Gift Card Risk Mitigation – Presentation A

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
IAPP CONFIDENTIAL Insider Leakage Threatens Privacy.
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
Springfield Technical Community College Security Awareness Training.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Identity Fraud Prevention 1 Copyright Identity Management Institute®
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
About ONLINE Industry leader for more than 50 years Headquartered in North Carolina Originally a small merchant credit bureau In 1997, focus shifted from.
Online Identity Authentication and Data Broker SNAP Director’s Conference September 23, 2013.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
1 CSI COMPLIANCE AWARENESS TRAINING ANTI MONEY LAUNDERING July 2004 This is confidential proprietary and trade secret information of American Express Travel.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Ecommerce Applications 2009/10 Session 31 E-Commerce Applications E-payment.
Detecting, Preventing, and Mitigating Identity Theft
House Committee on Business and Industry House Bill Implementation of Closed Account Notification System Texas Department of Banking April 22, 2008.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © 2014 CUNA Mutual Group, All Rights Reserved. Understanding Cyber Insurance.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Phishing: Trends and Countermeasures Blaine Wilson.
Fraud and Risk in the Electronic Payment Space Michelle Marshall-Thompson VP, Fraud/Risk Officer FirstMerit Merchant Bankcard.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
1 Fast, secure checkout across the Web. 2 Opportunities in E-Commerce * 2006 State of Retailing Online, Shop.org/Forrester 2006 Consumer Purchases by.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Security Mindset Lesson Introduction Why is cyber security important?
Improve Your Experience ExpressRelease Debit Card.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Do you know who your employees are sharing their credentials with
Fraud Mobility Ken Meiser VP- Identity Solutions.
Data protection headaches: GDPR, brexit AND perimeter risk
EMV® 3-D Secure - High Level Overview
Jack J. Bensimon Countering Identity Theft and Synthetic Identities:
Own Your Identity.
Security Threats Haunting the E-Commerce Industry. How Can Security Testing Help?
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Partnering to Minimize the Impact of Data Compromises
Andy Hall – Cyber & Tech INSURANCE Specialist
Who Uses Encryption? Module 7 Section 3.
Threat landscape financial sector
Red Flags Rule An Introduction County College of Morris
Cyber Trends and Market Update
Own Your Identity.
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Protecting Your Company’s Most Valuable Asset
Clemson University Red Flags Rule Training
Considerations for Cybersecurity and Data Security in Today’s World
Forensic and Investigative Accounting
Business Compromise and Cyber Threat
“Credit score vocabulary”
Company Name | Phone Number | Website | Address
A Secret Service Perspective on Credit Card Fraud
Getting the Green Light on the Red Flags Rule
Wolves of the Internet: Where do fraudsters hunt for data online?
Presentation transcript:

Gift Card Risk Mitigation – Presentation A Presented by: Richard Corso #RGCAForum2017

2017 Confidential – Proprietary Information Gift Card Risk Mitigation A Quantum Step in Online Fraud Detection & Prevention 2017 Confidential – Proprietary Information

Data Breach’s & Online Fraud Gift Cards Purchases are a Target Data Breach’s & Online Fraud Breached Record Data by Year In ‘000,000 Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Wolfe, LLC Who We Are Holding Company founded in 1995 Jason Wolfe – Founder & CEO Current Brands: Past Companies Sold to Blackhawk Network in 2016 Sold to Undertone 2012 Sold to Digital River in 2006

National Cyber Forensics Training Alliance Partnership Searchable Database for Fraud Prevention NCFTA is a 15 year old non-profit working closely with US Federal & International law enforcement, financial institutions, & retailers One of the most recognized & respected cybercrime research and prevention organizations in the world Feb 2015: Attorney General & Secretary of Homeland Security issues guidance for Federal Law Enforcement to submit compromised credentials to the NCFTA Nearly 1 Billion verified records of compromised credentials Data collected from: Law Enforcement The Dark Web Financial Institutions Retailers

1. Compromised Credentials Searchable Database Real-time access to ~1 billion records 1. Compromised Credentials Searchable Database Query Options: Possible Return Matches: Risk Score: Email Credit Card Bank Account IP Address Email Credit Card SSN IP Address Name Address DOB Password Exposure PII Data is NOT Exposed Data accessible via API or Manual search Scores based on: Data category (i.e. SSN & Password Exposures are higher risk) Number of records found Exposure date

2. Universal Risk List Searchable Database Real-time Shared Access to Known & Suspected Bad Actors 2. Universal Risk List Searchable Database Shared Risk List Retailer A Retailer C Chargebacks Excessive Refunds Duplicate Accounts High Risk Email/IP Flagged International Retailer B Retailer D PII Data NOT Exposed & Contributors are anonymous. Data accessible via API or Manual search Scores based on: Reason # of times reported Exposure date

3. Gift Card Incident Report Info Sharing within the Gift Card Industry 3. Gift Card Incident Report Retailer or Law Enforcement Submission Gift card #s purchased w/ stolen ccs Info requests from Law Enforcement Card program changes to impact consumers Gift Card Marketplace Respond with relevant info Remove exposed gift cards Identify & block the seller from future transactions Outcome Protecting the consumer & brand experience Limit exposure of more bad cards entering the market Identify trends & actors across brands to engage with Law Enforcement

Case Studies Data Provided by a Large Retailer 12% Preventable on purchase date 29% total records found since transaction Most common credential compromised: Email & Password Retailer Chargeback Audit Chargebacks run through the Compromised Credentials Database September 2017 Incident Notification Notified by retailer of a large batch of gift cards acquired fraudulently

Thank You! Mark Romanelli Mark.Romanelli@wolfe.com 866-739-4914 x 9201