Devices & Your Business

Slides:



Advertisements
Similar presentations
Risk Management Case Study. agenda Firm Overview Case Study – Risk Management Q&A.
Advertisements

Background Credit reporting agencies are a key player, helping facilitate modern commerce Credit records help predict the risk of a transaction Credit.
Digital Disasters Laura M Cyberbulling Digital Reputation Identity Theft Offensive or Illegal Content Sexting Unwanted Contact.
OLD IDEA. NEW IDEA WEB-BASED TUTORING COMPANY “computer software programs”
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Information System Security Engineering and Management Additional slides for INFORMATION SECURITY RISK MANAGEMENT Dr. William Hery
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Company LOGO Internet Safety A Community Approach.
Personal Finance Spring  Allows the user to buy goods based on the promise that they will later pay for the goods  Issuers give users access to.
2015 ANNUAL TRAINING By: Denise Goff
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
CREDIT CARD FRAUD. TYPES OF CREDIT CARD FRAUD Counterfeit credit card use. Card lost or stolen by the card holder. Fraud committed without the actual.
© 2012 Datameer, Inc. All rights reserved. Page 1 © 2012 Datameer, Inc. All rights reserved. Hadoop in Financial Services Adam Gugliciello, Solutions Engineer.
Identity Assurance Services For Preventing Identity Theft Bob Pinheiro Robert Pinheiro Consulting LLC
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Protect Your Business Become a Hard Target. Where Are We Going?
Payment workshop Identity, Security and Privacy Timothy Ng
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
Understanding Credit Reports. The first question one should ask is… What is a credit report?
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Real-Time Intelligence That Matters. © 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business The Last G-20 Country To Embrace The.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Risks and Protection. What are the risks of shopping online? Spend 2 minutes identifying risks associated with shopping online card details could be stolen.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Credit Cards are a part of most American’s lives, but if you don’t know how to use them, they can really make your life more difficult Credit cards don’t.
Fraud Detection with Machine Learning: A Case Study from Sift Science
If you are a budding merchant and wants to put up an online business the first thing you need to do is to acquire a payment system wherein your consumers.
YOUR CROSS-MEDIA DATA HOW AAM and CAC CAN HELP YOU MONETIZE.
TYLER GROUP
How to be Social simple steps to grow your business using social media.
Credit Privacy Numbers and Identity Fraud Chris Montuori Director, Product Management Clarity Services.
11/16/ Know Your Customer (KYC) How well do you Know Your Customers? Identity - Compliance - Fraud.
MSN Help Phone Number and MSN Support and MSN Support
Identity Theft and Fraud
Facebook privacy policy
Identity Theft and Fraud
Sandy Porter - Strategy Director Avoco Secure
Information Security, Theory and Practice.
how to prevent them from being successful
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Gift Card Risk Mitigation – Presentation A
Do you know who your employees are sharing their credentials with
to Redefine ‘Personal’ Banking
The Next Step in the Analytics Arms Race
Jack J. Bensimon Countering Identity Theft and Synthetic Identities:
Social Media For All.
BOMGAR REMOTE SUPPORT Karl Lankford
The introduction and the essential elements of E- Commerce.
FIN 201 Education for Service-- snaptutorial.com
FIN 201 Education for Service/tutorialrank.com
Who Uses Encryption? Module 7 Section 3.
The Evolution of Money and Biometrics
My House My Rules.
Internet Safety Vocabulary
Privacy for Public Transportation
E-Commerce and Economic Forces
Friendly Fraud.
WorldWidePIN Corporation
Privacy Issues part 4 Information/data privacy
Being Aware of What You Share
SCHIP Advisory Council Duties and Responsibilities:
Barmak Meftah VP, Engineering Fortify Software
What Do You Really Get for an Excellent Credit Score?
Inside a Bad Actor’s Studio
NCUCA Fraud and Risk Education April 17, 2019
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Devices & Your Business device based fraud detection in the modern age and what to ask

Why stopping fraud is important? How much loss is incurred due to fraud? Do you know? What is ”your” fraud? Stolen Identity Call Center Impersonation CC Fraud ACH Fraud Synthetic Identity

Is this Important to your Business Do you sell anything to users? Do you take Credit Card / ACH transactions? Can users make financial changes in your business? Is the companies reputation important?

Determine Trust with a Person You Context of the conversation Reputation among friends Business Dunn & Bradstreet Rating Credit Score

Determine Trust with a Device Maybe? Communication method Device Identifier iPhone 5S v. iPhone X Android 8 v. Android One Strange Device Attributes

Trust”ed” Device? What about? Reputation of Shared Devices Wifes device v. Husbands Device Insight from other Businesses Good or Bad Device Known Bad Attributes Battery at 13% + Sensors are default + First time seen Device Orientation is face-down, Screen light is off

Trust but Verify Insight from Businesses Real-time Business Rules What type of Fraud happened? Chat Abuse CC Fraud NSF Non-Friendly Synthetic Identity Real-time Business Rules Geo-location Velocity Proxy Piercing, VPN, Anonymous Identification Device Actions / Activities Account & Device Relationships

Limit Exposure STOP sharing your users PII STOP IT! Metadata is GOLDEN with a Rules Engine

What TO expect in real-time? Device Reputation across all consumers of service Results of Business Rules designed for that transaction Communication information Device Information Location Information Associations Device and Accounts

Ask Fraud Vendors Do you need PII? Device based fraud, is it shared among all consumers? Rules engine offer Real-time results? (Under <100 ms response) Datacenter uptime? (total = uptime - planned - unplanned) What if device is not identified? What if ad blockers are used by our users?