SlideShare a Scribd company logo
1 of 42
1© iovation. All RightsReserved
Angie White, Product Marketing Manager
Roll Out the VIP Path to Play
How do you protect your business and
consumers even when bad actors
haveperfect data?
© iovation. All RightsReserved 3
Gambling
Last 12 months
Transactionscoming
frommobile
72%
Volumeof gambling
transactions
589 million
Numberof risky
transactionsstopped
48 million
Reputationreports
submittedby analysts
1.2 million
100-plus
ActiveGamblingOperators
andPlatformProvidersUseiovation
© iovation. All Rights Reserved 3
© iovation. All RightsReserved 4
TransUnion and iovation
The largest combined personal and digital identity platform
1 billion
worldwide consumer records
650 million
consumer credit history records
50+
petabytes of data
30+
countries
4.8 billion
monthly data updates
5.9 billion
devices seen by network
42 billion
total transactions protected
26 million
transactions protected per day
66 million
fraud reports placed by network
35,000
websites and apps protected
© iovation. All RightsReserved 5
• Verify identity against a broad set of personal and digital data
• Utilize when an account is originated or provisioned
• Form a basis for greater identity confidence
• Validate the claimed identity is who they say they are
• Utilize authentication at specific touchpoints
• Employ methods that match the risk level
• Assess fraud risk of online transactions or identities
• Identify potentially fraudulent actions or behaviors
• Investigate suspiciousbehavior and inconsistencies
Prevent Fraud
AuthenticateConsumers
EstablishIdentity
6© iovation. All RightsReserved
Preventing
Fraud and Abuse
Complying
with Regulations
Defending
the Business
Providing An Engaging and Rewarding Experience
© iovation. All RightsReserved 7
Recognize a Consumer’s Online Devices
Associate devices to an anonymous consumer
© iovation. All RightsReserved 8
Connect Personal and Digital Identity
Gain greater identity confidence and clarity
© iovation. All RightsReserved 9
Offer Seamless and Safe Transactions
Secure every step of your customer’s journey
Account
Login
Account
Management
Cash Out
Play
Deposit
Account
Registration
© iovation. All Rights Reserved 10
Personal
Identity Solutions
Digital
Identity Solutions
Gambling Player’s Journey
Stop Bonus Abuse
Prevent Fraudulent Accounts
Manage Player Self-exclusion
Stop Repeat Offenders
Ensure Geographic Compliance
Verified Pre-fill to Expedite
Onboarding
Identity Verification (OTP, KBA)
Age Verification
Address Validation
Email and Phone Verification
Account Registration
1
© iovation. All RightsReserved 11
Preventing Fraud and Abuse
© iovation. All RightsReserved 12
Preventing Fraud and Abuse
Cheating
and Abuse
Payment
Fraud
Account
Takeover
Bonus
Abuse
Insider
Threat
© iovation. All RightsReserved 13
Preventing Fraud and Abuse
Cheating
and Abuse
Payment
Fraud
Account
Takeover
Bonus
Abuse
Insider
Threat
14
Attract New Players, Not Fraud
R i s i n g b o n u s a b u s e
250K
6%
2015 2016 2017 2018
200K
150K
100K
50K
0K
287% Increase
in the Past 3 Years
© iovation. All RightsReserved 15
Bonus Abuse Protection
APPLY
High Velocities
Device Associations
Identify Good Players
Device Reputation
ACCOUNT
BONUS
First Deposit Bonus up to
100%
$100
16
Streamlineplayeronboarding
Rewardgood players
Build brandloyalty
Growrevenue
Growmarket share
© iovation. All RightsReserved 17
Preventing Fraud and Abuse
Cheating
and Abuse
Payment
Fraud
Account
Takeover
Bonus
Abuse
Insider
Threat
© iovation. All RightsReserved 18
Fraud Insights From the iovation Database
CreditCardFraud- 5 Year Trend
600K
500K
400K
300K
200K
100K
2014 2015 2016 2017 2018
*Source: iovation stats on reported fraud
155% Increase
in the Past 5 Years
© iovation. All RightsReserved 19
Payment Fraud Protection
Check device for risk
factors such as geolocation
mismatches, high velocities
and detection evasion
Push authorization for
step-up or for
authorization of high
value or risky transactions
Check if the device been
associated with past
fraud either directly or
with another business?
Improve customer
experience by
eliminating challenges
© iovation. All RightsReserved 20
Preventing Fraud and Abuse
Cheating
and Abuse
Payment
Fraud
Account
Takeover
Bonus
Abuse
Insider
Threat
© iovation. All RightsReserved 21
Account Takeover Common Attack Methods
Consumer victims of ATO pay average of
$290 and spend 16 hours to resolve
Credential
stuffing
Social
engineering
Phishing
attacks
Source: Javelin 2018 Identity Fraud Study
© iovation. All RightsReserved 22
Gambling Player’s Journey
Account
Registration Login
Play
Deposit
Cash Out
Account
Management
RISK
RISK
Contact
Center
RISK
© iovation. All RightsReserved 23
Account Takeover Protection
Improve login experience for good players, stop fraudsters
Pair known devices with
accounts for transparent
effortless access
Strong MFA for step up
and authorization of
account changes
Check risk on new,
unpaired devices or
assess the risk of a new
email or phone number
Contact agent pushes an
authentication request
before proceeding with call
Account
Management
Login Login
Contact
Center
© iovation. All RightsReserved 24
Complying with Regulations
© iovation. All RightsReserved 25
Complying with Regulations
Affordability
Checks
Geo
Compliance
Age
Verification
Identity
Verification
Responsible
Gambling
AML
© iovation. All RightsReserved 26
Geo Compliance
Protect against detectionevasion
IP or ISP
Mismatch
Anonymizing
Proxies
Geolocation
Mismatch
Is there a mismatch between
the real and stated IP?
With the ISP?
Is there a mismatch between
the time zone and
geolocation of the device?
Is the device evading
detection? Perhaps using
a VM, proxy or Tor?
119% higher in
the U.S.
© iovation. All RightsReserved 27
TX
VT
ME
NH
IDWA
WI
AK
MT MAND MN IL MI NY
WY
NV
SD
RI
IA IN OH PA NJ CTOR
CO
UT
NE MO KY WV VA MD DECA
AZ NM KS AR TN NC SC DC
HI
OK LA MS AL GA
FL
Native Applications Enable Accurate Geo Compliance
© iovation. All RightsReserved 28
TX
VT
ME
NH
IDWA
WI
AK
MT MAND MN IL MI NY
WY
NV
SD
RI
IA IN OH PA NJ CTOR
CO
UT
NE MO KY WV VA MD DECA
AZ NM KS AR TN NC SC DC
HI
OK LA MS AL GA
FL
Native Applications Enable Accurate Geo Compliance
© iovation. All RightsReserved 29
965K
Accounts
795K
Devices
223K
Reports
Associated with player
self-exclusion
Self-exclusion placed
By operators
Associated with player
self-exclusion
Take Control of Problem Gambling
© iovation. All RightsReserved 30
AbnormalNormal FraudRing
Unmask Criminal Behavior
GOOD ACCOUNTSBAD ACCOUNTS DEVICESREVIEW
© iovation. All RightsReserved 31
Defending the Business
© iovation. All RightsReserved 32
Defending the Business
Roll Out the VIP Path to Play
Improved
Login
Reduced
Friction
Expedited
Onboarding
Added Risk
Insights
Increased
Assurance
© iovation. All RightsReserved 33
Improve Login Experience
Ease access for good players, stop fraudsters
Pair known devices with
accounts for transparent
effortless access
Strong MFA for step up and
transaction authorization of
risky transactions
Check risk on new,
unpaired devices and
risky transactions
Improve customer
experience by
eliminating challenges
34© iovation. All RightsReserved
Improve login experience, reduce password resets that
cause customer friction at the contact center
Cost for each manual
password reset
Of calls to contact center
are for password resets
10
Min.
For an agent to manually
reset a password
$8 35%
- http://www.sparkhound.com/blog/does-one-password-reset-cost-your-company-7-or-70-every-time-the-password-is
- iovation
© iovation. All RightsReserved 35
Device-Based Authentication
Device-Based Reputation
Mobile Multifactor
Authentication
Optimize the Player Experience
Online and offline, risk-appropriate, layered authentication solutions
© iovation. All RightsReserved 36
Device-Based Authentication
Device-Based Reputation
Mobile Multifactor
Authentication
Optimize the Player Experience
Online and offline, risk-appropriate, layered authentication solutions
© iovation. All RightsReserved 37
Device-Based Authentication
Device-Based Reputation
Mobile Multifactor
Authentication
Optimize the Player Experience
Online and offline, risk-appropriate, layered authentication solutions
38© iovation. All RightsReserved
Preventing
Fraud and Abuse
Complying
with Regulations
Defending
the Business
Providing An Engaging and Rewarding Experience
39© iovation. All RightsReserved
Q&A
© iovation. All RightsReserved 40
© iovation. All RightsReserved 41
42© iovation. All RightsReserved
Thank You

More Related Content

What's hot

The Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White ListThe Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White Listderektop
 
Barion News 27th March 2017
Barion News 27th March 2017Barion News 27th March 2017
Barion News 27th March 2017Tamas Biro
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassThe ID Co.
 
Online Retail Risk Management
Online Retail Risk ManagementOnline Retail Risk Management
Online Retail Risk Managementiamwire
 
Pay Easy Solutions Internationalv2
Pay Easy Solutions Internationalv2Pay Easy Solutions Internationalv2
Pay Easy Solutions Internationalv2davidlambert1978
 
Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation TransUnion
 
Alternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slidesAlternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slidesCallcredit123
 
KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)EY
 
Pay Easy Solutions International
Pay Easy Solutions InternationalPay Easy Solutions International
Pay Easy Solutions Internationaljeanieaguilar
 
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceRisks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceSysCloud
 
BitCollar White Paper
BitCollar White PaperBitCollar White Paper
BitCollar White PaperAlexMok16
 
ThreatMetrix for 3d-secure
ThreatMetrix for 3d-secureThreatMetrix for 3d-secure
ThreatMetrix for 3d-secureKen Lam
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website SecuritySucuri
 

What's hot (19)

m:Cypher overview
m:Cypher overviewm:Cypher overview
m:Cypher overview
 
The Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White ListThe Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White List
 
eCommerce – Fraud
eCommerce – FraudeCommerce – Fraud
eCommerce – Fraud
 
Barion News 27th March 2017
Barion News 27th March 2017Barion News 27th March 2017
Barion News 27th March 2017
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce Masterclass
 
Online Retail Risk Management
Online Retail Risk ManagementOnline Retail Risk Management
Online Retail Risk Management
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
Ecommerce Forum - Ogone
Ecommerce Forum - OgoneEcommerce Forum - Ogone
Ecommerce Forum - Ogone
 
Pay Easy Solutions Internationalv2
Pay Easy Solutions Internationalv2Pay Easy Solutions Internationalv2
Pay Easy Solutions Internationalv2
 
Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation
 
Alternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slidesAlternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slides
 
KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)
 
Pay Easy Solutions International
Pay Easy Solutions InternationalPay Easy Solutions International
Pay Easy Solutions International
 
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceRisks of not complying with sox and pci compliance
Risks of not complying with sox and pci compliance
 
BitCollar White Paper
BitCollar White PaperBitCollar White Paper
BitCollar White Paper
 
ThreatMetrix for 3d-secure
ThreatMetrix for 3d-secureThreatMetrix for 3d-secure
ThreatMetrix for 3d-secure
 
Challenge Accepted
Challenge AcceptedChallenge Accepted
Challenge Accepted
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website Security
 
OTPPAY payments
OTPPAY paymentsOTPPAY payments
OTPPAY payments
 

Similar to Roll Out the VIP Path to Play

Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsTransUnion
 
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...TransUnion
 
Creating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online FraudCreating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online FraudTransUnion
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
 
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...apidays
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4TransUnion
 
Unicorn Business Plans - Blockchain Pitch Deck
Unicorn Business Plans - Blockchain Pitch DeckUnicorn Business Plans - Blockchain Pitch Deck
Unicorn Business Plans - Blockchain Pitch DeckUnicorn Business Plans
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesTransUnion
 
KYC Solutions for online gambling
KYC Solutions for online gamblingKYC Solutions for online gambling
KYC Solutions for online gamblingTrustIDnow
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take OverLaurent Pacalin
 
Ntrust case study_iovation
Ntrust case study_iovationNtrust case study_iovation
Ntrust case study_iovationTransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedTransUnion
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptxdarrengracia
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdfMerchantech - Payment Processing Services
 
Reducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury TechnologyReducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury TechnologyElena Oliveira
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit123
 
How AI is preventing account fraud at web scale
How AI is preventing account fraud at web scaleHow AI is preventing account fraud at web scale
How AI is preventing account fraud at web scaleAmir Moghimi
 
Dollar_iSignthis brochures
Dollar_iSignthis brochuresDollar_iSignthis brochures
Dollar_iSignthis brochuresJohn Karantzis
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...TransUnion
 

Similar to Roll Out the VIP Path to Play (20)

Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
Creating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online FraudCreating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online Fraud
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Unicorn Business Plans - Blockchain Pitch Deck
Unicorn Business Plans - Blockchain Pitch DeckUnicorn Business Plans - Blockchain Pitch Deck
Unicorn Business Plans - Blockchain Pitch Deck
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
KYC Solutions for online gambling
KYC Solutions for online gamblingKYC Solutions for online gambling
KYC Solutions for online gambling
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take Over
 
Ntrust case study_iovation
Ntrust case study_iovationNtrust case study_iovation
Ntrust case study_iovation
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
 
Reducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury TechnologyReducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury Technology
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
 
How AI is preventing account fraud at web scale
How AI is preventing account fraud at web scaleHow AI is preventing account fraud at web scale
How AI is preventing account fraud at web scale
 
Dollar_iSignthis brochures
Dollar_iSignthis brochuresDollar_iSignthis brochures
Dollar_iSignthis brochures
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 

More from TransUnion

A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesTransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipTransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalTransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingTransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropeTransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityTransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...TransUnion
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...TransUnion
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...TransUnion
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...TransUnion
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)TransUnion
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPRTransUnion
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?TransUnion
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceTransUnion
 
Webinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportWebinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportTransUnion
 
Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?TransUnion
 
Achieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerAchieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerTransUnion
 
Lunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysLunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysTransUnion
 
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFAMulti-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFATransUnion
 

More from TransUnion (20)

A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer Experience
 
Webinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportWebinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry Report
 
Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?
 
Achieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerAchieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the Customer
 
Lunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysLunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good Guys
 
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFAMulti-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
 

Recently uploaded

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 

Recently uploaded (20)

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 

Roll Out the VIP Path to Play

  • 1. 1© iovation. All RightsReserved Angie White, Product Marketing Manager Roll Out the VIP Path to Play
  • 2. How do you protect your business and consumers even when bad actors haveperfect data?
  • 3. © iovation. All RightsReserved 3 Gambling Last 12 months Transactionscoming frommobile 72% Volumeof gambling transactions 589 million Numberof risky transactionsstopped 48 million Reputationreports submittedby analysts 1.2 million 100-plus ActiveGamblingOperators andPlatformProvidersUseiovation © iovation. All Rights Reserved 3
  • 4. © iovation. All RightsReserved 4 TransUnion and iovation The largest combined personal and digital identity platform 1 billion worldwide consumer records 650 million consumer credit history records 50+ petabytes of data 30+ countries 4.8 billion monthly data updates 5.9 billion devices seen by network 42 billion total transactions protected 26 million transactions protected per day 66 million fraud reports placed by network 35,000 websites and apps protected
  • 5. © iovation. All RightsReserved 5 • Verify identity against a broad set of personal and digital data • Utilize when an account is originated or provisioned • Form a basis for greater identity confidence • Validate the claimed identity is who they say they are • Utilize authentication at specific touchpoints • Employ methods that match the risk level • Assess fraud risk of online transactions or identities • Identify potentially fraudulent actions or behaviors • Investigate suspiciousbehavior and inconsistencies Prevent Fraud AuthenticateConsumers EstablishIdentity
  • 6. 6© iovation. All RightsReserved Preventing Fraud and Abuse Complying with Regulations Defending the Business Providing An Engaging and Rewarding Experience
  • 7. © iovation. All RightsReserved 7 Recognize a Consumer’s Online Devices Associate devices to an anonymous consumer
  • 8. © iovation. All RightsReserved 8 Connect Personal and Digital Identity Gain greater identity confidence and clarity
  • 9. © iovation. All RightsReserved 9 Offer Seamless and Safe Transactions Secure every step of your customer’s journey Account Login Account Management Cash Out Play Deposit Account Registration
  • 10. © iovation. All Rights Reserved 10 Personal Identity Solutions Digital Identity Solutions Gambling Player’s Journey Stop Bonus Abuse Prevent Fraudulent Accounts Manage Player Self-exclusion Stop Repeat Offenders Ensure Geographic Compliance Verified Pre-fill to Expedite Onboarding Identity Verification (OTP, KBA) Age Verification Address Validation Email and Phone Verification Account Registration 1
  • 11. © iovation. All RightsReserved 11 Preventing Fraud and Abuse
  • 12. © iovation. All RightsReserved 12 Preventing Fraud and Abuse Cheating and Abuse Payment Fraud Account Takeover Bonus Abuse Insider Threat
  • 13. © iovation. All RightsReserved 13 Preventing Fraud and Abuse Cheating and Abuse Payment Fraud Account Takeover Bonus Abuse Insider Threat
  • 14. 14 Attract New Players, Not Fraud R i s i n g b o n u s a b u s e 250K 6% 2015 2016 2017 2018 200K 150K 100K 50K 0K 287% Increase in the Past 3 Years
  • 15. © iovation. All RightsReserved 15 Bonus Abuse Protection APPLY High Velocities Device Associations Identify Good Players Device Reputation ACCOUNT BONUS First Deposit Bonus up to 100% $100
  • 17. © iovation. All RightsReserved 17 Preventing Fraud and Abuse Cheating and Abuse Payment Fraud Account Takeover Bonus Abuse Insider Threat
  • 18. © iovation. All RightsReserved 18 Fraud Insights From the iovation Database CreditCardFraud- 5 Year Trend 600K 500K 400K 300K 200K 100K 2014 2015 2016 2017 2018 *Source: iovation stats on reported fraud 155% Increase in the Past 5 Years
  • 19. © iovation. All RightsReserved 19 Payment Fraud Protection Check device for risk factors such as geolocation mismatches, high velocities and detection evasion Push authorization for step-up or for authorization of high value or risky transactions Check if the device been associated with past fraud either directly or with another business? Improve customer experience by eliminating challenges
  • 20. © iovation. All RightsReserved 20 Preventing Fraud and Abuse Cheating and Abuse Payment Fraud Account Takeover Bonus Abuse Insider Threat
  • 21. © iovation. All RightsReserved 21 Account Takeover Common Attack Methods Consumer victims of ATO pay average of $290 and spend 16 hours to resolve Credential stuffing Social engineering Phishing attacks Source: Javelin 2018 Identity Fraud Study
  • 22. © iovation. All RightsReserved 22 Gambling Player’s Journey Account Registration Login Play Deposit Cash Out Account Management RISK RISK Contact Center RISK
  • 23. © iovation. All RightsReserved 23 Account Takeover Protection Improve login experience for good players, stop fraudsters Pair known devices with accounts for transparent effortless access Strong MFA for step up and authorization of account changes Check risk on new, unpaired devices or assess the risk of a new email or phone number Contact agent pushes an authentication request before proceeding with call Account Management Login Login Contact Center
  • 24. © iovation. All RightsReserved 24 Complying with Regulations
  • 25. © iovation. All RightsReserved 25 Complying with Regulations Affordability Checks Geo Compliance Age Verification Identity Verification Responsible Gambling AML
  • 26. © iovation. All RightsReserved 26 Geo Compliance Protect against detectionevasion IP or ISP Mismatch Anonymizing Proxies Geolocation Mismatch Is there a mismatch between the real and stated IP? With the ISP? Is there a mismatch between the time zone and geolocation of the device? Is the device evading detection? Perhaps using a VM, proxy or Tor? 119% higher in the U.S.
  • 27. © iovation. All RightsReserved 27 TX VT ME NH IDWA WI AK MT MAND MN IL MI NY WY NV SD RI IA IN OH PA NJ CTOR CO UT NE MO KY WV VA MD DECA AZ NM KS AR TN NC SC DC HI OK LA MS AL GA FL Native Applications Enable Accurate Geo Compliance
  • 28. © iovation. All RightsReserved 28 TX VT ME NH IDWA WI AK MT MAND MN IL MI NY WY NV SD RI IA IN OH PA NJ CTOR CO UT NE MO KY WV VA MD DECA AZ NM KS AR TN NC SC DC HI OK LA MS AL GA FL Native Applications Enable Accurate Geo Compliance
  • 29. © iovation. All RightsReserved 29 965K Accounts 795K Devices 223K Reports Associated with player self-exclusion Self-exclusion placed By operators Associated with player self-exclusion Take Control of Problem Gambling
  • 30. © iovation. All RightsReserved 30 AbnormalNormal FraudRing Unmask Criminal Behavior GOOD ACCOUNTSBAD ACCOUNTS DEVICESREVIEW
  • 31. © iovation. All RightsReserved 31 Defending the Business
  • 32. © iovation. All RightsReserved 32 Defending the Business Roll Out the VIP Path to Play Improved Login Reduced Friction Expedited Onboarding Added Risk Insights Increased Assurance
  • 33. © iovation. All RightsReserved 33 Improve Login Experience Ease access for good players, stop fraudsters Pair known devices with accounts for transparent effortless access Strong MFA for step up and transaction authorization of risky transactions Check risk on new, unpaired devices and risky transactions Improve customer experience by eliminating challenges
  • 34. 34© iovation. All RightsReserved Improve login experience, reduce password resets that cause customer friction at the contact center Cost for each manual password reset Of calls to contact center are for password resets 10 Min. For an agent to manually reset a password $8 35% - http://www.sparkhound.com/blog/does-one-password-reset-cost-your-company-7-or-70-every-time-the-password-is - iovation
  • 35. © iovation. All RightsReserved 35 Device-Based Authentication Device-Based Reputation Mobile Multifactor Authentication Optimize the Player Experience Online and offline, risk-appropriate, layered authentication solutions
  • 36. © iovation. All RightsReserved 36 Device-Based Authentication Device-Based Reputation Mobile Multifactor Authentication Optimize the Player Experience Online and offline, risk-appropriate, layered authentication solutions
  • 37. © iovation. All RightsReserved 37 Device-Based Authentication Device-Based Reputation Mobile Multifactor Authentication Optimize the Player Experience Online and offline, risk-appropriate, layered authentication solutions
  • 38. 38© iovation. All RightsReserved Preventing Fraud and Abuse Complying with Regulations Defending the Business Providing An Engaging and Rewarding Experience
  • 39. 39© iovation. All RightsReserved Q&A
  • 40. © iovation. All RightsReserved 40
  • 41. © iovation. All RightsReserved 41
  • 42. 42© iovation. All RightsReserved Thank You

Editor's Notes

  1. Not a new concept 6 years ago TU talked about cookies… Tony Guitar spoke last year about synthetic modeling Continues to evolve… NOT to
  2. 12 months from July 8, 2019
  3. This requires a wholistic approach that considers both terrestrial identity and digital identity.
  4. Functional Areas of Responsibility and Risk There are a number of things that the
  5. Over time, using multiple devices as a single user, relationships are built on that anonymous online user or “device ID” When a transaction arrives, you’re not just looking at a single device and whether it’s a new or existing one, but you’re looking at the usage of all related devices it’s associated with Is this user doing business in the consortium network? Total devices seen at more than one subscriber – 84 Million Transactions from crossover devices – 2.5 Billion Transactions from crossover devices associated to fraud – 211 Million (8% of transactions from crossover devices) Through these kinds of relationships, even before you have personal information you can get a good sense of whether someone is here to do business with you or not.
  6. What might be possible if online data, offline data, behavioral data, telephony, reputational and credit histories could be united and carry your transaction beyond an anonymized device? Rather than relying on customers repeating information over and over, rather than increasing the degree of difficulty of online security question tests, what could you do if you could see more – About the device they take everywhere with them to do business with everyone in the world About their payment history About their public records, their registrations and licenses About the address they live at, the SSN they’re claiming as their own, the mobile number you’re SMSing them????
  7. Bonus abuse was again the number one reported fraud by our gambling clients in 2018. We saw a 68% increase from 2017 to 2018 And In the past 3 years, we’ve seen a rise 287% Many operators are augmenting KYC solutions with predictive analytics.
  8. We provide a layered approach to managing bonus abuse. Identify potential good customers – our machine learning solution allows you to predict the likelihood that a transaction will become fraudulent. This is very helpful in on boarding because you can decrease barriers for low risk customers and only challenge those where risk is predicted. Known customers – with our device-based authentication you can confidently identify devices associated with known, good customers, and target your promotions to only those accounts Stop repeat offenders – our consortium allows you to report promo abuse and share that with our network of customers. Get alerted to devices that have a history of promo abuse or that are associated with other devices linked to promo abuse Velocities – another way we fight promo abuse is by looking at velocities. If you have a single device that has setup 100 new accounts in an hour, that’s not a normal consumer behavior and likely requires further investigation
  9. Financial Fraud Over the past 5 years, we’ve seen credit card reports increase 155%, an average annual growth of 39%. Operators are met with the challenge of reducing credit card fraud without increasing false declines, reviews and unnecessary step-ups.
  10. (ALL GEOS)
  11. At least 16 separate security breaches occurred at retailers from January 2017 until now. Many of them were caused by flaws in payment systems, either online or in stores. - https://www.businessinsider.com/data-breaches-2018-4 Data breaches were up 45% in 2017, with the flood of stolen credentials and personal data available on the dark web fraudsters are using that data to perpetrate ATO through a variety of tactics. Credential Stuffing - According to Verizon’s 2017 Data Breach Investigations report the number of data breaches involving stolen or weak passwords has gone from 50 per cent to 66 per cent to 81 per cent during the past three years. This alarming trend clearly illustrates that today’s security isn’t working. Source: https://www.cso.com.au/mediareleases/29642/hacked-passwords-cause-81-of-data-breaches/ Social Engineering - Case study on ATO: https://drive.google.com/file/d/1G4C0IqUSTUsIm4oYLk0plsqPbMy7SB7P/view?ts=5b906058 SIM Swapping – Recent
  12. These solutions go hand in hand
  13. iovation recently analyzed over half a billion online transactions from our global gambling customers from March 2018 to March 2019 and found that U.S. consumers are trying to bypass system controls to gamble online at a much higher rate than those outside of the use. In our analysis, we saw that 4.13% of online gambling transactions from the U.S., predominantly to European gambling operators, used evasion techniques such as trying to hide their location -- 119% higher than the 1.89% of online gambling transactions from outside of the U.S. which used evasion techniques.
  14.  iovation recently analyzed over half a billion online transactions from our global gambling customers from March 2018 to March 2019 and found that U.S. consumers are trying to bypass system controls to gamble online at a much higher rate than those outside of the use. In our analysis, we saw that 4.13% of online gambling transactions from the U.S., predominantly to European gambling operators, used evasion techniques such as trying to hide their location -- 119% higher than the 1.89% of online gambling transactions from outside of the U.S. which used evasion techniques. Geo Compliance For operators launching apps or online betting in new markets, one of the key regulatory constraints is controlling play based on geographical boundaries without degrading the player experience. Emerging technologies are making these processes much more seamless to manage, right in your native application. Geofencing can be enabled as an authentication constraint directly through your mobile app so that players can place bets in Nevada, for example, but are restricted from betting as soon as they cross the border into Utah. 
  15. Geo Compliance For operators launching apps or online betting in new markets, one of the key regulatory constraints is controlling play based on geographical boundaries without degrading the player experience. Emerging technologies are making these processes much more seamless to manage, right in your native application. Geofencing can be enabled as an authentication constraint directly through your mobile app so that players can place bets in Nevada, for example, but are restricted from betting as soon as they cross the border into Utah. 
  16. Problem gambling In 2018 we saw the U.K. Gambling Commission impose numerous multi-million pound fines on operators for ‘fair gaming’ violations. Of particular concern is managing player self-exclusion (PSE). When players self-exclude on a gambling site that uses iovation, that operator submits a self-exclusion report on that account. We have seen a marked increase in the number of reports from operators in the last 2 years, increasing 73% since 2016. Managing and preventing self-excluded players from creating new accounts and attempting to use your service requires collaboration across the industry. During 2018, over 795,000 devices and nearly a million accounts associated with a self exclusion report attempted to access one or more of the digital properties in our network of iGaming clients — more than four times the number of self-exclusion reports placed in 2018. Even with national databases such as GamStop, being able to associate self-exclusion with multiple devices and accounts, across operators, is a key tool in managing this problem.
  17. AML These device associations reveal a lot about both good and bad consumers Device intelligence is crucial in preventing money laundering. By looking at device and account associations, you can uncover otherwise hidden connections. Associate groups of devices that are related to one another by looking at common account access. 
  18. Functional Areas of Responsibility and Risk Sources: http://www.sparkhound.com/blog/does-one-password-reset-cost-your-company-7-or-70-every-time-the-password-is iovation
  19. By implementing ClearKey, you can reduce the overall volume of calls to your call center. Good customers with no risk indicators are automatically authenticated when we recognize their paired device. Allowing them seamless access to low risk transactions such as making a payment, or viewing their statement.
  20. When customers do need to contact the call center, your agents can push an authentication request straight to their phone. This allows you to quickly sort the fraudsters out from good customers. If the user is authenticated, the agent can proceed with the call and help with higher risk activities such as changing account details. A common ATO target.
  21. For the highest risk interaction points , such as adding new lines or large purchases of phones, your agent can push an authorization request straight to the users phone. This feature can be used by individual customers or groups. For example for a large corporate account, you could set it up so that any purchase over $500 requires 2 of 3 approvers to proceed. Effectively shutting down ATO attacks on commercial accounts.
  22. Functional Areas of Responsibility and Risk There are a number of things that the