Jack J. Bensimon Countering Identity Theft and Synthetic Identities:

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flag Rules: What they are? & What you need to do
My Name is Todd Davis My Social Security # is
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
How You Can Prevent Fraud at Your Bank With a Simple, Low Cost Tool A Review of the Washington Mutual Case Study.
Parachute Neighborhood Watch Presentation February 9, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Protecting Your Identity: What to Know, What to Do.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
(Geneva, Switzerland, September 2014)
Why Comply with PCI Security Standards?
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
© Copyright 2012 Pearson Education. All Rights Reserved. Chapter 10 Fraud & Internal Control ACCOUNTING INFORMATION SYSTEMS The Crossroads of Accounting.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Electronic authentication: validating and verifying customer identities and bank details Presented by: Stan Matthews & Scott Robertson 13 th November 2007.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Custom Corporate Consulting and Training Fraud: Detecting and Preventing Presented October 30, 2010 To University of Texas at Arlington Executive MBA Students.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Agents and Cross Border Issues GROUP - D. 1.How can we better manage risks with agents? What should the penalties be? 2.Agent liquidity – what are the.
Wire Fraud Prevention Training: Setting Your Organizational Structure to Mitigate Fraud Risk and Comply with Regulatory Expectations Presented by: Terri.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Risky Business Week Protecting Your Identity: What to Know, What to Do Legal Division CSAA Insurance Group, a AAA Insurer.
Mastercard Identity Check Mobile
Small Business and Personal Credit
Nick Mothershaw - Experian
Regular Payments First and Subsequent Payments
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Gift Card Risk Mitigation – Presentation A
Making Blockchain Real for Business
Own Your Identity.
When you get caught for Identity Theft
Information Security: Risk Management or Business Enablement?
Andy Hall – Cyber & Tech INSURANCE Specialist
Compliance 2017 Fall general meeting, 2016
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Own Your Identity.
Protecting Yourself from Fraud including Identity Theft
Protecting Your Company’s Most Valuable Asset
MFX CORPORATE DECK INTRODUCTION 23 February 2019.
“Credit score vocabulary”
Protecting Yourself from Fraud including Identity Theft
Loan Processing Software Introduction Loan origination process is designed to meet online lenders requirements for automated and instantaneous loan processing.
NCUCA Fraud and Risk Education April 17, 2019
Jeremy Grant Coordinator Better Identity Coalition
Presentation transcript:

Jack J. Bensimon Countering Identity Theft and Synthetic Identities: Measures to Mitigate Losses Jack J. Bensimon Financial Crime Risk Management Advisor Securefact September 22nd, 2016

What is synthetic identity theft? Involves the use of a fictitious identity in perpetrating fraud Allows thieves to create identities based on new and fictitious ID Securefact

How is synthetic ID theft executed? Credit file is created through a synthetic identity Fraudsters use fictitious identity to obtain credit Makes payments to establish credit and make purchases Securefact Jack J. Bensimon September 22, 2016

New threats: Ransomware and Social Engineering Email received by fraudster that locks you out of key data – denial of data Social engineering – compromise PC, obtaining SIN Comes from trusted sources/friends Securefact

How does this risk affect my business? Growing pervasiveness Escalating financial risk Reputational risks from breaches Regulatory risk #1 Risk issue for banks in 2016* Securefact *Source: Wall Street Journal, 2016

Fake Accounts, Real Losses *Source: Javelin Strategy and Research *Source: ID Analytics Securefact

Case Study Two cement trucks bought in Canada for $1M via bank loan Trucks are purchased through both synthetic ID and synthetic company Trucks shipped to Dubai via railcar and sold on black market Synthetic identity reported trucks stolen and collected insurance proceeds Achieved by legitimate documents via fictitious names Securefact

How to prevent doing business with fraudsters Implement effective tools to manage KYC data Effective Policies & Procedures – prevent, detect, monitor Satisfy current and future regulatory requirements Securefact

New technology to manage the process Ability to automate and standardize Prevent fraud and reduce losses Satisfy current and future regulatory needs Securefact

Securefact SIDni™ Launching Fall 2016 ID Verification Engine & Fraud Detection Tool Credit Bureau Data Utility (Telecom) Data Government Sources (Phase II) Aggregate Social Biometrics Address Validation Secure IDentity Network for Individuals FINTRAC compliant CNP* identity management tool with enhanced fraud metrics Multiple Authoritative data Verified within seconds Built to support Digital Onboarding Reduce exposure to fraud losses Simple integration Web Service via API API Delivery for Simple Integration Your Existing Processes Securefact *CNP = Customer Not Present

Summary Synthetic Identity and Identity Theft are pervasive Reputational risk linked to branding New technologies are mitigating fraud and losses Lenders not immune to regulation – KYC paramount Jack J. Bensimon Securefact