SlideShare a Scribd company logo
WEBCAST
U n d e r s t a n d i n g F r a u d
( S a m p l e s c e n a r i o s )
SCENARIO I – CREDIT & DEBIT CARD TRANSACTIONS
Challenge:
 Credit card and debit card fraud resulted in
losses amounting to $11.27 billion (annual)
 Card issuers and merchants incurred 63% and
37% of those losses, respectively
Root cause:
 ATM cards can be skimmed
 PINs can be stolen
Source: Nilson Report, 2013
SCENARIO II – ONLINE TRANSACTIONS
Challenge:
 An average of over 37,000 phishing attacks
happens per month with the worldwide
attacks costing more than $1.5 billion
 Evolution of attack tactics facilitate sustained
increase every year
Root cause:
 Weak online passwords
 Vulnerable PC, laptops & smart phones
Source: Fraud Report by RSA (EMC), 2013
SCENARIO III – TELEPHONE BANKING
Challenge:
 Victims of a telephone banking scam have
been conned out of £650,000 within six
weeks
 Royal Bank of Scotland managed to recover
£120,000 and the rest had to be
reimbursed
Root cause:
 Fraudsters pose as bankers and
extract sensitive information
 TPIN & personal details, which can be
shared, suffice to make transactions
Source: BBC News, August 2014
SUMMARY - THE SECURITY CHALLENGE
• 75% of big companies globally have been affected by fraud in
the last 12 months
• 50% of organizations classify themselves as “highly vulnerable
to information and identity theft”
•The global cost of fraud and identify theft is now estimated to
be over $200 billion per year
How can your organization prepare to deal with these threats?
R o o t c a u s e o f F r a u d
ROOT CAUSE OF FRAUD
CARD FRAUD
IDENTITY FRAUD
INTERNET FRAUD
SPYWARE FRAUD
TELEPHONY FRAUD
VIRUSES
INVESTMENT FRAUD
CHEQUE FRAUD
KYC FRAUD
 Every 2 seconds, there’s a new identity fraud victim
 32% of identity theft victims discovered a family member or relative was responsible
for stealing their identity
 18% are victimized by a friend, neighbor or in-home employee
HOW BANKS ARE SOLVING THIS PROBLEM?
LIMITATIONS:
- Small pins are easily
stole, while large pins
are difficult to
remember
- PINs are often
shared with friends
and family
PIN LIMITATIONS:
- Callers have to waste
precious time waiting
to speak to an agent
and undergoing
interrogation
- Many answers can be
guessed by random
individuals
Personal
Questions
Organizations spending billions on solutions
• For example, contact centers spend $12.4 billion every year in caller verification
• Maximizing support services to avoid fraud
• Repaying huge amounts money to customers whose accounts were hacked
SOLUTION 1: SOLUTION 2:
SO, WHAT CAN WE DO ABOUT THIS?
How do Banks SIMULTANEOUSLY
1. enable robust security and protect against fraud
AND
2. create an a positive verification experience for the caller
H o w c a n B a n k s a v o i d I d e n t i t y
T h e f t ?
To understand how leading banks overcome these
challenges and defend against fraud, watch the full
webcast online here:
http://speechmobility.uniphore.com/banking-fraud-
prevention-Webinar
WEBCAST ONLINE
> Pioneer in Indian Language Speech Recognition and Voice Biometrics
solutions on a Cloud (with 2 Patent-pending innovations)
> India’s leading and only provider of commercially used Voice Biometrics
platform used for Banking and Payment Transactions.
> 7 years old with over 50 paying customers; 4.5 millions end users through our
enterprise customers
> Uniphore’s accolades so far include:
-Deloitte Technology Fast 50 (India) – 2014
-Featured in NASSCOM and F&S “Product Excellent Matrix” - 2014
-Gartner’s Cool Vendor Award – 2013
-Deloitte India’s Technology Fast 50) - 2012
-Frost & Sullivan’s Entrepreneurial Company of the Year - 2012
UNIPHORE
Q & A
For more information, contact us at info@uniphore.com

More Related Content

Viewers also liked

Историја физике
Историја физикеИсторија физике
Историја физике
Марко Ђорђевић
 
Como elaborar un texto
Como elaborar un textoComo elaborar un texto
Como elaborar un texto
laconcogrelos
 
Intervista Executive_Gregorio_Fogliani_Pierluigi_Simonetta
Intervista Executive_Gregorio_Fogliani_Pierluigi_SimonettaIntervista Executive_Gregorio_Fogliani_Pierluigi_Simonetta
Intervista Executive_Gregorio_Fogliani_Pierluigi_SimonettaPierluigi Simonetta
 
Craciunul
CraciunulCraciunul
Craciunul
danastoicescu
 
Laporan program bantuan langsung tunai
Laporan program bantuan langsung tunaiLaporan program bantuan langsung tunai
Laporan program bantuan langsung tunai
wardhanadany
 
Rationale behind
Rationale behindRationale behind
Rationale behind
Little ッ
 
Question 1
Question 1Question 1
Question 1
Anya Wagstaff
 
Dave Rennalls Course Project Final
Dave Rennalls Course Project FinalDave Rennalls Course Project Final
Dave Rennalls Course Project Final
Dave Rennalls
 
How Long Does It Take to File Chapter 7?
How Long Does It Take to File Chapter 7?How Long Does It Take to File Chapter 7?
How Long Does It Take to File Chapter 7?
Joe Pioletti
 
HANS Spring 2015, Confessions of a Baby Boomer
HANS Spring 2015, Confessions of a Baby BoomerHANS Spring 2015, Confessions of a Baby Boomer
HANS Spring 2015, Confessions of a Baby Boomer
Ron Gale
 
Question 4 technology
Question 4  technologyQuestion 4  technology
Question 4 technology
Anya Wagstaff
 
喜多福香蒜油
喜多福香蒜油喜多福香蒜油
喜多福香蒜油
彥欣 李
 
Education in-pakistan
Education in-pakistanEducation in-pakistan
Education in-pakistan
Azhar Siddiqui
 
Real-Time Speech Analytics
Real-Time Speech AnalyticsReal-Time Speech Analytics
Real-Time Speech Analytics
Uniphore
 
intMutual funds
intMutual fundsintMutual funds
intMutual funds
Dheeraj Reddy
 
Global Health and Human Hair
Global Health and Human HairGlobal Health and Human Hair
Global Health and Human Hair
edwarddamon
 

Viewers also liked (17)

Историја физике
Историја физикеИсторија физике
Историја физике
 
Como elaborar un texto
Como elaborar un textoComo elaborar un texto
Como elaborar un texto
 
Intervista Executive_Gregorio_Fogliani_Pierluigi_Simonetta
Intervista Executive_Gregorio_Fogliani_Pierluigi_SimonettaIntervista Executive_Gregorio_Fogliani_Pierluigi_Simonetta
Intervista Executive_Gregorio_Fogliani_Pierluigi_Simonetta
 
Craciunul
CraciunulCraciunul
Craciunul
 
Laporan program bantuan langsung tunai
Laporan program bantuan langsung tunaiLaporan program bantuan langsung tunai
Laporan program bantuan langsung tunai
 
Rationale behind
Rationale behindRationale behind
Rationale behind
 
Question 1
Question 1Question 1
Question 1
 
Dave Rennalls Course Project Final
Dave Rennalls Course Project FinalDave Rennalls Course Project Final
Dave Rennalls Course Project Final
 
How Long Does It Take to File Chapter 7?
How Long Does It Take to File Chapter 7?How Long Does It Take to File Chapter 7?
How Long Does It Take to File Chapter 7?
 
HANS Spring 2015, Confessions of a Baby Boomer
HANS Spring 2015, Confessions of a Baby BoomerHANS Spring 2015, Confessions of a Baby Boomer
HANS Spring 2015, Confessions of a Baby Boomer
 
Question 4 technology
Question 4  technologyQuestion 4  technology
Question 4 technology
 
喜多福香蒜油
喜多福香蒜油喜多福香蒜油
喜多福香蒜油
 
Education in-pakistan
Education in-pakistanEducation in-pakistan
Education in-pakistan
 
Real-Time Speech Analytics
Real-Time Speech AnalyticsReal-Time Speech Analytics
Real-Time Speech Analytics
 
intMutual funds
intMutual fundsintMutual funds
intMutual funds
 
Global Health and Human Hair
Global Health and Human HairGlobal Health and Human Hair
Global Health and Human Hair
 
efikasno disciplinovanje
efikasno disciplinovanjeefikasno disciplinovanje
efikasno disciplinovanje
 

Similar to Webcast - how can banks defend against fraud?

Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industry
itio Innovex Pvt Ltv
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
First Atlantic Commerce
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
IJSRED
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
rkappear
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
sathyananda prabhu
 
Neo Banks: Scam, Fraud, and Prevention Ways: Money 2.0 Conference Reviews Thi...
Neo Banks: Scam, Fraud, and Prevention Ways: Money 2.0 Conference Reviews Thi...Neo Banks: Scam, Fraud, and Prevention Ways: Money 2.0 Conference Reviews Thi...
Neo Banks: Scam, Fraud, and Prevention Ways: Money 2.0 Conference Reviews Thi...
Money 2Conf
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
IRJET Journal
 
Kreditech - NOAH16 Berlin
Kreditech - NOAH16 BerlinKreditech - NOAH16 Berlin
Kreditech - NOAH16 Berlin
NOAH Advisors
 
Hts Executive Summary
Hts Executive SummaryHts Executive Summary
Hts Executive Summary
josesmeke
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
Elizabeth Dimit
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_Brochure
RYAN ORTON
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar Cyberattacks
Panda Security
 
EMV and the consumer Final
EMV and the consumer FinalEMV and the consumer Final
EMV and the consumer Final
Daniel (Dan) DeBlasio
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
IRJET Journal
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
h9gfhypx97
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Knowledge Group
 
The Digital Financial Services landscape
The Digital Financial Services landscapeThe Digital Financial Services landscape
The Digital Financial Services landscape
Peter Zetterli
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET Journal
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdf
AmanSharma977554
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdf
AmanSharma977554
 

Similar to Webcast - how can banks defend against fraud? (20)

Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industry
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
 
Neo Banks: Scam, Fraud, and Prevention Ways: Money 2.0 Conference Reviews Thi...
Neo Banks: Scam, Fraud, and Prevention Ways: Money 2.0 Conference Reviews Thi...Neo Banks: Scam, Fraud, and Prevention Ways: Money 2.0 Conference Reviews Thi...
Neo Banks: Scam, Fraud, and Prevention Ways: Money 2.0 Conference Reviews Thi...
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
Kreditech - NOAH16 Berlin
Kreditech - NOAH16 BerlinKreditech - NOAH16 Berlin
Kreditech - NOAH16 Berlin
 
Hts Executive Summary
Hts Executive SummaryHts Executive Summary
Hts Executive Summary
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_Brochure
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar Cyberattacks
 
EMV and the consumer Final
EMV and the consumer FinalEMV and the consumer Final
EMV and the consumer Final
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
The Digital Financial Services landscape
The Digital Financial Services landscapeThe Digital Financial Services landscape
The Digital Financial Services landscape
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid Models
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdf
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdf
 

More from Uniphore

Path Towards Conversational Service Automation
Path Towards Conversational Service AutomationPath Towards Conversational Service Automation
Path Towards Conversational Service Automation
Uniphore
 
Harness the Power of Speech Analytics for Benefits across Functions
Harness the Power of Speech Analytics for Benefits across FunctionsHarness the Power of Speech Analytics for Benefits across Functions
Harness the Power of Speech Analytics for Benefits across Functions
Uniphore
 
Speech Analytics Solutions for the Insurance Industry
Speech Analytics Solutions for the Insurance IndustrySpeech Analytics Solutions for the Insurance Industry
Speech Analytics Solutions for the Insurance Industry
Uniphore
 
Speech Analytics for Banking and Financial Services
Speech Analytics for Banking and Financial ServicesSpeech Analytics for Banking and Financial Services
Speech Analytics for Banking and Financial Services
Uniphore
 
Virtual Assistants - The technology that is disrupting customer service in t...
 Virtual Assistants - The technology that is disrupting customer service in t... Virtual Assistants - The technology that is disrupting customer service in t...
Virtual Assistants - The technology that is disrupting customer service in t...
Uniphore
 
How to Deploy Speech Analytics for Enhanced Customer Experience
How to Deploy Speech Analytics for Enhanced Customer ExperienceHow to Deploy Speech Analytics for Enhanced Customer Experience
How to Deploy Speech Analytics for Enhanced Customer Experience
Uniphore
 
How Speech Analytics Helps Serve Customers Better
How Speech Analytics Helps Serve Customers BetterHow Speech Analytics Helps Serve Customers Better
How Speech Analytics Helps Serve Customers Better
Uniphore
 
The Evolution and Future of Contact Centre Technology
The Evolution and Future of Contact Centre TechnologyThe Evolution and Future of Contact Centre Technology
The Evolution and Future of Contact Centre Technology
Uniphore
 
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Uniphore
 
Increase Revenue by Boosting Collection Efforts: Speech Analytics To The Rescue
Increase Revenue by Boosting Collection Efforts: Speech Analytics To The RescueIncrease Revenue by Boosting Collection Efforts: Speech Analytics To The Rescue
Increase Revenue by Boosting Collection Efforts: Speech Analytics To The Rescue
Uniphore
 
The Use of Artificial Intelligence and Machine Learning in Speech Recognition
The Use of Artificial Intelligence and Machine Learning in Speech RecognitionThe Use of Artificial Intelligence and Machine Learning in Speech Recognition
The Use of Artificial Intelligence and Machine Learning in Speech Recognition
Uniphore
 
How Speech Mining During Customer Interactions Can Unearth Gold
How Speech Mining During Customer Interactions Can Unearth GoldHow Speech Mining During Customer Interactions Can Unearth Gold
How Speech Mining During Customer Interactions Can Unearth Gold
Uniphore
 
Customer Support Techniques: The Classic Versus The Cutting Edge
Customer Support Techniques: The Classic Versus The Cutting EdgeCustomer Support Techniques: The Classic Versus The Cutting Edge
Customer Support Techniques: The Classic Versus The Cutting Edge
Uniphore
 
Voice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationVoice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authentication
Uniphore
 

More from Uniphore (14)

Path Towards Conversational Service Automation
Path Towards Conversational Service AutomationPath Towards Conversational Service Automation
Path Towards Conversational Service Automation
 
Harness the Power of Speech Analytics for Benefits across Functions
Harness the Power of Speech Analytics for Benefits across FunctionsHarness the Power of Speech Analytics for Benefits across Functions
Harness the Power of Speech Analytics for Benefits across Functions
 
Speech Analytics Solutions for the Insurance Industry
Speech Analytics Solutions for the Insurance IndustrySpeech Analytics Solutions for the Insurance Industry
Speech Analytics Solutions for the Insurance Industry
 
Speech Analytics for Banking and Financial Services
Speech Analytics for Banking and Financial ServicesSpeech Analytics for Banking and Financial Services
Speech Analytics for Banking and Financial Services
 
Virtual Assistants - The technology that is disrupting customer service in t...
 Virtual Assistants - The technology that is disrupting customer service in t... Virtual Assistants - The technology that is disrupting customer service in t...
Virtual Assistants - The technology that is disrupting customer service in t...
 
How to Deploy Speech Analytics for Enhanced Customer Experience
How to Deploy Speech Analytics for Enhanced Customer ExperienceHow to Deploy Speech Analytics for Enhanced Customer Experience
How to Deploy Speech Analytics for Enhanced Customer Experience
 
How Speech Analytics Helps Serve Customers Better
How Speech Analytics Helps Serve Customers BetterHow Speech Analytics Helps Serve Customers Better
How Speech Analytics Helps Serve Customers Better
 
The Evolution and Future of Contact Centre Technology
The Evolution and Future of Contact Centre TechnologyThe Evolution and Future of Contact Centre Technology
The Evolution and Future of Contact Centre Technology
 
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
 
Increase Revenue by Boosting Collection Efforts: Speech Analytics To The Rescue
Increase Revenue by Boosting Collection Efforts: Speech Analytics To The RescueIncrease Revenue by Boosting Collection Efforts: Speech Analytics To The Rescue
Increase Revenue by Boosting Collection Efforts: Speech Analytics To The Rescue
 
The Use of Artificial Intelligence and Machine Learning in Speech Recognition
The Use of Artificial Intelligence and Machine Learning in Speech RecognitionThe Use of Artificial Intelligence and Machine Learning in Speech Recognition
The Use of Artificial Intelligence and Machine Learning in Speech Recognition
 
How Speech Mining During Customer Interactions Can Unearth Gold
How Speech Mining During Customer Interactions Can Unearth GoldHow Speech Mining During Customer Interactions Can Unearth Gold
How Speech Mining During Customer Interactions Can Unearth Gold
 
Customer Support Techniques: The Classic Versus The Cutting Edge
Customer Support Techniques: The Classic Versus The Cutting EdgeCustomer Support Techniques: The Classic Versus The Cutting Edge
Customer Support Techniques: The Classic Versus The Cutting Edge
 
Voice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationVoice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authentication
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

Webcast - how can banks defend against fraud?

  • 2. U n d e r s t a n d i n g F r a u d ( S a m p l e s c e n a r i o s )
  • 3. SCENARIO I – CREDIT & DEBIT CARD TRANSACTIONS Challenge:  Credit card and debit card fraud resulted in losses amounting to $11.27 billion (annual)  Card issuers and merchants incurred 63% and 37% of those losses, respectively Root cause:  ATM cards can be skimmed  PINs can be stolen Source: Nilson Report, 2013
  • 4. SCENARIO II – ONLINE TRANSACTIONS Challenge:  An average of over 37,000 phishing attacks happens per month with the worldwide attacks costing more than $1.5 billion  Evolution of attack tactics facilitate sustained increase every year Root cause:  Weak online passwords  Vulnerable PC, laptops & smart phones Source: Fraud Report by RSA (EMC), 2013
  • 5. SCENARIO III – TELEPHONE BANKING Challenge:  Victims of a telephone banking scam have been conned out of £650,000 within six weeks  Royal Bank of Scotland managed to recover £120,000 and the rest had to be reimbursed Root cause:  Fraudsters pose as bankers and extract sensitive information  TPIN & personal details, which can be shared, suffice to make transactions Source: BBC News, August 2014
  • 6. SUMMARY - THE SECURITY CHALLENGE • 75% of big companies globally have been affected by fraud in the last 12 months • 50% of organizations classify themselves as “highly vulnerable to information and identity theft” •The global cost of fraud and identify theft is now estimated to be over $200 billion per year How can your organization prepare to deal with these threats?
  • 7. R o o t c a u s e o f F r a u d
  • 8. ROOT CAUSE OF FRAUD CARD FRAUD IDENTITY FRAUD INTERNET FRAUD SPYWARE FRAUD TELEPHONY FRAUD VIRUSES INVESTMENT FRAUD CHEQUE FRAUD KYC FRAUD  Every 2 seconds, there’s a new identity fraud victim  32% of identity theft victims discovered a family member or relative was responsible for stealing their identity  18% are victimized by a friend, neighbor or in-home employee
  • 9. HOW BANKS ARE SOLVING THIS PROBLEM? LIMITATIONS: - Small pins are easily stole, while large pins are difficult to remember - PINs are often shared with friends and family PIN LIMITATIONS: - Callers have to waste precious time waiting to speak to an agent and undergoing interrogation - Many answers can be guessed by random individuals Personal Questions Organizations spending billions on solutions • For example, contact centers spend $12.4 billion every year in caller verification • Maximizing support services to avoid fraud • Repaying huge amounts money to customers whose accounts were hacked SOLUTION 1: SOLUTION 2:
  • 10. SO, WHAT CAN WE DO ABOUT THIS? How do Banks SIMULTANEOUSLY 1. enable robust security and protect against fraud AND 2. create an a positive verification experience for the caller
  • 11. H o w c a n B a n k s a v o i d I d e n t i t y T h e f t ?
  • 12. To understand how leading banks overcome these challenges and defend against fraud, watch the full webcast online here: http://speechmobility.uniphore.com/banking-fraud- prevention-Webinar WEBCAST ONLINE
  • 13. > Pioneer in Indian Language Speech Recognition and Voice Biometrics solutions on a Cloud (with 2 Patent-pending innovations) > India’s leading and only provider of commercially used Voice Biometrics platform used for Banking and Payment Transactions. > 7 years old with over 50 paying customers; 4.5 millions end users through our enterprise customers > Uniphore’s accolades so far include: -Deloitte Technology Fast 50 (India) – 2014 -Featured in NASSCOM and F&S “Product Excellent Matrix” - 2014 -Gartner’s Cool Vendor Award – 2013 -Deloitte India’s Technology Fast 50) - 2012 -Frost & Sullivan’s Entrepreneurial Company of the Year - 2012 UNIPHORE
  • 14. Q & A For more information, contact us at info@uniphore.com