrating Digital Intelligence For True Digital Identity Assessment is
the Key to Prevention
Asia Risk & Resilience Conference 2016
Stop Fraud, not Customers
Asia Risk & Resilience Conference 2016
Questions
Ted Egan (tegan@threatmetrix.com)
Vice President Asia Pacific
ThreatMetrix Inc.
The Digital Identity Company

More Related Content

What's hot

Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take OverLaurent Pacalin
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupLaurent Pacalin
 
Enterprise Fraud Management
Enterprise Fraud ManagementEnterprise Fraud Management
Enterprise Fraud ManagementManish Desai
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud managementrkappear
 
Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018NormShield
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsOilPriceInformationService
 
Falcon debit credit_2909_ps
Falcon debit credit_2909_psFalcon debit credit_2909_ps
Falcon debit credit_2909_pskazemita
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheyPeter Tran
 

What's hot (12)

MTBiz May-June 2019
MTBiz May-June 2019 MTBiz May-June 2019
MTBiz May-June 2019
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take Over
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite Group
 
Enterprise Fraud Management
Enterprise Fraud ManagementEnterprise Fraud Management
Enterprise Fraud Management
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
 
Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
 
Falcon debit credit_2909_ps
Falcon debit credit_2909_psFalcon debit credit_2909_ps
Falcon debit credit_2909_ps
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_Richey
 
Fraud Monitoring Solution
Fraud Monitoring SolutionFraud Monitoring Solution
Fraud Monitoring Solution
 

Viewers also liked

ThreatMetrix – Building Trust on the Internet
ThreatMetrix – Building Trust on the InternetThreatMetrix – Building Trust on the Internet
ThreatMetrix – Building Trust on the InternetThreatMetrix
 
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートThreatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートKen Lam
 
ThreatMetrix のデジタル・ アイデンティティ
ThreatMetrix のデジタル・ アイデンティティThreatMetrix のデジタル・ アイデンティティ
ThreatMetrix のデジタル・ アイデンティティKen Lam
 
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートThreatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートKen Lam
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYjmical
 
Some experiences from early-stage Australian startups
Some experiences from early-stage Australian startupsSome experiences from early-stage Australian startups
Some experiences from early-stage Australian startupsDavid Jones
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low CostDonald Malloy
 
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为Ken Lam
 
Bio catch
Bio catchBio catch
Bio catchYanivt
 
The Rise and Rise of Web Fraud
The Rise and Rise of Web FraudThe Rise and Rise of Web Fraud
The Rise and Rise of Web FraudDavid Jones
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 
The Behavioral Economics Guide 2016
The Behavioral Economics Guide 2016The Behavioral Economics Guide 2016
The Behavioral Economics Guide 2016blaiq
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAmazon Web Services
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
 

Viewers also liked (16)

ThreatMetrix – Building Trust on the Internet
ThreatMetrix – Building Trust on the InternetThreatMetrix – Building Trust on the Internet
ThreatMetrix – Building Trust on the Internet
 
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートThreatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
 
ThreatMetrix のデジタル・ アイデンティティ
ThreatMetrix のデジタル・ アイデンティティThreatMetrix のデジタル・ アイデンティティ
ThreatMetrix のデジタル・ アイデンティティ
 
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートThreatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Some experiences from early-stage Australian startups
Some experiences from early-stage Australian startupsSome experiences from early-stage Australian startups
Some experiences from early-stage Australian startups
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low Cost
 
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
 
Bio catch
Bio catchBio catch
Bio catch
 
The Rise and Rise of Web Fraud
The Rise and Rise of Web FraudThe Rise and Rise of Web Fraud
The Rise and Rise of Web Fraud
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
The Behavioral Economics Guide 2016
The Behavioral Economics Guide 2016The Behavioral Economics Guide 2016
The Behavioral Economics Guide 2016
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the Cloud
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 

Similar to ThreatMetrix ARRC 2016 presentation by Ted Egan

The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer
 
Cases for Financial Market
Cases for Financial MarketCases for Financial Market
Cases for Financial MarketKarina Matos
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Our Voice Biometrics Experience with Global enterprises
Our Voice Biometrics Experience with Global enterprisesOur Voice Biometrics Experience with Global enterprises
Our Voice Biometrics Experience with Global enterprisesSuruli Kannan
 
2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&ANick Normile
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataSteven Schwartz
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfChinatu Uzuegbu
 
IT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docxIT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docxsmumbahelp
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
Leveraging Analytics to Combat Digital Fraud in Financial Organizations
Leveraging Analytics to Combat Digital Fraud in Financial OrganizationsLeveraging Analytics to Combat Digital Fraud in Financial Organizations
Leveraging Analytics to Combat Digital Fraud in Financial OrganizationsRicardo Ponce
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label IssuersChristopher Uriarte
 
CYREN_2015_CyberThreat_Yearbook
CYREN_2015_CyberThreat_YearbookCYREN_2015_CyberThreat_Yearbook
CYREN_2015_CyberThreat_YearbookChristian Reuter
 

Similar to ThreatMetrix ARRC 2016 presentation by Ted Egan (20)

The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)
 
Cases for Financial Market
Cases for Financial MarketCases for Financial Market
Cases for Financial Market
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Our Voice Biometrics Experience with Global enterprises
Our Voice Biometrics Experience with Global enterprisesOur Voice Biometrics Experience with Global enterprises
Our Voice Biometrics Experience with Global enterprises
 
2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A
 
Loqr
LoqrLoqr
Loqr
 
CyberDen 2020
CyberDen 2020CyberDen 2020
CyberDen 2020
 
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKINGARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
IT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docxIT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docx
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
Leveraging Analytics to Combat Digital Fraud in Financial Organizations
Leveraging Analytics to Combat Digital Fraud in Financial OrganizationsLeveraging Analytics to Combat Digital Fraud in Financial Organizations
Leveraging Analytics to Combat Digital Fraud in Financial Organizations
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Building Cyber Resilience
Building Cyber ResilienceBuilding Cyber Resilience
Building Cyber Resilience
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
 
CYREN_2015_CyberThreat_Yearbook
CYREN_2015_CyberThreat_YearbookCYREN_2015_CyberThreat_Yearbook
CYREN_2015_CyberThreat_Yearbook
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 

ThreatMetrix ARRC 2016 presentation by Ted Egan

  • 1. Asia Risk & Resilience Conference 2016 ThreatMetrix Q2 Cybercrime Report 2016
  • 2. Asia Risk & Resilience Conference 2016 Are Cybercriminals winning the fight? ThreatMetrix saw an 50% increase in fraud attacks since Q2 2015 In Q2 2016 More than 112 million attacks were detected and stopped in real time; More than 450 million bot attacks were identified and stopped during this last quarter, a 50% increase over previous quarter.
  • 3. Asia Risk & Resilience Conference 2016 What we know: Nearly 4 Billion User Records Stolen Since 2013 Email addresses stolen 40M customer records from Ashley Madison made available to public Health Care Data Breached 80M patient records stolen in Anthem breach Credit bureau data stolen hundreds of millions of records in various countries stolen e.g 27M in Korea in 2014 Google and Yahoo Breach 272.3 million stolen accounts details from are being traded in Russia
  • 4. Asia Risk & Resilience Conference 2016 Data Breaches Continue To Grow User Names / Passwords RIP: There is now longer any security value in the age of the data breach With 278 million+ consumer records compromised in 2015 alone, the concept of data privacy (and reliability) is now an illusion
  • 5. Asia Risk & Resilience Conference 2016 Customer Life Time Value Destruction
  • 6. Asia Risk & Resilience Conference 2016 Getting Worse Not Better
  • 7. Asia Risk & Resilience Conference 2016 We Need to Rethink Identity
  • 8. Asia Risk & Resilience Conference 2016 What Can We Do? First Steps
  • 9. Asia Risk & Resilience Conference 2016 Businesses are increasingly experiencing the downstream effects of data breaches We Now Live in a Post Data Breach World
  • 10. Asia Risk & Resilience Conference 2016 Increased Friction
  • 11. Asia Risk & Resilience Conference 2016 Band-Aid Solutions
  • 12. Asia Risk & Resilience Conference 2016 Are your customers/employees /partners Trusted User or Cyber Threats?
  • 13. Asia Risk & Resilience Conference 2016 Understand: Cyber Threat Attack vectors and the new target 13 Trust is Critical Digital Debris Rise of Machines Mobile First World Global Organized Cybercrime Digital Identities are the new target and they are compromised at alarming rates: To manage your risk you need to understand: • How your [employees, contractors, customers, partners] interact with your Omni-channels • Who they really are • How they are behaving in real time
  • 14. Asia Risk & Resilience Conference 2016 Understand The Cyber Threat: Predictions and Strategic Imperatives • Botnet attacks: will continue to rise and evolve to bypass rate control security • Identity / credential theft: will continue to be a key issue for all industries • Mobile transactions: will increase particularly in the mobile banking sector • Global transaction context • Single Orchestration Platform • Best in Class Analytics
  • 15. Asia Risk & Resilience Conference 2016 8am 10pm Personal Persona Business Persona Enroll in Insurance from Laptop Check Email from Mobile Phone Book a Flight from Tablet Check Email from Tablet Pay Bills from Laptop Buy a Shirt from Laptop Surf Facebook from Mobile Phone Account Origination Fraud Phishing CNP CNP Social EngineeringPhishing Account Takeover Understand your Vulnerability: We all have Multiple Personas, Credentials, Devices, Locations, but One Global Digital Identity - Your Digital DNA https://vimeo.com/156917755
  • 16. Asia Risk & Resilience Conference 2016 Apply Best Practice Cyber Threat Management: Where to start? 1 • Global Shared Intelligence: who, how, why, behavior? • Identity: real time data, discerning technology, understand vulnerabilities, training. • Social Engineering/Phishing: bad guy know the org charts and rely on careless on-line behavior • Give to Get model • Identity/virtual persona amalgam • Internal Best Practices
  • 17. Asia Risk & Resilience Conference 2016 ThreatMetrix Unites the Facets of Digital Identities Devices Identity Analytics Associations Behavior Card Issuance Digital Payments Video Streaming Insurance Mobile Payments Social Networks Global | Shared | Intelligence
  • 18. Asia Risk & Resilience Conference 2016 ThreatMetrix has mapped the Digital Identity Graph. Understanding multi-variate relationships between a person and associated devices, credentials and threat behaviors… Mapping Global Digital Identity Activity
  • 19. Asia Risk & Resilience Conference 2016 …and more complex relationships between multiple personas now and over time = > vulnerability
  • 20. Asia Risk & Resilience Conference 2016 Threat: Most Legacy Customer Authentication Methods are Insufficient and failing in the Mobile-First, Global Digital Age ThreatMetrix Confidential2 Trusted forms of ID are mostly useless in a post-data breach world ✓ Credit Scores ✓ AVS Checks ✓ State Issued IDs ✓ Step-up and OOB Authentication ✓ Cross-Border Credit Cards ✓ Government Cyber Identity Programs Global business is cross-border, 24/7
  • 21. Asia Risk & Resilience Conference 2016 Threat: Our Behavior And Soft Targets Leave Us Vulnerable Fraud Enablers The Players Soft Targets • Unjustified Trust • Lack of Global Intelligence • Social Network Impact • Common Passwords • Too Quick to Click • Unwitting Insider • Colluding Insider • External Antagonists • The Enterprise • Customers • Low Prep Enterprises
  • 22. Asia Risk & Resilience Conference 2016 Real World Threat Scenarios: Our Behavior & Social Engineering Emails or phone calls your employees will probably open/take with little to no pause… • Email: Hi Ted, here is your 2016 compensation plan • Email: Hi Ted, its Greg. I’m doing a deal in Australia and need you to wire 100K today • Phone call: Hi Ted, it’s Joe at Dell checking on our outstanding AR…................can you give me a payment status? Thanks that was very helpful... • Calls back 15 minutes later: Hi Ted, Joe again, I forgot to give you our new ACH paymemt instructions....... can you update these in your ERP? • On payment...the ACH goes out to the wrong vendor... • A week or two later: Hi Ted, its AR team at Dell, you are normally a quick payer, is there any reason you have not paid the outstanding invoice due last month? • Email: Hi Ted, its Mark from the board…would you have a look at this presentation from one of my protfolio companies?
  • 23. Asia Risk & Resilience Conference 2016 Impact: Today’s Cross-Border, Digital Business Reality Complicates Fraud, Threat, and Authentication Decisions Source: ThreatMetrix Q4, 2015 Cybercrime Report
  • 24. Asia Risk & Resilience Conference 2016 Impact: Attacks are Growing in Size, Frequency and Complexity Daily Rejected Transactions Identity Abuse Index An Identity Abuse Index level of High (shown in red) represents an attack rate of two standard deviations from the medium term trend. Aggregated over all global transactions, it clearly shows that the exploitation of data breaches and stolen identities is automated, global and coordinated
  • 25. Asia Risk & Resilience Conference 2016 Integrated Database Integration Hub Impact: Identity Spoofing Continues to Rise Globally
  • 26. Asia Risk & Resilience Conference 2016 Impact: Bot attacks are more constant and increasing
  • 27. Asia Risk & Resilience Conference 2016 ThreatMetrix Global Intelligence Network
  • 28. Asia Risk & Resilience Conference 2016 Recognition is key Persona (device, identity, behaviour) recognition is key to ensuring that businesses are able to effectively differentiate between trusted users and potential threats
  • 29. Asia Risk & Resilience Conference 2016 Integration: Integrating Digital Intelligence For True Digital Identity Assessment is the Key to Prevention
  • 30. Asia Risk & Resilience Conference 2016 The Reality: Global Markets Require Frictionless, Secure Digital Experiences Fraud Prevention Authentication Threat Detection “I want to pinpoint fraudsters using a stolen or synthetic identity the moment they apply.” “I want to Accurately distinguish returning users from fraudsters.” “Help me stop costly Botnet attacks from happening as customers are accessing my systems.”
  • 31. Asia Risk & Resilience Conference 2016 Digital Identity Network >2 billion transactions analyzed per month 15 billion in 2015 Coverage in 240 countries Up to 98% recognition rate Over 4,000 brands Protecting 30,000 websites & apps 3 of the top 4 credit card networks 400 million deployed mobile SDKs +25M per month Leverage Global Shared Intelligence > 500,000 daily transactions analysed for France
  • 32. Asia Risk & Resilience Conference 2016 Global Real-Time Decisioning Global Digital Identity Global Shared Intelligence 70% reduction in false-positive rates; 90% reduction in fraud • Build a global shared intelligence network to beat a global fraud network • Keep Security invisible from your Customers (and Cybercriminals) • Provide the Best-in-Class Online & Mobile Experience • Combine:
  • 33. Asia Risk & Resilience Conference 2016 Digital Intelligence Integration & Orchestration Real-Time Analytics Decision Management Machine Learning Behavior Analytics Business Rules Case Management Reporting Search & Link Analysis Implement
  • 34. Asia Risk & Resilience Conference 2016 Improve security together with the customer experience? 95% of transactions are from genuine users
  • 35. Asia Risk & Resilience Conference 2016 Summary 1. Data Breaches and Bots driving cybercrime surge 2. User Names / Passwords are no longer any security value in the age of the data breach 3. Mobile transactions are surging ahead of other online methods 4. We see an emergence of mobile bot attacks targeting mobile apps 5. Legacy Customer Authentication Methods are Insufficient and failing in the Mobile-First, Global Digital Age 6. Cybercriminals are targeting our Behavior & Social Engineering 7. We need to build a global shared intelligence network to beat a global fraud network 8. Keep Security invisible while anonymising, securing and encrypting data 9. Provide the Best-in-Class Online & Mobile Experience 10. Integrating Digital Intelligence For True Digital Identity Assessment is the Key to Prevention
  • 36. Asia Risk & Resilience Conference 2016 Stop Fraud, not Customers
  • 37. Asia Risk & Resilience Conference 2016 Questions Ted Egan (tegan@threatmetrix.com) Vice President Asia Pacific ThreatMetrix Inc. The Digital Identity Company