Nick Mothershaw - Experian

Slides:



Advertisements
Similar presentations
Achieving online trust through Mutual Authentication.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Stephen Upton – 2 June 2005EURIM Personal Identity Working Group Secure identity – a personal view Stephen Upton Office: Mobile:
Digital Certificate Installation & User Guide For Class-2 Certificates.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
1.7.2.G1 Electronic/Online Banking & Bill Pay Take Charge of Your Finances.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
VeriSign® Identity Protection (VIP) Overview. 2 2 VeriSign Confidential Trust on the Internet is More Compelling Than Ever 1.5 billion Internet users.
ICT in Banking.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Advanced Secure Technologies Secure Document Technologies.
You. are at risk for the fastest growing crimes crime.
Stop cybercrime, protect privacy, save world. Chris Monteiro Cybercrime, dark web and internet security researcher Systems administrator Pirate / Digital.
CSCE 201 Identification and Authentication Fall 2015.
1 ©2016 Experian Limited. All rights reserved. Experian Public. ©2016 Experian Limited. All rights reserved. Experian and the marks used herein are trademarks.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
Section 5.1.  Identify types of financial services  Describe the various types of financial services.
Customer-Centric Banking The Digital Opportunity Hassan Abouzeid Group Head of Digital.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
2 PSD2- C HALLENGES AND OPPORTUNITIES Pascale-Marie BRIEN– Senior Policy Adviser.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Banking in the United States. U.S. Banking System Overview  The Federal Reserve System is the central banking system of the United States.  Regulates.
Paypal PayPal is an e-commerce business allowing payments and money transfers to be made through the Internet. With a PayPal account, you can send and.
Identity Theft It’s a crime!
Mastercard Identity Check Mobile
Identity and Access Management
Take Charge of your Finances
Sandy Porter - Strategy Director Avoco Secure
System Access Authentication
ARMORVOX - DIGITAL APP ENROLMENT
Electronic/Online Banking & Bill Pay
Authentication.
Take Charge of your Finances
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
How to Protect Yourself from ID Theft and Social Engineering
The Payment Services Directive 2 (PSD2)
Jack J. Bensimon Countering Identity Theft and Synthetic Identities:
Create Your Own Cryptocurrency Exchange – Know These Benefits.
Financial Literacy Skills
How To Use Amazon Prime Efficiently?. Amazon Prime, a paid service of Amazon, offers a number of advantages for the users. They can enjoy with two way.
Protecting Your Identity:
Chris Farmer Director of Fraud Strategy
Who Uses Encryption? Module 7 Section 3.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Consider cards over cash
European Citizens’ Initiative, Commission regulation proposal Focus on IT aspects Jérôme Stefanini DIGIT.B.2 05/06/2018.
Setting up an online account
Computer Crime and Security Measures
UCO BANK HONOURS YOUR TRUST
Chapter 5 Section 5.1.
Everything old is new again
Installation & User Guide
Threats Facing Industry –
WorldWidePIN Corporation
Protecting Your Credit Identity
Giovanni Carnovale – Regional Sales Manager Central & Eastern Europe
ELC 200 DAY 25 & 26.
Take Charge of your Finances
Company Name | Phone Number | Website | Address
Confidential, not for publication
Lesson 4.2 Banking Services and Fees
Streamlining Processes Across Retail Banking Channels
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Nick Mothershaw - Experian The Growing Tide of Risk and use of Data by Criminals

Fraud as a % of Applications FIRST PARTY

Fraud as a % of Applications FIRST PARTY – MORTGAGES

Fraud as a % of Applications THIRD PARTY ZOOM

Fraud as a % of Applications THIRD PARTY - MORTGAGES

First / Third - Product Analysis Black bars show 2014 split positon;

Fraud Type Analysis ALL PRODUCTS

Fraud Type Analysis MORTGAGES

Who are the Fraudsters? – Mosiac Analysis First Party Fraud - ALL PRODUCTS Municipal Challenge Urban Cohesion Rental Hubs

Who are the Fraudsters? – Mosiac Analysis First Party Fraud - MORTGAGES Urban Cohesion Rental Hubs City Prosperity

Age Analysis

Gender Analysis

Where does fraud occur? First Party Fraud - Mortgages

Our new FraudStats website Join the conversation on Twitter @ID_and_Fraud #FraudStats

Regulatory Challenge Payment Services Directive 2 Anti Money Laundering Directive 4 Payment Accounts Directive eIDAS Regulation EU Data Protection Regulation (GDPR) EBA Strong Customer Authentication

The problem with ID … Too many different meanings Identity (account, mindset, me) Identify Identifier Identification Identity tree starts with birth certificate Easy to get Easy to forge Easy to assume someone else’s Not linked to death records Identity checking is expensive Existence? Attributes? Authentication? Identity checking (really) isn’t yes or no Confidence Measure of effectiveness

The Challenge - Achieving the right balance Fraud Risk Mitigation Customer convenience and choice Customer Preferences Data Footprint Market Approach ü ü Vs ü ü ü For consumers with data footprint can do more online, and more instantly For less data footprint need to revert to documents and face to face checks: when this is the case make this easy; give options More and more people prefer online. Some people want a Face to Face experience. Might not be near a Branch / Outlet. Some people will use a financial advisor Branch / Outlet: support for face to face checks. Expert driven Online: offer consumer options, maximise online conversion rate. Online, Phone or Face-2-Face

Who is this? Can we trust them? RECOGNISED IDENTITY TRUSTED

Fraudsters will hide behind a digital facade. RECOGNISED Digital Anonymity IDENTITY TRUSTED

Recognised Identity Revealing “Digital Anonymity” IDENTITY RECOGNISED TRUSTED Revealing “Digital Anonymity”

Online Approach More happy customers! RECOGNISED Online Approach More happy customers! IDENTITY TRUSTED ID Validation Letter to home Send in Documents Bring Documents into Dealership Abandon Proceed Ways to access a service - Today Ways to access a service - Tomorrow Knowledge Based Questions Card / Bank Account Verification Phone call to Home/Mobile Automatic Document Verification Manual Document Verification Penny Payment Selfie Verification Letter to Home ID Validation Abandon Proceed More customers get immediate access to products Less customers abandon applications due to inconvenient processes Source of Funds validation build into the process

New ways to identify Individuals Knowledge Based Questions Penny Payment

New ways to identify Individuals Automatic Document Verification Phone call to Home/Mobile

Joining it all up Experian CrossCore

Authentication – Today and tomorrow Weak Forgotten Phished / Breached UID and Password More Secure Inconvenient Simple 2nd Factor Secure Reliable Easy to use Biometrics SMS One Time Code Finger Print Browser / App PIN Voice Landline One Time Code Face Hardware / Software Token IRIS Card Reader Heartbeat

Identity as a Service                   TODAY IDaaS What is IDaaS Experian provides all services around identity authentication and ongoing credential management. Allows organisations to concentrate on their core business Issues Reusable Identities: the consumer only has one set of credentials for use with many organisations, removing the need for 10s of user ids and passwords Org Org Collect Personal Data   Validate Identity   Verify Identity   Validate Documents   Obtain offline proofs   Manage Broker proof production   Issue & Manage Credentials   Ongoing Credential Use   Consumer Audit Trail  

Evolution of Identity Identity Providers (IdP) Identity Exchange ID VERIFIED Attribute Exchange CONSUMER DATA Information Services Providers (InSP)

GOV.UK Verify MY IDENTITY RECOGNISED TRUSTED LIVE LIVE MARCH The UK government has set up a “market” of Identity Providers When an UK citizen wishes to access government services online they will be asked to select an Identity Provider to verify their identity. Once the citizen have been verified the Identity Provider gives them a logon and other credentials to allow them to instant access other government services. LIVE Consumers choose an Identity provider based on brand and the range of ID verification options offered LIVE MARCH

So where does all this take us?

RECOGNISED Support throughout the Digital Journey Protection against First Party Fraud, ID Theft and Cybercrime MY IDENTITY TRUSTED Identity as a Service Fraud Detection FraudNet Detect Hunter CrossCore