Data Breaches in Payments Systems- Roles and Best Practices for the Public and Private Sector Response Don Rhodes Director Risk Management Policy American.

Slides:



Advertisements
Similar presentations
Ziv Cohen – Director, EMEA
Advertisements

Identity theft Phishing Reshipping thief * All a thief needs are a Social Security # and a resume to steal a job seeker's identity. * fake A Social Security.
CORPORATE ACCOUNT TAKEOVER & PAYMENTS FRAUD WHAT IS HAPPENING NOW? SEPTEMBER 2014 VERSION 3.
Faces of Fraud: What Every Institution Should Know Presented by: Tom Field Editorial Director Information Security Media Group: BankInfoSecurity.com CUInfoSecurity.com.
Malware and ACH/EFT Fraud
7 Effective Habits when using the Internet Philip O’Kane 1.
Consumer Authentication in e-Banking & Part 748 – Appendix B Response Program Catherine Yao Information Systems Officer NCUA.
Crime and Security in the Networked Economy Part 4.
Corporate Account Takeover Presented by : Jim Vogt, CFE, CTP.
Cyber Crime Trends A “State of the Union”.
CUTTING OFF THE HYDRA HEADS OF ACH WIRE FRAUD Presented by: Eigen Heald, MsIA, CISA, CISSP, CGEIT, CEH, GCFA.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Payment Fraud Trends : What Can you do? Protect Yourself and Your Business from Financial Fraud.
INFORMATION SECURITY UPDATE Al Arboleda Chief Information Security Officer.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
INTERNAL AUDIT - ACCOUNTS RECEIVABLE AND COLLECTIONS AUDIT University of Washington August 11, 2011 Kim Herrenkohl, Director Western Washington University.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Saudi Arabian Monetary Agency “SAMA”
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
Lessons Learned from a Breach Eric van Wiltenburg University of
Cyber Security & Fraud – The impact on small businesses.
Onebeaconpro.com t f Cyber Liability Insurance Coverages and Trends Affecting Community Banks Craig M. Collins President,
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Malware Targets Bank Accounts GAMEOVER!!. GameOver Cyber criminals have found yet another way to steal your hard-earned money: a recent phishing scheme.
The evolution of eCrime and the remote banking channels Presentation to the RHUL MSc Information Security Summer School 9 September 2013 Dom Lucas.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Fraud and Risk in the Electronic Payment Space Michelle Marshall-Thompson VP, Fraud/Risk Officer FirstMerit Merchant Bankcard.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Fraud in today’s world September 18, What do these numbers represent?
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
INTERNAL AUDIT - ACCOUNTS PAYABLE AUDIT University of Washington August 11, 2011 Kim Herrenkohl, Director Western Washington University Office of the Internal.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
U.S. Department of Homeland Security United States Secret Service MCPF PRESENTATION Evolving Financial CrimeTrends & The Gateway ECTF ASAIC Doug Roberts.
Combating Constantly Evolving Advanced Threats – Solution Architecture Mats Aronsson, Nordic Technical Leader Trusteer, IBM Security.
Working with the banking sector to prevent and detect criminal money flows on the Internet Dave O’Reilly, Chief Technologist, FTR Solutions Co-funded by.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
What do these numbers represent?
Consumer Authentication in e-Banking & Part 748 – Appendix B Response Program Catherine Yao Information Systems Officer NCUA.
Combating Identity Fraud In A Virtual World
Presented by: Assistant Superintendent Debra Thompson
Antisocial use of ICT and Computer Fraud
CONFERENCE OF WESTERN ATTORNEYS GENERAL
Report Phishing Forward phishing s to
What every consumer should know
Malware, Phishing and Network Policies
بعض النقاط التي تؤخذ في الحسبان عند تقييم الاستثمارات الزراعية
Report Phishing Forward phishing s to
The Global Challenges of Cybersecurity and Digital Terrorism
Anatomy of a Large Scale Attack
Copyright 2005 Prentice- Hall, Inc.
NCUCA Fraud and Risk Education April 17, 2019
Anatomy of a Common Cyber Attack
Presentation transcript:

Data Breaches in Payments Systems- Roles and Best Practices for the Public and Private Sector Response Don Rhodes Director Risk Management Policy American Bankers Association Risk Management

Agenda ▪ Corporate Account Takeover ▪ Zeus Trojan ▪ Best Practices ▪ ABA Efforts Risk Management

Spear Phishing

Risk Management Spear Phishing

Risk Management Spear Phishing

Risk Management Banking Trojans in the News Silver Tail Systems

Risk Management What Happened in Kentucky? County treasurer had Zeus malware on his PC Criminals stole credentials and logged in to bank accounts from treasurer’s PC  Reconnaissance used to plan theft  Mule recruitment pretending to be CareerBuilder  Created mules as fictitious employees  Mules receive $9700 and sent $9200 to Ukraine via Western Union More than 25 <$10,000 wire transfers /Total of $415k stolen Silver Tail Systems

Risk Management Business Exploit

Risk Management Best Practices 1. Understand what data is most sensitive to your business 2. Know where this sensitive data resides 3. Understand your risk model 4. Select the appropriate controls based on policy, risk, and where sensitive data resides 5. Manage security centrally 6. Audit security to constantly improve ©2009 RSA Security Inc.

Risk Management Best Practices

Risk Management ABA Efforts ▪ National Card Fraud Task Force ▪ Information Security Working Group ▪ Risk Management Forum April 28-30, Renaissance Vinoy, St. Petersburg, FL

Data Breaches in Payments Systems- Roles and Best Practices for the Public and Private Sector Response Don Rhodes Director Risk Management Policy American Bankers Association Risk Management