Mastercard® Threat scan

Slides:



Advertisements
Similar presentations
© 2014 Fair Isaac Corporation. Confidential. This presentation is provided for the recipient only and cannot be reproduced or shared without Fair Isaac.
Advertisements

Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Session 4: Data Privacy and Fraud Moderator: Bill Houck, Director, Risk Management, UATP Panelist: Peter Warner, EVP, Retail Decisions Cherie Lauretta,
Vice President, e-Business Development Dubai United Nations Conference on Trade & Development Conference on Electronic Commerce.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes.
Website Hardening HUIT IT Security | Sep
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Academy of Risk Management | Innovate. Collaborate. Educate. Fraud Management Solutions Innovative Products & Thought Leadership.
MasterCard Site Data Protection Program Program Alignment.
General Awareness Training
PCI DSS Readiness Presented By: Paul Grégoire, CISSP, QSA, PA-QSA
What does “secure” mean? Protecting Valuables
CREDIT CARD FRAUD. TYPES OF CREDIT CARD FRAUD Counterfeit credit card use. Card lost or stolen by the card holder. Fraud committed without the actual.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
KASPAR T., SILBERMANN M., PAAR C. (2010) FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, VOLUME 6052, PP All You Can Eat or Breaking a Real- World Contactless.
Mercury Program Margin Management Tool (MMT) 10-January-2014.
1 American Recovery and Reinvestment Act of 2009: Challenges Facing the Department of Transportation and the Office of Inspector General’s Strategy for.
SMARTER. TOGETHER. The Mobility of Fraud Michael Loox, CFI Director of Loss Prevention & Safety Coffee Bean and Tea Leaf David Johnston.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Hot Topics in Information Security Rick Shaw – President, CorpNet Security, Inc. Mick Johannes – CTO, CorpNet Security, Inc.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
Why SIEM – Why Security Intelligence??
Confidential and Proprietary - NOT TO BE DISTRIBUTED WITHOUT THE EXPRESS WRITTEN PERMISSION OF BANK OF AMERICA MERCHANT SERVICES. ASTRA EMV Review/Best.
Online Decision Process
Global View MasterCard Keith Groves, VP Customer Fraud Management MasterCard Franchise Integrity.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Merchant Services for Website Paycron. About Paycon Paycron is purposive in meeting immediate solutions in crafting merchant account services and credit.
2016 FRAUD.
Protecting Your Assets By Preventing Identity Theft
Mastercard® Automatic Billing Updater
Auditing Concepts.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
3 Do you monitor for unauthorized intrusion activity?
Regular Payments First and Subsequent Payments
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
Payment card industry data security standards
Comprehensive Security and Compliance at an Affordable Price.
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Automating Security Frameworks
Fraud Prevention Solutions Make it secure, keep it simple!
Cybercrime: Mitigation Challenges
Cyber Security: State of the Nation
Errors, Fraud, Risk Management, and Internal Controls
Introduction to a Security Intelligence Maturity Model
Updating the Value Proposition:
CMGT 431 Competitive Success/snaptutorial.com
CMGT 431 Education for Service-- snaptutorial.com.
CMGT 431 STUDY Lessons in Excellence--cmgt431study.com.
CMGT 431 Teaching Effectively-- snaptutorial.com.
Healthcare Cloud Security Stack for Microsoft Azure
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Security Essentials for Small Businesses
David J. Carter, CISO Commonwealth Office of Technology
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Chip & Pin and Apple Pay: Vulnerabilities of the Changing Payment Systems Jay Isaacson.
Healthcare Cloud Security Stack for Microsoft Azure
Threats Facing Industry –
The MobileIron® Threat Detection difference:
3 Do you monitor for unauthorized intrusion activity?
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Mastercard® Threat scan
Mastercard® Automatic Billing Updater
It Runs In The Family Fraud
3 Do you monitor for unauthorized intrusion activity?
Presentation transcript:

Mastercard® Threat scan Limit fraud exposure by assessing vulnerabilities in authorization networks Mastercard® Threat scan Issuer authorization networks are continually at risk of exploitation. Threat Scan assesses issuer production authorization networks for vulnerabilities that can expose them to criminal attacks, providing network insights that can help issuers realize fewer fraud losses with a proactive approach to fraud prevention. Fraudsters continue to find points of vulnerability in issuer networks Fraudsters are finding ways around seemingly secure authorization networks. It is estimated that 8% of all fraud losses globally are attributed to weaknesses in issuers’ authorization networks.1 By 2020, 60% of enterprise security budgets will be allocated to rapid detection and response approaches.2 Issuers may face challenges implementing in-house network testing efforts Issuers need to assess vulnerabilities and gaps in their production authorization networks to: Learn from past fraud attacks by ensuring proper authorization validation is in place to prevent against future attempts Discover emerging fraud trends that expose their network to risk Ensure their network is functioning properly after a development release Exploitation of issuer networks warrants additional safety measures. However, issuers may lack the expertise, support staff, time, budget or commitment to develop and perform tests to assess network safety. Over 1,530 issuers have experienced 62K+ fraudulent cryptograms this year meant to exploit gaps in authorization networks. If these had been successful, issuers would have lost > $6.7 million.3 8% of all fraud losses are attributed to weak authorization networks1 1. COGNIZANT. SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS. 2016. 2. GARTNER. SHIFT CYBERSECURITY INVESTMENT TO DETECTION AND RESPONSE. 2017. 3. MASTERCARD DATA WAREHOUSE. 2016.

Mastercard Threat Scan April 6, 2019 Mastercard Threat Scan Identifying vulnerabilities within issuer authorization networks Threat Scan assesses issuer production authorization networks for vulnerabilities to fraud by emulating known criminal transaction behavior against a number of actual and theoretical vulnerabilities— highlighting potential points of exploitation for issuers. Issuers can: Gain critical insights into their authorization network—enabling a greater understanding of vulnerabilities and gaps in authorization security that require additional attention. Reduce fraud losses and preserve brand integrity by assessing vulnerabilities in their host authorization networks before exploitation can occur. Threat Scan offers a pragmatic way for issuers to identify gaps in authorization security by conducting assessments within production vs. testing environments. Threat Scan helps issuers find vulnerabilities that can expose them to criminal attacks such as: PIN manipulation Pre-play attacks Relay attacks Counterfeit fraud Card-not-present (CNP) fraud Lost or stolen card (Wedge) attacks Replay attacks (e.g., cryptogram replay) Fraudster-induced exception processing Cross-contamination fraud Implementing is easy To enroll, issuers must simply agree to terms and conditions on Mastercard Connect®. With no additional coding required, issuers can deploy and manage Threat Scan via Mastercard Connect®. Issuers… Perform their own comprehensive set of assessments on their host production network based on account criteria Control assessment frequency and timing, performing them at their convenience Use accounts they have issued and card readers/devices they support Receive immediate detailed results via Scan Session Reports available via the Threat Scan application on Mastercard Connect® For more information, contact your Mastercard account representative.