Fraud and Risk in the Electronic Payment Space Michelle Marshall-Thompson VP, Fraud/Risk Officer FirstMerit Merchant Bankcard.

Slides:



Advertisements
Similar presentations
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Advertisements

Session 4: Data Privacy and Fraud Moderator: Bill Houck, Director, Risk Management, UATP Panelist: Peter Warner, EVP, Retail Decisions Cherie Lauretta,
Learning Objectives Understand the shifts that are occurring with regard to online payments. Discuss the players and processes involved in using credit.
What we all need to know. Approval Date: April 30, 2012 Approved by: President's Council.
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
1 Credit and Risk. 2 Explain the components of the credit approval process Utilize the Risk Acceptance Grid to identify necessary paperwork for approval.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
ETA UNIVERSITY MARCH 19, 2015 Deana Rich R ICH C ONSULTING, I NC. Edward A. Marshall A RNALL G OLDEN G REGORY LLP Payments 101: Overview of the Payments.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
Red Flags Rule & Municipal Utilities
Electronic Commerce Semester 1 Term 1 Lecture 22.
Presented by : Vivian Eberhardt, Supervisor Cash and Credit Operations
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
Mitigating Risk and Improving Efficiency with Third Party Vendors – When is enough… enough? Paul Aries, RVP, Nelnet Business Solutions Ann Holland, Associate.
Joe SimonettiT-FLEx Workshop T-FLEx October Workshop The Future of Fare Collection Bank Card Transactions & Merchant Processing Joseph Simonetti October.
Around the World, Around the Corner WorldPay for Small Business.
Risk Management. Risk Categories Strategic Credit Market Liquidity Operational Compliance/legal/regulatory Reputation.
PAYMENT WITH A DEBIT-CARD Merchant swipes debit card Debit rather than credit transaction like credit card.
Office of Audit and Advisory Services Medical Campus Contact Information: Jill Baron University of Miami Tel:
Traditional and Electronic Payment Methods Chapter 3.
Internal Controls NAPPA FALL DISTRICT MEETING OCTOBER 24, 2014 LEE RAY – HUNTSVILLE UTILITIES.
Web Payments via Christopher Woods Aaron Buma. Agenda  Introduction  About it  Why to use it  Services they Provide  Seller Protection  Ebay Aspect.
Private, Secure, Guaranteed ACH Credits – The Next Generation of Online Payments Samantha Carrier, Director, eCommerce, NACHA.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
General Awareness Training
PCI: As complicated as it sounds? Gerry Lawrence CTO
2015 ANNUAL TRAINING By: Denise Goff
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
Traditional and Electronic Payment Methods Chapter 3.
Purchase decision-making research based on online transaction credit risk evaluation by zhao kunpeng xjtu 28/8.
OH 9-1 Protecting Revenue 10 OH 9-1. OH 9-2 Learning Objectives After completing this chapter, you should be able to: Identify and explain the three parts.
2014 Asia-Pacific Financial Forum Seattle, Washington July 7, 2014 Electronic Payments: Expanding Financial Access for Consumers and Businesses of Every.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Office Managers, Finance & Accounting Conference May 20 – 21, 2010 Heidi Chafe, CoBank AVP & Senior Cash Management Consultant.
TransArmorSM A Secure Transaction ManagementSM Solution
What you need to know about PCI-DSS Jane Drews Chief Information Security Officer Information Security & Policy Office
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
PAYPAL PRESENTED TO:SIR ADNAN PRESENTED BY:SAIMA ASGHAR
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
Langara College PCI Awareness Training
Click to edit Master subtitle style Internal Audit – Medical Campus Contact Information: Jill Baron University of Miami Tel:
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
IT Security in Nepal: Issues and challenges Rajan R. Pant ITSERT-NP.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Experience perspective // CPAs & ADVISORS CLUB FINANCIAL MANAGEMENT BEST PRACTICES Presented by Rick Wittgren, CPA, partner.
TYLER GROUP
Washington State Auditor’s Office Third Party Receipting Presented to Washington Public Ports Association June 2016 Peg Bodin, CISA.
ELECTRONIC PAYMENT SYSTEM
Payment card industry data security standards
NATIONAL TRANSACTION CORPORATION
Gift Card Risk Mitigation – Presentation A
Entrepreneurship Secure Ordering Presented By Mrs. Bowden.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Consider cards over cash
Consider cards over cash
Own Your Identity.
Consider cards over cash
General Counsel and Chief Privacy Officer
Red Flags Rule An Introduction County College of Morris
NHTCA New Tax Collector Training Series
Own Your Identity.
Identity Theft Prevention Program Training
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Clemson University Red Flags Rule Training
Presentation transcript:

Fraud and Risk in the Electronic Payment Space Michelle Marshall-Thompson VP, Fraud/Risk Officer FirstMerit Merchant Bankcard

General lack of understanding within the payment space “Authorizations” are not a guarantee of payment Settlement of funds to a deposit account does not ensure funds will not be retracted Inappropriate data verification

General lack of understanding of payment risks Chargeback Risks Financial Risks:  Expense of payment acceptance  Loss exposure after payment acceptance Sensitive Data Security Risks:  Human behaviors  Network risks

Opportunities for Fraud Internal Fraud External Fraud Network Breach, Data Theft, Fraud

Internal Fraud Employee Embezzlement:  Fraudulent returns  Credentials theft  Misuse of position  Most unsuspecting person

Internal Fraud Compensating Controls:  Oversight  Password protection  Policies regarding information sharing  Random Google or background searches

External Fraud Fraudulent use of card information Lost/stolen card numbers Alleged fraud Merchant financial exposure

External Fraud Compensating Controls:  Exposure of swiped, keyed & e-commerce transactions  Use of data verification: address, zip, CVV  Additional red flags  Work with banking partners

Network Security Risks PCI non-compliance Human behavior Banking credential hacks Wire fraud, sensitive data breach

Network Risks Compensating Controls:  Utilize the expertise of third parties  Work within well established guidelines  Oversight of employee responsibilities

Where To Turn If you believe your organization/entity could be vulnerable to risks reviewed today, contact me directly at , for further discussion Contact your banking institution to inquire about additional controls and risk mitigating options Don’t expect to “go it alone” - work with your partners

Thank you for attending !