Mastercard® Threat scan

Slides:



Advertisements
Similar presentations
© 2014 Fair Isaac Corporation. Confidential. This presentation is provided for the recipient only and cannot be reproduced or shared without Fair Isaac.
Advertisements

Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Session 4: Data Privacy and Fraud Moderator: Bill Houck, Director, Risk Management, UATP Panelist: Peter Warner, EVP, Retail Decisions Cherie Lauretta,
Vice President, e-Business Development Dubai United Nations Conference on Trade & Development Conference on Electronic Commerce.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Introducing Computer and Network Security
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes.
Website Hardening HUIT IT Security | Sep
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Academy of Risk Management | Innovate. Collaborate. Educate. Fraud Management Solutions Innovative Products & Thought Leadership.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
What does “secure” mean? Protecting Valuables
CREDIT CARD FRAUD. TYPES OF CREDIT CARD FRAUD Counterfeit credit card use. Card lost or stolen by the card holder. Fraud committed without the actual.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
KASPAR T., SILBERMANN M., PAAR C. (2010) FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, VOLUME 6052, PP All You Can Eat or Breaking a Real- World Contactless.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Chap1: Is there a Security Problem in Computing?.
1 American Recovery and Reinvestment Act of 2009: Challenges Facing the Department of Transportation and the Office of Inspector General’s Strategy for.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
SMARTER. TOGETHER. The Mobility of Fraud Michael Loox, CFI Director of Loss Prevention & Safety Coffee Bean and Tea Leaf David Johnston.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
Why SIEM – Why Security Intelligence??
Global View MasterCard Keith Groves, VP Customer Fraud Management MasterCard Franchise Integrity.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
2016 FRAUD.
Issues that Matter Notification and Escalation
Protecting Your Assets By Preventing Identity Theft
Information Systems Security
Mastercard® Automatic Billing Updater
Combating Identity Fraud In A Virtual World
Auditing Concepts.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
3 Do you monitor for unauthorized intrusion activity?
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
Payment card industry data security standards
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Fraud Prevention Solutions Make it secure, keep it simple!
Security of In-Vehicle Software
Fraud Mobility Ken Meiser VP- Identity Solutions.
Cyber Security: State of the Nation
Errors, Fraud, Risk Management, and Internal Controls
Introduction to a Security Intelligence Maturity Model
CMGT 431 Competitive Success/snaptutorial.com
CMGT 431 Education for Service-- snaptutorial.com.
CMGT 431 STUDY Lessons in Excellence--cmgt431study.com.
CMGT 431 Education for Service/tutorialrank.com
CMGT 431 Teaching Effectively-- snaptutorial.com.
CMGT 431 STUDY Education for Service- -cmgt431study.com.
Healthcare Cloud Security Stack for Microsoft Azure
Chapter 1: Information Security Fundamentals
Security Essentials for Small Businesses
David J. Carter, CISO Commonwealth Office of Technology
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Mastercard® Threat scan
The MobileIron® Threat Detection difference:
3 Do you monitor for unauthorized intrusion activity?
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Mastercard® Automatic Billing Updater
V1.1 1.
3 Do you monitor for unauthorized intrusion activity?
Presentation transcript:

Mastercard® Threat scan Limit fraud exposure by assessing vulnerabilities in authorization networks Mastercard® Threat scan Issuer authorization networks are continually at risk of exploitation. Threat Scan assesses issuer production authorization networks for vulnerabilities that can expose them to criminal attacks, providing network insights that can help issuers realize fewer fraud losses with a proactive approach to fraud prevention. Fraudsters continue to find points of vulnerability in issuer networks Fraudsters are finding ways around seemingly secure authorization networks. It is estimated that 8% of all fraud losses globally are attributed to weaknesses in issuers’ authorization networks.1 By 2020, 60% of enterprise security budgets will be allocated to rapid detection and response approaches.2 Issuers may face challenges implementing in-house network testing efforts Exploitation of issuer networks warrants additional safety measures. To address this threat, issuers need to proactively assess vulnerabilities and gaps in their production authorization hosts. Learn from past fraud attacks by ensuring proper authorization validation is in place to prevent against future attempts Discover emerging fraud trends that expose their network to risk Ensure their network is functioning properly after a development release Over 1,530 issuers have experienced 62K+ fraudulent cryptograms this year meant to exploit gaps in authorization networks. If these had been successful, issuers would have lost > $6.7 million.1 8% of all fraud losses are attributed to weak authorization networks1 1. MASTERCARD DATA WAREHOUSE. 2018. 2. GARTNER. SHIFT CYBERSECURITY INVESTMENT TO DETECTION AND RESPONSE. 2017.

Mastercard Threat Scan August 28, 2019 Mastercard Threat Scan Identifying vulnerabilities within issuer authorization networks Threat Scan assesses issuer production authorization networks for vulnerabilities to fraud by emulating known criminal transaction behavior against a number of actual and theoretical vulnerabilities— highlighting potential points of exploitation for issuers. Issuers can: Gain critical insights into their authorization network—enabling a greater understanding of vulnerabilities and gaps in authorization security that require additional attention. Reduce fraud losses and preserve brand integrity by assessing vulnerabilities in their host authorization networks before exploitation can occur. Threat Scan offers a pragmatic way for issuers to identify gaps in authorization security by conducting assessments within production vs. testing environments. Threat Scan helps issuers find vulnerabilities that can expose them to criminal attacks such as: PIN manipulation Pre-play attacks Relay attacks Counterfeit fraud Card-not-present (CNP) fraud Lost or stolen card (Wedge) attacks Replay attacks (e.g., cryptogram replay) Fraudster-induced exception processing Cross-contamination fraud Implementing is easy To enroll, issuers must simply agree to terms and conditions on Mastercard Connect®. With no additional coding required, issuers can deploy and manage Threat Scan via Mastercard Connect. Issuers… Perform their own comprehensive set of assessments on their host production network based on account criteria Control assessment frequency and timing, performing them at their convenience Use accounts they have issued and card readers/devices they support Receive immediate detailed results via Scan Session Reports available via the Threat Scan application on Mastercard Connect For more information, contact your Mastercard account representative.