Cybersecurity and the Role of Mobile Financial Transactions. Jackie McCarthy Director, Regulatory Affairs NCSL Capitol Forum December 5, 2016

Similar documents
Best Practices Guide to Electronic Banking

Mobile Apps - Privacy and Policy Issues

Emerging Risks in Emerging Payments

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Information Security BYOD Procedure

Mobile Banking: Boldly Go WNOHGB

2017 RIMS CYBER SURVEY

The Wireless Industry: Collaborating for an Accessible Ecosystem. m-enabling Summit 2014 Matthew Gerst CTIA The Wireless Association

Connected & Smart Home Research Package

FFIEC Guidance: Mobile Financial Services

Consumers Use of Mobile Financial Services 2015

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

Interpreting the FFIEC Cybersecurity Assessment Tool

Mobile Security / Mobile Payments

Safety and Security. April 2015

Securing Institutional Data in a Mobile World

Mobile Banking FAQ. 1 P a g e 1 0 / 1 9 /

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Cyber Attacks & Breaches It s not if, it s When

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Google Identity Services for work

Who What Why

Business-Class Next Generation Mobile Data Services

Cybersecurity Risk Management Guide for Voluntary Use of the NIST Cybersecurity Framework

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

Century Bank Mobile. Android and iphone Application Guide

Mobile Banking and Payments Emerging Trends and Opportunities

Paying. on the go: Mobile payments slowly catch on in the United States

Choosing the Right Cybersecurity Assessment Tool Michelle Misko, TraceSecurity Product Specialist

Global Prepaid Card Market with Focus on The United States ( ) April 2016

Transforming Commerce: Mobile Wallets & LBS

Your Online & Mobile Banking Guide

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Cybersecurity and Data Protection Developments

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

Federal Mobility: A Year in Review

Bring Your Own Device

Mobile Device Management: A Real Need for the Mobile World

Legal and Regulatory Developments for Privacy and Security

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

Mobile Security and Public Networks

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C

RBI GUIDELINES ON CYBER SECURITY AND RAKSHA APPROACH

HSBC INTRODUCES A SOCIAL P2P PAYMENT APP TO HONG KONG Easy to use and available to everyone

NorthStar Bank Mobile Banking

MOBILE BANKING. Self Service FAQs

Session 2: Understanding the payment ecosystem and the issues Visa Europe

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Federal Reserve Bank 2016 Mobile Banking & Payments Survey

Mobile software security Building trust in mobile apps

Mobile Commerce and Mobile Payments

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS

Credit Card Data Compromise: Incident Response Plan

Red Flags Program. Purpose

Mobile Banking Resource Guide

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

The Future of the Mobile Wallet: Barriers and opportunities for the 2012 next stage of the mobile payment revolution 2015.

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

Get to Know Your Tablet

How Mobile is Reshaping Payments

Apple Pay - Frequently Asked Questions

Javelin s Top Financial Institutions for Mobile Banking in 2013

Broadband Opportunities and Challenges in the United States

Mobile Payments. Moving at the Speed of Innovation. Eric Kuhn, Enterprise Digital Product Development April 2017

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Driving Canada s digital future

Cyber Partnership Blueprint: An Outline

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

Payment Services Group

The future of mobile banking

Testimony of Gerard Keegan CTIA. Before the South Carolina Joint Bond Review Special Subcommittee July 26, 2018

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

WiFi Security User Guide

Perspectives from the U.S. Federal Communications Commission: Lessons Learned on ICTs in Disaster Prevention and Relief

Google 2 factor authentication User Guide

POSITION DESCRIPTION

Natural Security Alliance

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

Digital Crime and Cybersecurity. Scott D. Ramsey, Managing Director May 2017

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS

Ouachita Baptist University. Identity Theft Policy and Program

BIG IDEAS FOR SmAll BuSInESS:

Cybersecurity in Higher Ed

Mobile Banking. Monticello Banking Company. User Guide for Customers. May 24, 2011

Cybersecurity Overview

The Office of Infrastructure Protection

Datacentre Infrastructure insight and market forecast,nigeria

Web Cash Fraud Prevention Best Practices

MOBILE LOCATION-BASED SERVICES

Mobile Banking Frequently Asked Questions

Extending Enterprise Applications to Mobile - Key Considerations. Zensar Technologies Sep 2011

Mobile Apps. How do I download Austin Bank Mobile to my phone?

CYBER SOLUTIONS & THREAT INTELLIGENCE

Target Breach Overview

Evolving Mobile Payments Landscape: An MPIW Update

Purchase Intentions Spring 2013 EMEA

Transcription:

Cybersecurity and the Role of Mobile Financial Transactions Jackie McCarthy Director, Regulatory Affairs NCSL Capitol Forum December 5, 2016

Outline About CTIA and wireless s role in payments Mobile Payments Types and Trends Key Players Regulatory Issues & Initiatives Focus on Authentication Mobile Cyber Tips and Lessons Learned

About CTIA Non-profit membership association representing the wireless industry (carriers, device makers, vendors and app developers) Advocates at all levels of government Coordinates industry initiatives & outreach to brands and entrepreneurs in the retail/payments/banking sector through our Mobile Financial Services and Cybersecurity Working Groups

Global Mobile Data Traffic Drivers By 2019: Mobile Momentum Metrics More Mobile Users More Mobile Connections Faster Mobile Speeds More Mobile Video 2014 2019 4.3 Billion 2014 2019 7.4 Billion 11.5 Billion 2014 2019 1.7 Mbps 5.2 Billion 4.0 Mbps 2014 2019 55% of Traffic 72% of Traffic Source: Cisco VNI Global Mobile Data Traffic Forecast, 2014 2019

Types of Mobile Payments Mobile Wallets (payment info communicated via secure near-field communications) Apple Google Samsung Card Networks like MasterCard Mobile Acceptance (Square) Retailer or Bank App (Starbucks) Mobile Web Browser Peer-to-Peer Transfers (Venmo)

Mobile Payments Market Data & Observations 2011: Google Wallet; 2014: Apple Pay, Samsung Pay US in-store mobile payment volume will reach $75B in 2016, with 80% compound annual growth rate until 2020 (estimated $503B volume)(business Insider) 39% of all US mobile users made a mobile payment in 2015 (Federal Reserve Bank) Market fragmentation and consumer acceptance are barriers, but growth continues Loyalty and affinity programs spark consumer adoption

Key Wireless Players in Mobile Payments Carriers: Provide robust wireless broadband coverage and network security services. Device Makers: Manufacture smartphones and other wireless devices (like wearables) as chip, battery and radio elements evolve Operating Systems: Mobile software ecosystems, each with their own mobile payments features, with security features like app onboarding management, permissions management and developer outreach Apps: A maturing marketplace for app tools and features to process secure data (including payment info) more effectively.

Regulatory Issues & Initiatives July 2016: CTIA and 16 wireless companies announce Smartphone Anti-Theft Voluntary Commitment as part of the CTIA Consumer Code. CTIA maintains a stolen phones database with unique IDs of phones reported lost/stolen. All smartphones will include anti-theft tool with capability to remotely wipe user data and render smartphone inoperable to an unauthorized user. The communications, financial services, retail and other sectors share cybersecurity info in a safe environment via NIST s Cybersecurity Framework, which encourages industryled convening with public-sector participation (DHS, FCC, Treasury, financial services regulators).

Focus on Authentication NIST is considering the impact of two-factor authentication measures to verify user identity for consumer-facing sites like SSA and VA. Many of these agencies use SMS/text messaging for verification measures to accountholders, as SMS is widely used across consumer segments, even among nonsmartphone users. According to our research, half of consumers have used mobile to validate their ID, and 87% say mobile authentication is very/somewhat easy to use.

Mobile Cybersecurity Tips & Lessons Learned Use good mobile cyber hygiene to reduce risks. Update operating systems and apps promptly. Don t click on suspicious links. Use particular caution when surfing the Web on public wi-fi. Download official security apps. Use a device password. Promptly alert carrier when device is lost or stolen. Train staff on indicators of social engineering/fraud (spike in account activity, high numbers of failed attempted logins). Implement Mobile Device Management (MDM) systems for enterprise users Use two-factor authentication (as described earlier) to verify accountholder identity and limit risk of identity theft/fraud.

Executive Committee Meeting