Anti-Fraud Committee ICT Symposium. “ To play a core role in the growth and stability of the financial sector, through advocacy and representation; and.

Slides:



Advertisements
Similar presentations
Combating Fraud Risk in Payment Systems. 2 Defining Fraud..a deliberate act of omission or commission by any person, carried out in the course of a banking.
Advertisements

Compliance with Federal Trade Commission’s “Red Flag Rule”
EC Group, LLC Part of the NSLP team. Financial Aid Community College Enrollment Management & Student Success Strategies Pathways to College & Beyond October.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Protecting Your Identity: What to Know, What to Do.
How Communication Technologies are used in the Prevention and Protection from Child Trafficking Corey Oser, Director of Global Hotlines Program, Polaris.
How to do Business Online - Securely Presented by: Michael Gulliver First Data Regional Credit and Risk Director.
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Mexico´s financial reform objectives and current regulations in payment services February 11 th, 2015.
Risk Management. Risk Categories Strategic Credit Market Liquidity Operational Compliance/legal/regulatory Reputation.
PAYMENT WITH A DEBIT-CARD Merchant swipes debit card Debit rather than credit transaction like credit card.
Cyber Security and Fraud By: Connor Warden and Nicole Speck Social Networking Payment Cards Job Offer Scams West African False Charities.
1 Kuwait Central Agency for information technology.
Electronic Payment By: El Panda. What is an electronic payment? Electronic money (also known as e-currency, e-money, electronic cash, electronic currency,
Mobile Internet By Louise and Laura. Mobile Internet Traditionally, access to the Web has been via fixed- line services on laptops and desktop computers.
Bank Crime Investigation Techniques by means of Forensic IT
What is Outsourcing? Process Of subcontract a business function to an external third party Based on a contract: Term: 3-5 years or 10 years Service descriptions.
Developing Capacity on Water Integrity WATER INTEGRITY NETWORK Delft 31st May 2013 Francoise Nicole Ndoume Regional Coordinator Water Integrity Network,
De Nederlandsche Bank Eurosysteem Actual Developments of Payments and Securities Settlement Systems Michael van Doeveren 2nd Conference of the Macedonian.
An owner or “holder” of a credit or debit card or the person who is using a credit card to pay for goods or services CARDHOLDER.
1 CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © CUNA Mutual Group 2010 Alaska Credit Union League Annual Meeting.
Stop cyber bullying  Forms of digital communication and collaboration tools: Blog Online forum Social networking site.
Bankers Association of Trinidad & Tobago (BATT)
Mobile and Cyber Threat Issues Consumer Perspective on Uganda by Kimera Henry Richard, Chief Executive, CONSENT The Fifth Annual African Dialogue Consumer.
COMP 6125 An Introduction to Electronic Commerce Session 4: E-Commerce In Developing Countries.
E. business knowledge transfer for SMEs – experience from Lithuania Prof. Rimantas Gatautis, KTU
Protecting Your Information Assets
© 2009 National Automated Clearing House Association. All rights reserved. Industry Perspectives on Emerging Risks and Public/Private Engagement: Network.
Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White.
Irwin/McGraw-Hill 1 Operational and Technology Risk Chapter 14 Financial Institutions Management, 3/e By Anthony Saunders.
Trends in Banking. Product Innovation Investment products Gold / silver coins Marketing of insurance product Credit cards and debit cards Innovative services.
The World Bank Working for a World Free of Poverty.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 5 Electronic Commerce.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
PRESENTED AT THE STAKEHOLDERS FORUM ON QUALITY OF SERVICE AND CONSUMER EXPERIENCE LAICO REGENCY HOTEL Creating Space for Consumer Rights in.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Anika Massey.  There are three main types of business:  Traditional  Online  Transportation.
Protecting Your Assets By Preventing Identity Theft 1.
Methods of Payment Cash
Chapter 14 Internal Control, Corporate Governance, and Ethics.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit 8 Employee Theft Professor Thomas Genovese. Occupational Fraud Corruption Fraudulent Financial Statements Asset Misappropriation.
Global Digital Security Market WEBSITE Single User License: US$ 2500 No of Pages: 60 Corporate User License: US$ 4000.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Topic 4:.  As with any disruptive innovation, separating the reality from the mythical can be a challenge for any prospective customer trying to accurately.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Sharing “lessons learned:” Creating an Online Brand: from Buy-in to Execution (an integrated marketing approach) Jeanette DeDiemar, Ph.D. Executive Director,
MOBILE PAYMENTS (“M-PAYMENTS”) August 2007 Potential impact on South African banking industry Team Galahad Lionel Diakanyo Joshua Makgate Sean Rule.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Merchant Services for Website Paycron. About Paycon Paycron is purposive in meeting immediate solutions in crafting merchant account services and credit.
Welcome to our Presentation on ORACLE Flexcube & Bank Asia- Banking Technology.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Outline of this module By the end of this module, you will be able to: Understand what is meant by the term “advanced fee fraud”; Understand what is.
Protecting Your Assets By Preventing Identity Theft
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Presented by: Assistant Superintendent Debra Thompson
Protecting Your Identity:
Challenges and Successes in the Zambian ICT Security Sector
Wissam Maroun- CAMS Head Of Compliance- BBAC S.A.L
TO LAND AND ENVIRONMENTAL AFFAIRS COMMITTEE
A Secret Service Perspective on Credit Card Fraud
Norwegian Civil Society Sector and the Active Citizens Fund
How Is Digital Transformation Accelerating The Banking Industry?
Presentation transcript:

Anti-Fraud Committee ICT Symposium

“ To play a core role in the growth and stability of the financial sector, through advocacy and representation; and to facilitate the provision of the most competitive banking products and services to our customers, with integrity and transparency”

Monthly meetings to discuss:  Trends  Share Intelligence  What is on the horizon It affords – Proactivity

To Be A Household Name  Reputation- Improve the Image of BATT (Credibility)  Representation- Influence  Advocacy- Outreach and Lobby  Information-sharing and Education- Develop and utilise various channels for promoting BATT, its role and educating the public on relevant banking issues What is on the horizon

What is Skimming “The surreptitious act of copying the encoded card information off the magnetic strip of either a credit or debit card with the intent to create a cloned card to facilitate fraudulent transactions on the legitimate account” (Source - BATT)

Wire Transfer Fraud Hard Copy  Instructions via Letter Heads  Information communicated via courier  Subsequent calls to support instructions Evolved Internet – Cyber Crime  Sending instructions via  Intercepting s with payment arrangements and redirecting wire to another account, at another bank, in another jurisdiction.

Awareness Campaigns (through collaboration)  The Media  Various Chambers ~~~~~~~~~~  The risk of doing business online  Tips on how to reduce the risk of being a victim

Robust Network Infrastructure  Both Internal and External Facing Firewalls  Intrusion Detection systems  Highly Trained IT Units  Guidelines/Procedures – Online Transactions  Guidelines/Procedures – Reporting Events to the Police

Questions