Fraud Mobility: Exploitation Patterns and Insights

Size: px
Start display at page:

Download "Fraud Mobility: Exploitation Patterns and Insights"

Transcription

1 WHITEPAPER Fraud Mobility: Exploitation Patterns and Insights September 2015

2 2 Table of Contents Introduction 3 Study Methodology 4 Once a SSN has been Compromised, it Remains at Risk 4 Victims Remain Vulnerable within Specific Markets in the Short-Term 6 Victims often Reappear in Different Industries over the Long-Term 7 Conclusions 7

3 Introduction 3 Identity theft places a burden on victims and presents tremendous challenges to businesses and government agencies. In 2014, the nature of the breaches had migrated from financial access to identity theft. In fact, 54% of all data breaches were described as identity theft, a dramatic increase from the 20% seen in Consumers and enterprises are less equipped to deal with the pain, inconvenience, and long-term implications of identity theft fraud as it is substantially more damaging than financial fraud. Enterprises must constantly solve a significant problem: how to determine whether the personally identifiable information (PII) presented on the application is truly the legitimate individual or a fraudster. The greatest challenge to fraud prevention and detection is understanding the speed and cross industry patterns (known as mobility) with which a fraudster will use an identity. There are predictable mobility patterns in how fraudsters initiate financial access fraud in the payment space and how fraudsters transact across industries. For example, it is common for a fraudster that has compromised credit card information, to create a counterfeit card and make a small purchase (perhaps at a gas station). Then, if successful with the small purchase, the fraudster will buy a big-ticket item in a different industry (such as an expensive electronic device). 2 In this study, ID Analytics explores whether similar patterns are identifiable when looking at identity theft patterns. Identity Theft Facts In 2014, 12.7 million US consumers (5.2% of the US population) were victims of identity theft 4 This resulted in over 16 billion dollars of loss to the enterprise 5 Between January and August 2015 alone, nearly 140 million records were compromised in a total of 505 breaches 6 Traditional identity-fraud management technologies lack access to data that is updated frequently enough, or these systems lack information from multiple industries. For example, those enterprises relying on home-grown solutions only have visibility into their own customers. On the other hand, enterprises that rely on bureau or public records-based solutions may have limitations in terms of the industries that are covered and the freshness of their data assets. ID Analytics analyzed the trends and mobility patterns by determining if fraudsters follow a pattern within and across industries. What behavior does a victim s identity exhibit before and after a fraudulent event? What is the longterm behavior for a victim s identity and how does it compare to a legitimate identity? Research indicates that fraud exhibits predictable patterns over time and across industries that have important implications for its prevention. For over a decade, ID Analytics has operated the ID Network, a crossindustry data consortium built for the purpose of enterprise risk management and identity fraud protection. This puts ID Analytics in a unique position to analyze consumer events. Enterprise clients submit more than 55 million consumer-asserted identity elements every day for fraud, credit and identity verification purposes via loan applications, check-order requests, wireless service contracts, and other use cases. Enterprises then describe which events performed normally and which ones went on to be confirmed as identity fraud. In addition, the ID Network is the largest repository of identity fraud in the United States: it contains 3.3 million confirmed fraud events The terms application, transaction and event are used interchangeably in this study given that there are different types of transactions in the ID Network, however, the majority are new-account openings associated with loan or service applications. 4 Javelin Strategy and Research 2015 Identity and Fraud 5 Javelin Strategy and Research 2015 Identity and Fraud 6

4 Study Methodology 4 ID Analytics studied the behavioral trends for the fraud victims, and non-compromised consumers using historic records and client-reported fraud from the ID Network. Isolating the Social Security number ( SSN ) asserted on the applications as a proxy for an individual, SSNs were isolated into two groups in order to determine mobility patterns. The first group includes SSNs that have been associated by the enterprise with a confirmed fraud. This group is referred to throughout the study as a compromised identity. The second group consists of SSNs that were not associated with confirmed fraud. An SSN from this group is referred to throughout the study as a non-compromised identity. This study analyzed 68 million SSNs of both victims and non-victims over the last five years within the United States. In addition, a smaller subset of applications were isolated to better understand behavior patterns of a single identity over time. This allowed ID Analytics to analyze the differences in behavior surrounding a confirmed fraudulent event compared to behaviors for non-compromised identities. Once a SSN has been Compromised, it Remains at Risk an identity displays the first instance of confirmed fraud, it becomes a compromised identity and exhibits a higher velocity pattern than the non-compromised identity in both the short-term (the first 180 days after the event occurs) as well as the long-term (more than 180 days after the event occurs). To illustrate the difference in behavior of a non-compromised identity as well as a compromised identity let s examine the behavior of two examples, meet Tony and Fred. Case Study 1: Tony, a non-compromised identity Tony has been seen in the ID Network five times over eleven years with an overall application rate of roughly one application every two years Tony s SSN was never associated with a client-confirmed fraud The event of Tony s non-compromised application (randomly chosen from all the noncompromised applications) was seen in December 2008 on a retail credit-card application Prior to this event, Tony was seen submitting two applications, approximately one every two and a half years (both seen in the retail credit card industry) Case Study 2: Fred, a compromised identity Applications with Fred s SSN were seen in the ID Network without any associations to fraud for 11 years averaging roughly one new application every five years. During this time Fred was seen applying to two bankcard enterprises In February 2014, Fred s SSN was first reported by a telecommunications client as being associated with a fraudulent application. Later that same day, Fred s SSN was seen in a new account application that went on to be confirmed as a fraudulent event in the retail credit card industry and there were three additional new-account applications with three different telecommunication enterprises (one of which resulted in a third instance of confirmed fraud) The following day, Fred s SSN was seen on an application for a retail credit card October 2014, two new applications with Fred s SSN are submitted to retail card issuers and later confirmed as associated with fraud by the enterprises

5 Fred and Tony s behavior is representative of the compromised and non-compromised identity behaviors observed in the study. In general, non-compromised identities are seen on a new application within the ID Network roughly once every five years. The compromised identities behave the same way that non-compromised identities do prior to their first association with fraud. the first confirmed fraudulent event, the following two years show the victim s SSN being asserted at an accelerated rate of 1.5 applications every year. 5 Figure 1: Pre and Post Application Velocity for a Compromised Application vs a Non-Compromised Application Compromised identity 6xs higher within the first day Compromised identity 5xs higher after 360 days Day 0-1 Day Compromised Identity Non-Compromised Identity Fraudulent Event Non-Fraudulent Event Just as in the example of Fred and Tony, the velocity surrounding a non-compromised identity (Tony) remains consistent over time while the velocity of a compromised identity (Fred) typically increases once it has been seen as a confirmed fraud. (1) The application volume patterns for compromised identities and non-compromised identities are similar until ten days prior to the known fraudulent event (point two on figure 1) (2) Compromised identities are seen applying for new accounts at a rate 5 times greater than non-compromised identities for the ten days prior to the confirmed fraud event (3) Once the compromised identity becomes a confirmed fraud, the application volume patterns between the compromised identity and the non-compromised identity diverge significantly. (4) In the first ten days after an identity is seen as compromised, the victim s SSN is seen with an increased velocity 7.5 times the velocity of the non-compromised identity (point four in figure 1). Of the frauds occurring within the 0-10 day timeframe, 46% occurred within the first 24 hours of the fraudulent event. (5) 90 days after the confirmed fraud, the application volume returns to a rate similar to that of the non-compromised identities. (6) The application volume for compromised identities spikes 180 days after the first reported fraud event (point 6). It is likely that the confirmed fraud was detected within the first 90 days and the fraudulent behavior is stopped temporarily, however the application volume remains elevated for compromised identities and never returns to the same rates as those of the noncompromised identities

6 Victims Remain Vulnerable within Specific Markets in the Short-Term 6 Application rates for compromised and non-compromised identities vary in how the identity is seen across industries. ID Analytics expected to see that when an identity was compromised, it would quickly be used for fraudulent new-account applications in multiple industries. Surprisingly, the analysis shows that subsequent applications using the compromised identity were more likely to stay within the same industry rather than cross industries within the first 360 days. Figure 2: Short-Term Movement within Industry Sectors Probability of Crossing Industry 70% 60% 50% 48% 53% 55% 57% 62% 63% 40% 30% 20% 10% 0% 21% 23% 17% 16% 13% 7% Days Non-Fraudulent Event Fraudulent Event Non-Compromised Compromised Figure 2 shows that the probability of an identity applying within a single industry varies greatly between compromised and non-compromised identities. Intuitively, an uncompromised identity may apply to multiple industries within six months. Compromised identities are seen staying within the same industry at a much higher rate than the non-compromised identities. the instance of a confirmed fraud there is a high velocity of applications submitted within the first ten days. During this time, 93% of multiple fraud occurrences took place within the same industry. Often when compromised identities have a high velocity of applications over a short time period, they occur within the same industry but are seen at multiple enterprises. This behavior is most acutely demonstrated in the telecommunications industry. ID Analytics studied the application volume for compromised identities from telecommunication clients within 10 days of the initial fraud event and learned that whenever there was a second confirmed fraud event, 97% of these subsequent frauds occurred in the telecommunications industry.

7 Victims often Reappear in Different Industries over the Long-Term days, identities with a second instance of confirmed fraud are more likely to reappear within a different industry. Figure 2 shows a 174% increase in the probability of the victim s SSN to cross industry after 360 days. The industry that is most impacted by this long-term cross industry movement is the bankcard industry. Bankcard is the only industry in which the second instance of confirmed fraud after 360 days has a higher probability of staying in the same industry rather than to cross industries. In addition, both retail and telecommunications show the highest probability of industry movement into the bankcard industry after 360 days. On average, 48% of the time when a confirmed fraud that occurred in the telecommunications or retail space it then moves into the bankcard industry when another instance of confirmed fraud occurs 360 days later. Conclusion Risk managers should look at ways to update their new-account risk management strategies. The study shows clear differences in how compromised identities behave over time as compared to non-compromised identities. Risk managers should be aware that spikes in volume for a particular identity could be a leading indicator for an imminent fraudulent event. Spikes are only visible through the use of a real-time, identity-fraud management solution. Compromised identities clearly exhibited a pattern of new-account application volume above the rates for non-compromised identities. the first instance of a confirmed fraud, the velocity patterns of a compromised identity drastically increase and do not return to the velocity patterns of a non-compromised identity within the following two years. This implies that speed is of the essence in not only fraud detection, but also in collaborating with prospective victims to make them aware of how their identities have been compromised. To be most effective, a fraud solution should include real-time updates since compromised identities have a high probability of staying within the same industry and moving between multiple enterprises in the first few days after the initial fraud event is detected. The study shows that a compromised identity will most likely be exploited with many enterprises within a particular industry. Fraud solutions that include cross-industry visibility are also important for long-term fraud detection as victim s identity will often be exploited in a new industry 360 days after the initial fraud event. Choosing the Right Fraud Solution is Key to Reducing Identity Fraud Enterprises that have been able to grow their customer base safely beyond their current footprints have used tools designed to recognize complex data patterns in near-real time with cross-industry insights. Access to these types of solutions are key to their fraud prevention strategies because of these offerings are receptive to how identity fraud morphs over time and across industries. A strong fraud solution includes cross-industry visibility, depth of coverage, real-time data to track application velocity, and large number of confirmed fraud tags as part of the underlying data network. Data breaches have put enterprises under constant and increasing threat. ID Analytics provides industry leading solutions to help enterprises to best keep pace with the rapidly changing nature of fraud. With over a decade of experience in identity risk management, ID Analytics state of the art fraud solution includes cross-industry, up-to-the-minute visibility into identity and behavior. To learn more about fraud solutions, contact us at marketinginfo@idanalytics.com or or visit us at

8 2015 ID Analytics. All rights reserved.

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS Topics Consumer identity why it is important How big a problem is identity fraud? What

More information

Reduce fraud losses and improve operational efficiency with advanced fraud detection technology

Reduce fraud losses and improve operational efficiency with advanced fraud detection technology Technical White Paper Reduce fraud losses and improve operational efficiency with advanced fraud detection technology Risk Solutions Most institutions know identity fraud exists and many already have identity

More information

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services A Layered Approach to Fraud Mitigation Nick White Product Manager, FIS Payments Integrated Financial Services Session Agenda Growing Fraud Concerns Old Habits Die Hard Maneuvering through the Barriers

More information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: October Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of managed environments,

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

Combating Cyber Risk in the Supply Chain

Combating Cyber Risk in the Supply Chain SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an

More information

Phishing Activity Trends

Phishing Activity Trends Phishing Activity Trends Report for the Month of, 27 Summarization of Report Findings The number of phishing reports received rose to 24,853 in, an increase of over 1, from February but still more than

More information

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Meeting FFIEC Meeting Regulations for Online and Mobile Banking Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and

More information

Putting security first for critical online brand assets. cscdigitalbrand.services

Putting security first for critical online brand assets. cscdigitalbrand.services Putting security first for critical online brand assets cscdigitalbrand.services 2 As the most security conscious digital brand service provider, our clients trust us to take care of their businesses and

More information

Phishing Activity Trends Report August, 2005

Phishing Activity Trends Report August, 2005 Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial

More information

Phishing Activity Trends Report August, 2006

Phishing Activity Trends Report August, 2006 Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account

More information

Training and Certifying Security Testers Beyond Penetration Testing

Training and Certifying Security Testers Beyond Penetration Testing Training and Certifying Security Testers Beyond Penetration Testing Randall W. Rice, CTAL (Full), CTAL-SEC Director, ASTQB Board of Directors www.astqb.org Most organizations do not know the true status

More information

2015 VORMETRIC INSIDER THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:

More information

Building a Threat Intelligence Program

Building a Threat Intelligence Program WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351

More information

OPTIMIZATION MAXIMIZING TELECOM AND NETWORK. The current state of enterprise optimization, best practices and considerations for improvement

OPTIMIZATION MAXIMIZING TELECOM AND NETWORK. The current state of enterprise optimization, best practices and considerations for improvement MAXIMIZING TELECOM AND NETWORK OPTIMIZATION The current state of enterprise optimization, best practices and considerations for improvement AOTMP.com The Next Evolution of Telecom Management OVERVIEW As

More information

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015 ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

6th Annual 15miles/Neustar Localeze Local Search Usage Study Conducted by comscore

6th Annual 15miles/Neustar Localeze Local Search Usage Study Conducted by comscore 6th Annual 15miles/Neustar Localeze Local Search Usage Study Conducted by comscore Consumers are adopting mobile devices of all types at a blistering pace. The demand for information on the go is higher

More information

The Interactive Guide to Protecting Your Election Website

The Interactive Guide to Protecting Your Election Website The Interactive Guide to Protecting Your Election Website 1 INTRODUCTION Cloudflare is on a mission to help build a better Internet. Cloudflare is one of the world s largest networks. Today, businesses,

More information

ASSESSMENT LAYERED SECURITY

ASSESSMENT LAYERED SECURITY FFIEC BUSINESS ACCOUNT GUIDANCE RISK & ASSESSMENT LAYERED SECURITY FOR ONLINE BUSINESS TRANSACTIONS New financial standards will assist banks and business account holders to make online banking safer and

More information

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It The Credential Phishing Handbook Why It Still Works and 4 Steps to Prevent It Introduction Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple:

More information

WHITE PAPER. ENSURING SECURITY WITH OPEN APIs. Scott Biesterveld, Lead Solution Architect Senthil Senthil, Development Manager IBS Open APIs

WHITE PAPER. ENSURING SECURITY WITH OPEN APIs. Scott Biesterveld, Lead Solution Architect Senthil Senthil, Development Manager IBS Open APIs ENSURING SECURITY WITH OPEN APIs Scott Biesterveld, Lead Solution Architect Senthil Senthil, Development Manager IBS Open APIs The security features that banks must build into their financial solutions

More information

Enterprise D/DoS Mitigation Solution offering

Enterprise D/DoS Mitigation Solution offering Enterprise D/DoS Mitigation Solution offering About the Domain TCS Enterprise Security and Risk Management (ESRM) offers full services play in security with integrated security solutions. ESRM s solution

More information

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing

More information

The most extensive identity protection plan available

The most extensive identity protection plan available The most extensive identity protection plan available AGENDA Identity theft About InfoArmor PrivacyArmor coverage Portal walkthrough Q&A Sharing data is now a fact of daily life. Our work requires personal

More information

Business Data Analytics

Business Data Analytics MTAT.03.319 Business Data Analytics Lecture 9 The slides are available under creative common license. The original owner of these slides is the University of Tartu Fraud Detection Wrongful act for financial

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

TOP RISK CONCERNS MERCHANT DATA BREACHES. Presented by Ann Davidson, VP of Risk Consulting at Allied Solutions

TOP RISK CONCERNS MERCHANT DATA BREACHES. Presented by Ann Davidson, VP of Risk Consulting at Allied Solutions TOP RISK CONCERNS MERCHANT DATA BREACHES Presented by Ann Davidson, VP of Risk Consulting at Allied Solutions Today s Webinar Will Cover: Current state of merchant data breaches Impact of merchant data

More information

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more - Samsung Tablet Photo - Tablets Mean Business Survey of IT pros reflects growing trend toward tablets for workforce mobility and more Table of contents Introduction 2 Giving employees what they want pays

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Security in a Converging IT/OT World

Security in a Converging IT/OT World Security in a Converging IT/OT World Introduction Around the winter solstice, darkness comes early to the citizens of Ukraine. On December 23, 2015, it came a little earlier than normal. In mid-afternoon,

More information

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table

More information

Target Breach Overview

Target Breach Overview Target Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more specifics? A: Yes, Target has confirmed that it experienced unauthorized access to its systems

More information

Who We Are! Natalie Timpone

Who We Are! Natalie Timpone Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City 1 Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City The opinions expressed are those of the presenters and are not those of the Federal Reserve Banks, the

More information

CYBER INSURANCE MARKET WATCH SURVEY EXECUTIVE SUMMARY. October 2016

CYBER INSURANCE MARKET WATCH SURVEY EXECUTIVE SUMMARY. October 2016 CYBER INSURANCE MARKET WATCH SURVEY EXECUTIVE SUMMARY October 2016 Summary The Council of Insurance Agents & Brokers (The Council) is pleased to release its third biannual Cyber Insurance Market Watch

More information

Mobile Security / Mobile Payments

Mobile Security / Mobile Payments Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY

More information

Socioeconomic Overview of Ohio

Socioeconomic Overview of Ohio 2 Socioeconomic Overview of Ohio Introduction The magnitude of the economic impact of Ohio s airports is linked to the demand that is generated within the state for aviation goods and services. As population,

More information

Kentucky IT Consolidation

Kentucky IT Consolidation 2007 NASCIO Recognition Awards Nomination Category: Enterprise IT Management Initiatives Kentucky IT Consolidation Commonwealth Office of Technology The Commonwealth of Kentucky is nearing completion of

More information

National Travel Associates

National Travel Associates National Travel Associates Fraud Prevention Module 2012 National Travel Associates Fraud In The Travel Industry With the popularity of online booking engines in the 90 s there was a huge insurgence of

More information

Good Technology State of BYOD Report

Good Technology State of BYOD Report Good Technology State of BYOD Report New data finds Finance and Healthcare industries dominate BYOD picture and that users are willing to pay device and service plan costs if they can use their own devices

More information

in collaboration with

in collaboration with in collaboration with Table of Contents 01 Turn Silos of Data into Operational Intelligence page 04 02 Gain a Competitive Advantage with Cisco and Splunk page 06 03 Improve Insight with IT Operations Analytics

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

OWASP Top 10 The Ten Most Critical Web Application Security Risks

OWASP Top 10 The Ten Most Critical Web Application Security Risks OWASP Top 10 The Ten Most Critical Web Application Security Risks The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain

More information

Real-time Fraud Detection with Innovative Big Graph Feature. Gaurav Deshpande, VP Marketing, TigerGraph; Mingxi Wu, VP Engineering, TigerGraph

Real-time Fraud Detection with Innovative Big Graph Feature. Gaurav Deshpande, VP Marketing, TigerGraph; Mingxi Wu, VP Engineering, TigerGraph Real-time Fraud Detection with Innovative Big Graph Feature Gaurav Deshpande, VP Marketing, TigerGraph; Mingxi Wu, VP Engineering, TigerGraph Speaking Today Gaurav Deshpande VP Marketing, TigerGraph gaurav@tigergraph.com

More information

ISACA West Florida Chapter - Cybersecurity Event

ISACA West Florida Chapter - Cybersecurity Event ISACA West Florida Chapter - Cybersecurity Event Presented by Sri Sridharan Managing Director & Chief Operating Officer Florida Center for Cybersecurity CURRENT TRENDS Top Cybersecurity Trends of 2015

More information

Ways Global FOR RETAIL

Ways Global FOR RETAIL 5 Ways Global RETAILERS Protect THEIR CUSTOMER Data In the new digital environment, keeping pace with security is the new reality Digital disruption over the last decade has impacted how retailers communicate,

More information

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security.  #truecybersecurity Borderless security engineered for your elastic hybrid cloud Kaspersky Hybrid Cloud Security www.kaspersky.com #truecybersecurity Borderless security engineered for your hybrid cloud environment Data

More information

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber

More information

Second International Barometer of Security in SMBs

Second International Barometer of Security in SMBs 1 2 Contents 1. Introduction. 3 2. Methodology.... 5 3. Details of the companies surveyed 6 4. Companies with security systems 10 5. Companies without security systems. 15 6. Infections and Internet threats.

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

Power of the Threat Detection Trinity

Power of the Threat Detection Trinity White Paper Security Power of the Threat Detection Trinity How to Best Combine Real-time Correlation, Insider Threat Analysis and Hunting to protect against cyber threats. Combine real-time correlation,

More information

Riding the Mobile Banking Wave

Riding the Mobile Banking Wave Riding the Mobile Banking Wave The Convergence of Telecommunications and Customer Centricity Joe Poehls Solution Architect, F5 Networks Recap of the Drivers in Banking Reaching out to the underbanked New

More information

Phishing Activity Trends Report October, 2004

Phishing Activity Trends Report October, 2004 Phishing Activity Trends Report October, 2004 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent websites which attempt to trick them into divulging

More information

Is Your Payment Card Data Secure Enough?

Is Your Payment Card Data Secure Enough? January 2018 Is Your Payment Card Data Secure Enough? 2018 KUBRA Is Your Payment Card Data Secure Enough? Payment Security Matters In 2007, TJX Companies (which includes TJ Maxx, HomeSense, and Marshalls)

More information

How To Build or Buy An Integrated Security Stack

How To Build or Buy An Integrated Security Stack SESSION ID: PDIL-W03 How To Build or Buy An Integrated Security Stack Jay Leek CISO Blackstone Haddon Bennett CISO Change Healthcare Defining the problem 1. Technology decisions not reducing threat 2.

More information

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Introduction The 6,331 credit unions in the United States face a unique challenge when it comes to cybersecurity.

More information

NEXT GENERATION SECURITY OPERATIONS CENTER

NEXT GENERATION SECURITY OPERATIONS CENTER DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

Machine Learning and Advanced Analytics to Address Today s Security Challenges

Machine Learning and Advanced Analytics to Address Today s Security Challenges Machine Learning and Advanced Analytics to Address Today s Security Challenges Depending on your outlook, this is either an exciting time or a terrible time to be part of an enterprise cybersecurity team.

More information

Panda Security 2010 Page 1

Panda Security 2010 Page 1 Panda Security 2010 Page 1 Executive Summary The malware economy is flourishing and affecting both consumers and businesses of all sizes. The reality is that cybercrime is growing exponentially in frequency

More information

Embedded Technosolutions

Embedded Technosolutions Hadoop Big Data An Important technology in IT Sector Hadoop - Big Data Oerie 90% of the worlds data was generated in the last few years. Due to the advent of new technologies, devices, and communication

More information

Securing Americans Identities: The Future of the Social Security Number

Securing Americans Identities: The Future of the Social Security Number Cha : Testimony, SASC 04 /25 /2017 1 Statement Before the House Ways and Means Subcommittee on Social Security Securing Americans Identities: The Future of the Social Security Number A Testimony by: James

More information

5LINX ID GUARD Product Overview. Credit/Presenter Goes Here

5LINX ID GUARD Product Overview. Credit/Presenter Goes Here 5LINX ID GUARD Product Overview Credit/Presenter Goes Here Statistics According to the FTC approximately 11 million people were victims of identity theft in 2009. It s estimated that $221 billion a year

More information

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA 1 SECURING DIGITAL IDENTITY THE KEY TO ASIA S VAST POTENTIAL IN E-COMMERCE We are living through an exciting time for digital commerce in Asia.

More information

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018 V REPORT : HPE Hybrid IT for SMBs HPE addressing SMB and channel partner Hybrid IT demands October 2018 ANALYST ANURAG AGRAWAL Data You Can Rely On Analysis You Can Act Upon HPE addressing SMB and partner

More information

CASE STUDY TOP 10 AIRLINE SOLVES AUTOMATED ATTACKS ON WEB & MOBILE

CASE STUDY TOP 10 AIRLINE SOLVES AUTOMATED ATTACKS ON WEB & MOBILE CASE STUDY TOP 10 AIRLINE SOLVES AUTOMATED ATTACKS ON WEB & MOBILE The Customer: Top 10 Airline CREDENTIAL STUFFING KILLCHAIN A Top 10 Global Airline that earns over $15 Billion in annual revenue and serves

More information

PCI DSS v3. Justin

PCI DSS v3. Justin PCI DSS v3 Justin Leapline justin.leapline@giftcards.com @jmleapline My Experience With PCI Just to lay the groundwork Currently work at Largest ecommerce in Pittsburgh My experience includes: QSA Acquirer

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the

More information

Emerging Technologies The risks they pose to your organisations

Emerging Technologies The risks they pose to your organisations Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things

More information

June 2012 First Data PCI RAPID COMPLY SM Solution

June 2012 First Data PCI RAPID COMPLY SM Solution June 2012 First Data PCI RAPID COMPLY SM Solution You don t have to be a security expert to be compliant. Developer: 06 Rev: 05/03/2012 V: 1.0 Agenda Research Background Product Overview Steps to becoming

More information

Building Resilience in a Digital Enterprise

Building Resilience in a Digital Enterprise Building Resilience in a Digital Enterprise Top five steps to help reduce the risk of advanced targeted attacks To be successful in business today, an enterprise must operate securely in the cyberdomain.

More information

Cyber Attacks & Breaches It s not if, it s When

Cyber Attacks & Breaches It s not if, it s When ` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,

More information

Phishing Activity Trends

Phishing Activity Trends Phishing Activity Trends Report for the Month of September, 2007 Summarization of September Report Findings The total number of unique phishing reports submitted to APWG in September 2007 was 38,514, an

More information

The Top 6 WAF Essentials to Achieve Application Security Efficacy

The Top 6 WAF Essentials to Achieve Application Security Efficacy The Top 6 WAF Essentials to Achieve Application Security Efficacy Introduction One of the biggest challenges IT and security leaders face today is reducing business risk while ensuring ease of use and

More information

ROI CASE STUDY IBM SPSS CITY OF LANCASTER. ROI: 1301% Payback: 1.5 months Average annual benefit: $1,344,338. Cost : Benefit Ratio 1 : 45.

ROI CASE STUDY IBM SPSS CITY OF LANCASTER. ROI: 1301% Payback: 1.5 months Average annual benefit: $1,344,338. Cost : Benefit Ratio 1 : 45. ROI CASE STUDY IBM SPSS CITY OF LANCASTER THE BOTTOM LINE The City of Lancaster, California needed to gain greater visibility into where Part I crimes were occurring and where they were expected to occur

More information

Introduction to Data Science

Introduction to Data Science UNIT I INTRODUCTION TO DATA SCIENCE Syllabus Introduction of Data Science Basic Data Analytics using R R Graphical User Interfaces Data Import and Export Attribute and Data Types Descriptive Statistics

More information

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager 7 Steps to Complete Privileged Account Management September 5, 2017 Fabricio Simao Country Manager AGENDA Implications of less mature privileged account management What does a more mature approach look

More information

Revenue and earnings increase

Revenue and earnings increase 24 April 2018 Financial press release Síminn hf. Q1 2018 Revenue and earnings increase Síminn s revenue amounted to ISK 6,874 million in the first quarter (Q1) of 2018, compared to ISK 6,723 million in

More information

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. Security for Your Business Mitigating risk is a daily reality for business owners, but you don t have

More information

BUFFERZONE Advanced Endpoint Security

BUFFERZONE Advanced Endpoint Security BUFFERZONE Advanced Endpoint Security Enterprise-grade Containment, Bridging and Intelligence BUFFERZONE defends endpoints against a wide range of advanced and targeted threats with patented containment,

More information

Cybersecurity and Data Protection Developments

Cybersecurity and Data Protection Developments Cybersecurity and Data Protection Developments Nathan Taylor March 8, 2017 NY2 786488 MORRISON & FOERSTER LLP 2017 mofo.com Regulatory Themes 2 A Developing Regulatory Environment 2016 2017 March CFPB

More information

June 2 nd, 2016 Security Awareness

June 2 nd, 2016 Security Awareness June 2 nd, 2016 Security Awareness Security is the degree of resistance to, or protection from, harm. if security breaks down, technology breaks down Protecting People, Property and Business Assets Goal

More information

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments Today s PCI compliance landscape is one of continuing change and scrutiny. Given the number

More information

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

Endpoint Security Can Be Much More Effective and Less Costly. Here s How Endpoint Security Can Be Much More Effective and Less Costly Here s How Contents Introduction More is not always better Escalating IT Security Budgets Ineffective management Need of the hour System management

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

Stop in the name of EMV! Is merchant regulation breaking your heart? April 4, Amegy Bank, a division of ZB, N.A. Member FDIC

Stop in the name of EMV! Is merchant regulation breaking your heart? April 4, Amegy Bank, a division of ZB, N.A. Member FDIC Stop in the name of EMV! Is merchant regulation breaking your heart? April 4, 2017 Introductions Ana Chandler AVP, Treasury Management Sales Julie Fairbanks VP, Merchant Sales William (Bill) Rogers VP

More information

State of Mobile Commerce. Q

State of Mobile Commerce. Q State of Mobile Commerce. Q4 2014. JANUARY 2015 Executive Summary. Mobile commerce adoption is far ahead of expectations. Globally, mobile now accounts for 30% of ecommerce transactions. It is expected

More information

CICS insights from IT professionals revealed

CICS insights from IT professionals revealed CICS insights from IT professionals revealed A CICS survey analysis report from: IBM, CICS, and z/os are registered trademarks of International Business Machines Corporation in the United States, other

More information

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) A Guide to Leveraging Privileged Account Security to Assist with SWIFT CSCF Compliance Table of Contents Executive Summary...

More information

Protect Your Data the Way Banks Protect Your Money

Protect Your Data the Way Banks Protect Your Money Protect Your Data the Way Banks Protect Your Money A New Security Model Worth Understanding and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints

More information

Scam Call Trends and Projections Report

Scam Call Trends and Projections Report Scam Call Trends and Projections Report Fall 2018 While the scam call epidemic continues to grow, consumers are actively searching for ways to protect themselves against annoying and often fraudulent calls.

More information

As Enterprise Mobility Usage Escalates, So Does Security Risk

As Enterprise Mobility Usage Escalates, So Does Security Risk YOUR SECURITY. CONNECTED WHITE PAPER As Enterprise Mobility Usage Escalates, So Does Security Risk Even as more organizations embrace the use of mobile devices by employees and customers to access services

More information

The US Contact Center Decision-Makers Guide Contact Center Performance. sponsored by

The US Contact Center Decision-Makers Guide Contact Center Performance. sponsored by The US Contact Center Decision-Makers Guide 2013 Contact Center Performance sponsored by INTRODUCTION AND METHODOLOGY The "US Contact Center Decision-Makers' Guide (2013-6 th edition)" is the major annual

More information

WHITE PAPER THE SOCIAL MEDIA FRAUD REVOLUTION A STUDY OF THE EXPANSION OF CYBERCRIME TO NEW PLATFORMS

WHITE PAPER THE SOCIAL MEDIA FRAUD REVOLUTION A STUDY OF THE EXPANSION OF CYBERCRIME TO NEW PLATFORMS WHITE PAPER THE SOCIAL MEDIA FRAUD REVOLUTION A STUDY OF THE EXPANSION OF CYBERCRIME TO NEW PLATFORMS Social media platforms have become one of the most visible and fastestgrowing technologies in the last

More information

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Using Threat Analytics to Protect Privileged Access and Prevent Breaches Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers

More information

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION CONTENTS: Enterprise Mobility Strategy and BYOD Policies Endpoint Vulnerabilities and Challenges Conclusion For several decades,

More information

The Hidden Costs of Free Database Auditing Comparing the total cost of ownership of native database auditing vs. Imperva SecureSphere

The Hidden Costs of Free Database Auditing Comparing the total cost of ownership of native database auditing vs. Imperva SecureSphere Comparing the total cost of ownership of native database auditing vs. Imperva SecureSphere Executive Summary To achieve compliance for regulatory mandates, many organizations turn to the free auditing

More information

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems WHITEPAPER Vulnerability Analysis of Certificate Validation Systems The US Department of Defense (DoD) has deployed one of the largest Public Key Infrastructure (PKI) in the world. It serves the Public

More information