A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

Similar documents
Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS

Accelerating growth and digital adoption with seamless identity trust

Fraud Update: Why Fraudsters Love Wires and How to Stop Them. Luis Rojas, Director, Product Management WesPay 2014

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

How. Biometrics. Expand the Reach of Mobile Banking ENTER

ID Theft and Data Breach Mitigation

paladin vendor report 2017

The most extensive identity protection plan available

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities

Maintaining Trust: Visa Inc. Payment Security Strategy

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Target Breach Overview

WHITE PAPER Fighting Mobile Fraud

ISACA West Florida Chapter - Cybersecurity Event

The Revenue Mindset Shift Addressing false positives. Sam Hartung Whitepages Pro, Partnership Risk Manager

Cyber Insurance: What is your bank doing to manage risk? presented by

Personal Cybersecurity

Nuno Pestana, WeDo Technologies

Mobile Security / Mobile Payments

Keep the Door Open for Users and Closed to Hackers

Session 2: Understanding the payment ecosystem and the issues Visa Europe

Fraud Mobility: Exploitation Patterns and Insights

How Next Generation Trusted Identities Can Help Transform Your Business

Who We Are! Natalie Timpone

Stop in the name of EMV! Is merchant regulation breaking your heart? April 4, Amegy Bank, a division of ZB, N.A. Member FDIC

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

Seattle University Identity Theft Prevention Program. Purpose. Definitions

January 23, Online Banking Risk Management: A Multifaceted Approach for Commercial Customers

Healthcare HIPAA and Cybersecurity Update

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

PCI Compliance. What is it? Who uses it? Why is it important?

Fraud Risks Facing Credit Unions. ALLIED SOLUTIONS LLC SERVICE CENTER 210 East Main Street, Suite 200, Niles, MI Fax:

( Utility Name ) Identity Theft Prevention Program

Identity Theft and Account Takeover Prevention

Account Takeover: Why Payment Fraud Protection is Not Enough

White Paper. The Rise of the Mobivore: Serving the Mobile-Only User

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Defensible and Beyond

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Understanding Persistent Connectivity: How IoT and Data Will Impact the Connected Data Center

Securing Americans Identities: The Future of the Social Security Number

2010 Online Banking Security Survey:


Meeting FFIEC Meeting Regulations for Online and Mobile Banking

AND RISK ASSESSMENT IDENTITY MANAGEMENT ONLINE/MOBILE

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

TOP RISK CONCERNS MERCHANT DATA BREACHES. Presented by Ann Davidson, VP of Risk Consulting at Allied Solutions

2016 Tri-State CF Partnership Webinar Series. Cyber Crime Trends a State of the Union April 7, 2016

RSA Fraud & Risk Intelligence Solutions

Teradata and Protegrity High-Value Protection for High-Value Data

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

mhealth SECURITY: STATS AND SOLUTIONS

June 2 nd, 2016 Security Awareness

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

FAQ. Usually appear to be sent from official address

What is a mobile protection product?

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Cybersecurity The Evolving Landscape

Escalated Threats to PHI Require a New Approach to Privacy and Security Wednesday, March 2, 2016

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

ANNUAL SECURITY AWARENESS TRAINING 2012

Reduce fraud losses and improve operational efficiency with advanced fraud detection technology

The Double Edged Sword of Mobile Banking

2017 RIMS CYBER SURVEY

Altitude Software. Data Protection Heading 2018

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

Power of the Threat Detection Trinity

HIPAA Compliance discussion

Dealing with Risks in the Financial Industry

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Learning from a breach

2017 Cyber Incident & Breach Readiness Webinar Will Start Shortly

Red Flag Policy and Identity Theft Prevention Program

CYBER SOLUTIONS & THREAT INTELLIGENCE

Sales Presentation Case 2018 Dell EMC

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION

with Advanced Protection

Machine Learning and Advanced Analytics to Address Today s Security Challenges

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

BUILDING AN EFFECTIVE PROGRAM TO PROTECT AGAINST FRAUD

Microsoft Finland. Microsoft in Finland is a strong millennial, born ,000+ partners generating 8 $ revenue per each $ by MSFT

Evolution of Spear Phishing. White Paper

Vulnerabilities in online banking applications

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

Identity Proofing Standards and Beyond

Digital Transformation in Banking: What getting it right means for consumers in Asia. Research by

Protect Your Data the Way Banks Protect Your Money

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

[Utility Name] Identity Theft Prevention Program

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

Cyber Security Panel Discussion Gary Hayes, SVP & CIO Technology Operations. Arkansas Joint Committee on Energy March 16, 2016

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

Panda Security 2010 Page 1

Cybowall Solution Overview

Transcription:

A Layered Approach to Fraud Mitigation Nick White Product Manager, FIS Payments Integrated Financial Services

Session Agenda Growing Fraud Concerns Old Habits Die Hard Maneuvering through the Barriers Centralize Fraud Management 2

Growing Fraud Concerns 3

One in four US consumers have had their personal medical information stolen. 50% of those were victims of Identity Theft. Source: Healthcare Data Breaches Among US Consumers, Accenture Survey 2017 4

Identity Fraud Trends 16.8 million consumers in the U.S. affected by fraud incidences Total Fraud Losses in 2017 reached $17.0 billion Fraud losses continue an upward trend Account Takeover rose 120% Existing-Card Fraud losses declined 9% Existing-Non-Card Fraud rose 61% New Account Fraud $$$ declined 17% Existing Account Fraud rose 10.5% 5

Previously hard to come by, SSNs overtake credit and debit-card numbers to become most-breached type of PII. Source: Javelin Strategy & Research, 2018 6

Fraudsters Continue to Evolve Fraudsters continue to target the Business Sector representing 55% of overall breaches Health/Medical sector close 2nd representing 23.7% of breaches Hacking/Skimming/Phishing leads data breach schemes accounting for 60%, an increase of 3.2% over 2016 CEO spear phishing efforts or business email compromise schemes and ransomware attacks main driver 7

Phishing Example 8

Old Habits Die Hard 9

New Account Fraud Trends New Account Fraud incidences again saw large growth thanks to continued data breaches, malware, and social engineering involving compromised PII Fraud incidents rose 70% to 1.33% impacting 1.8 million victims in 2017 Account types driving this increase: New mobile phone 25%, internet payment 22% & online merchant accounts 21% Total losses decreased 16.67% from $3.6 billion in 2016 to $3.0 billion in 2017 Availability of SSNs increased dramatically in 2017 with lower cost of acquisition 10

New Account Fraud Landscape Fraudsters continue to leverage new horizons to keep their shops productive and profitable EMV liability shift has influenced the push from counterfeit card fraud to new account opening New mobile phone accounts increased from 15% in 2016 to 25% in 2017 representing a 67% YOY increase Checking or savings account experienced 58% increase. 12% in 2016 to 19% in 2017 11

Fraud Application Predictions Application fraud will continue to surge annually resulting from multiple data breaches for both Credit Card and DDA accounts Credit card expected to rise 170% in 2017 to $1.4B and increasing to $2.1B by 2020 DDA expected to rise 161% to $541M and increasing to $694M by 2020 Source: EMV: Issuance Trajectory and Impact on Account Takeover and CNP, a report by Aite, sponsored by Iovation 12

New Account Fraud Challenges Family Fraud Victim s Identity fraudulently used by relative Individuals Identity fraudulently used by self First Party Fraud Stolen Identity Victim s identity fraudulently used as result of true compromise Manufactured identity using real PII or combination of real and fake PII Synthetic Identity 13

Dissecting Synthetic ID Fraud Creating Synthetic ID relatively simple and growing trend Fraudsters seek SSN of people who don t make use of credit More than 65% top financial institutions use SSN as identifier Data breaches are primary source Fabricate name to be used with compromised SSN Create false birth dates tend to coincide appearance of fraudster in case in-person appearances required Provide untraceable or stale phone numbers by the time fraud is realized Fraudsters target the elderly and children as they are unlikely to check credit reports Many Synthetic IDs do not generate red flags as real people won t see the activity on any account created Source: The New Reality of Synthetic ID Fraud WhitePaper, Equifax 14

Maneuvering through the Barriers 15

Business Challenges Extensive identity verification processes may lead to high abandonment rates and loss of revenue Reputational risks increase with increasing fraud and customer dissatisfaction High levels of manual review drive additional abandonment and client acquisition costs Trouble meeting USA Patriot Act and red flag compliance requirements Efficient deployment of resources difficult due to high levels of false positives 16

Risk vs. Convenience New account originations continue to be the riskiest transactions with nearly 1 in 10 rejected In Q3 2016 blocked new account origination transactions grew 160% compared to Q3 2015 63% of financial institutions said they've been victims of account origination fraud 17

Prevention, Detection & Mitigation Consumer Authentication CIP, KYC & AML Compliance still require consumer PII verification Device Fingerprint Geolocation Authentication Static Biometrics Digital Identification Establish a secure channel of the device to prevent fraud Behavioral Analytics Establish holistic view of consumer to reduce friction Risk Tolerance Ensure policies and procedures define risk Velocity Anomaly Device Analysis Dynamic Biometrics 18

Centralize Fraud Management 19

What s driving fraud innovation in the payments space? U.S. drives majority of global card fraud Fraud is shifting to Card-Not- Present Rise of application fraud Counterfeit was still king in 2017 Fallback fraud challenges High percentage of valid activity ID Theft/social engineering remains a challenge False positive reduces card usage Identity theft directly tied to data breaches 20

Fraud Losses Trending Higher By 2021, card fraud worldwide is expected to total $32.96 Billion Fraudsters are using more sophisticated technology to commit fraud globally Shifting fraud trends adapt to find the least path of resistance 21

Fraud mitigation solutions for full card lifecycle The increasing ways consumer interact with payments also increases the risk of fraud Account Login A consumers access credentials can be compromised by force or friendly means Card Not Present Transaction Online and mobile transactions should require a step up authentication when a transaction is risky Card Reissuance Cards being sent out need to go to the correct place to stop fraud before it happens Origination Validating consumer at time of application is just the start and allows the ability to capture key insight to the consumer Card Present Transaction Typical fraud has been reduced by EMV but new tactics are being used Address Change Fraudsters attempt to change address to aide in theft and the ability to confirm the change is correct 22

Fraud Solutions Landscape As the complexity of payments increases so does the demand for new fraud solutions Attack Types New Account Fraud Account Takeover Internal Fraud Payments Fraud Mitigation Categories Authentication Consumer Engagement Post Transaction Transaction Monitoring Data Analysis Solutions in the Market Business Intelligence Biometrics Malware Detection Dedicated Analyst Fraud Mitigation ANI Spoofing Device Authentication Compromised Cards Transaction Warranty Associations ID Verification Travel Predictive Analytics Notification Global Rules Dynamic Jailbreak Root Detection Consumer Controls Custom Rules Employee Fraud OFAC CAMS Alerts Transaction Monitoring Detection 2-way Messaging Automated Chargeback Machine Learning 23

Enterprise Strategy for Omni-Channel Protection Leverage each channel s unique processing to create a holistic view to fraud mitigation Fraud strategy across multiple product lines including credit, debit, prepaid, & merchant Create a forum to allow various fraud analyst groups to talk and share Identify gaps in business lines to start the solution process Combine various fraud roadmaps to drive into a single through line 24

OnlyID: Smarter authentication for digital interactions One unique digital identity that authenticates consumers across their personal network of financial institutions and businesses all without passwords Mobile Application Improve consumer experience across multiple channels: Secure communication channel between consumer s digital device and businesses ONLINE MOBILE CALL CENTER Strengthen security reduce fraud Treat customers like a known entity Reduces friction / abandonment Provide instant alerts to consumers Robust Data + Predictive Analytics Over 800M consumer records + device data predicts likelihood of identity match or fraud Authentication Services Range of identity verification services that authenticate a consumer in real time 25

OnlyID: Smarter authentication for digital interactions An intelligent network of authenticated consumers who use a universal digital representation of their identity to interact with businesses in the network, and which provides real-time insights for context-based authentication decisions for each interaction. 26

OnlyID: Log-in Use Case How an existing consumer logs into an account online removal of password frustration Bank Website 1 User initiates login activity with the bank via the website or mobile app 5 Your customer proceeds 2 The OnlyID solution creates a risk score based on identity & authentication analytics Access Device(s) (Laptop, PC, tablet, phone) OnlyID Network Authentication Device (smart phone) 4 Your customer accepts the OnlyID push notification Authentication request pushed to user s device via secure, encrypted channel (not public SMS) 3 Web channel Secured channel 27

A Layered Approach to Fraud Mitigation Thank You Nick White Nick.White@FISGlobal.com