SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
Countering Cross-Channel Fraud Threats
Dena Hamilton
  BAI Payments Connect
  March 11, 2013 — 11:00 a.m.-11:30 a.m.




                                           1
Countering Cross-Channel Fraud Threats

Detica’s - 2013 Top Three U.S. Fraud and Compliance Trends

•      Enhanced focus on the fraudster footprint
          Fraudsters were accountable for significant financial losses in 2012, as many firms overlooked key
          fraudster behavior and risk characteristics until it was too late. Institutions will need to carefully and
          consistently investigate and better understand the fraudster to better protect against financial crime in 2013 –
          reviewing history, patterns and other characteristics to provide investigators with more well rounded insight and
          create a clear view of relationships in the networks in which the fraudsters operate.


•      ACH and wire fraud remain favorite tools for organized criminals
        With FI’s seen as easy prey, 2013 will see an increased exploitation of ACH and wire fraud by
          organized criminal rings. Firms will need to invest more to develop their defenses and implement anomaly detection
          to combat both anticipated and unexpected attacks.


•      Mobile fraud matures
          Mobile fraud will finally come into its own in 2013, as criminals leverage past source-code and tested techniques to
          develop more resilient malware and gain access to high level data stored on mobile devices. FI’s will be
          challenged to protect mobile data as the number of transactions and volume of data on
          smart phones grows



© BAE Systems Detica 2013 Company Confidential                                                                                   2
Cross-Channel Fraud Definition

Federal Reserve Presentation 2009

Cross-Channel Fraud —
  “Theft from deposit accounts by way of multiple points of access —
  whether branch, automated teller machine, call center, debit card, online
  banking, ACH or wire.”
               - Dan Tobin,
                IT Examiner
                Supervision, Regulation and Credit
                Federal Reserve Bank of Boston




© BAE Systems Detica 2013 Company Confidential                                3
These Threats Are Pervasive and Relentless




© BAE Systems Detica 2013 Company Confidential   4
Why This Topic and What’s New?

            Global Evolution of                  Emergence of New Payment
            Existing Payments                     Players and Mechanisms




© BAE Systems Detica 2013 Company Confidential                              5
Why This Topic and What’s New?

                                                 The Rise of Mobile
                                                                      In the U.S.




© BAE Systems Detica 2013 Company Confidential                                      6
Why This Topic and What’s New?

                                                 The Rise of Mobile




© BAE Systems Detica 2013 Company Confidential                        7
Why This Topic and What’s New?

                                                 The Rise of Mobile




© BAE Systems Detica 2013 Company Confidential                        8
Why This Topic and What’s New?
               2012 Payments Fraud Survey Summary of Results — September 2012




Source: Payments Information and Outreach Office — Federal Reserve Bank of Minneapolis


© BAE Systems Detica 2013 Company Confidential                                           9
Why This Topic and What’s New?




Source: Payments Information and Outreach Office — Federal Reserve Bank of Minneapolis


© BAE Systems Detica 2013 Company Confidential                                           10
Why This Topic and What’s New?




Source: Payments Information and Outreach Office — Federal Reserve Bank of Minneapolis


© BAE Systems Detica 2013 Company Confidential                                           11
Why This Topic and What’s New?

• The faces of fraud are changing and evolving. Organizations are familiar
  with the traditional forms of fraud with checks and payment cards, but
  over the past year many different fraud events have made the headlines:
          •     ATM skimming sprees
          •     Multiple retail chain breaches
          •     Social networking sites infiltrated
          •     Fraudsters swapping out POS pin pad units at a favorite arts and craft retailer
          •     ACH and wire fraud with business banking clients
          •     Many targeted phishing schemes


• Because of the increase in these access points as well as the innovation
  of new electronic payment methods, criminals and their attacks are
  becoming much more sophisticated


© BAE Systems Detica 2013 Company Confidential                                                12
Regardless of the Source

In the 2012 AFP Payments Fraud and Control Survey
                    • Introduction and Key Findings:
                         “As payment options proliferate, so, too, do new twists on fraudster’s
                         schemes and techniques. Checks continue to lead as the payment type
                         most attached, even as their use dramatically declines. But as paper
                         gives way to plastic, Internet and mobile payments accelerate, and the
                         globalization of business continues to grow, the need for new
                         security models becomes ever more important”

                                         - Stephen W. Markwell,
                                           Product Executive of Treasury Services, J.P. Morgan




© BAE Systems Detica 2013 Company Confidential                                                   13
Why This Topic?
• Financial Crime Survey 2012 — Operational Risk and Regulation in
  conjunction with Detica NetReveal®:
          •     The outlook for continued investment in financial crime detection and prevention
                remains positive for 2013, with anticipated annual growth well ahead of the previous




                                                                    On average, 83% of respondents
                                                                    expect an increase in their
                                                                    financial crime and compliance
                                                                    budgets (compared to 42% in
                                                                    both 2011 and 2010), of which a
                                                                    staggering 56% predict an
                                                                    increase of more than 20%
                                                                    (compared to 14% in both 2011
                                                                    and 2010).




© BAE Systems Detica 2013 Company Confidential                                                         14
Mitigating Residual Risks

• In the current climate of advanced persistent threats, data breaches and
  malware-infected end-points, it is not surprising that information security
  stands out as a serious concern that warrants more attention




© BAE Systems Detica 2013 Company Confidential                                  15
Countering Cross-Channel Fraud

Why so hard to catch?
          • Multiple interactions with distinct touch-points
          • Forensics typically focuses on the point of the breach, not the
            interactions leading up to it
          • When accessed only for exploration, the online channel typically
            doesn’t record activity




© BAE Systems Detica 2013 Company Confidential                                 16
Countering Cross-Channel Fraud

Why is the risk growing?
          • Payments products are increasingly using multiple channels
          • Emerging payments products are being adopted by financial
            institutions
          • The increasing role of third-party processors
          • Operational, information security and legal/compliance risks may not
            be fully understood
          • Growing complexity of systems




© BAE Systems Detica 2013 Company Confidential                                     17
Detica’s Financial and Cyber Crimes Intelligence Platforms




© BAE Systems Detica 2013 Company Confidential               18
Securing a Connected World
                         A full suite of products and services to protect institutions
                                INSIDE, AT, and OUTSIDE THE PERIMETER

INSIDE THE PERIMETER
• Fraud Detection/Management
• AML/Compliance
• Cyber Monitoring and Detection
  (CyberReveal)
• Cyber Response and Remediation
• Communications Monitoring                                           INSIDE
                                                                               AT

AT THE PERIMETER
• Penetration Testing
• Secure Network Guard (SNG)                                                        OUTSIDE



OUTSIDE THE PERIMETER
• Threat Intelligence
• Cyber Defense Strategies and
  Consulting

© BAE Systems Detica 2013 Company Confidential                                                19
Offers Depth of Defense

           ENTITY ANALYTICS                                                          DETECTION SCENARIOS
    • Single view of entities                                                     • Out of the box scenarios —
    • Applies analytics to create                                                   combines rules and analytics
      electronic fingerprints / profiles                                          • Risk Scores
    • Holistic, cross-channel                                                     • Ability to incorporate external
      approach
                                                   ENTITY             DETECTION
                                                                                    models and behavioral scores
                                                 ANALYTICS            SCENARIOS




                                                  SOCIAL             ALERT AND
                                                 NETWORK               CASE
                                                 ANALYTICS          MANAGEMENT
         SOCIAL NETWORK                                                                   ALERT AND CASE
               ANALYTICS                                                                     MANAGEMENT
   • Relational approach of entities                                              • 360° view of client
   • Detect collusive behavior and                                                • Single technology platform
     hidden relationships                                                         • Alert Triage and Optimization
                                                               EXPERTISE
                                                    • Industry risk, fraud and
                                                      compliance SMEs
                                                    • Highly regarded graduate
                                                      program
                                                    • In-house data labs
© BAE Systems Detica 2013 Company Confidential
Detica Recommendations

• Single platform approach — risk, fraud, and compliance
• Integrated command and control KPIs and risk indicators
• Full solution suite — across every stage of the customer journey from
  initiation through to remediation
• Full 360° view of the customer
• Unprecedented, perceptive approach to detection and prevention
• Predefined social network analytics
• Customer-centric analytics and profiling
• Watch list management
• Enterprise case management
• Compliance reporting capabilities
• Real time and batch, proven detection and prevention industry models

© BAE Systems Detica 2013 Company Confidential                            21
Contact Details
If you have any questions or would like to find out more about Detica
NetReveal® please contact:
                                                                                                      North America Head Office
                                                                                                             BAE Systems Detica
                                                                                                              265 Franklin Street
                                                                                                                          Boston
 Dena Hamilton                                                                                                        MA 02110
                                                                                                                            USA

                                                                                                             Tel: +1 (617) 737 4170
 Dena.Hamilton@BAESystemsDetica.com                                                                          Fax: +1 (617) 737 4190

                                                                                                                 International Offices
                                                                                                                             Australia
                                                                                                                             Belgium
                                                                                                                              Canada
                                                                                                                                 Dubai
                                                                                                                               France
                                                                                                                            Germany
                                                                                                                               Ireland
                                                                                                                                  India
                                                                                                                               Poland
                                                                                                                           Singapore
                                                                                                                                 Spain
                                                                                                                     The Netherlands
                                                                                                                                    UK


netreveal@detica.com
www.deticanetreveal.com
                                                                                             © BAE Systems plc 2013. All Rights Reserved.

                                                                              BAE SYSTEMS, DETICA, NETREVEAL, Detica NetReveal are
                                                                                                      trademarks of BAE Systems plc.

                                                                        Detica Limited is a BAE Systems company registered in England and
                                                                              Wales under number 1337451. Its registered office is at Surrey
                                                                                               Research Park, Guildford, England, GU2 7YP




© BAE Systems Detica 2013 Company Confidential                                                                                                 22
References and Resources
Detica
          •     Knowledge Center — https://www.deticanetreveal.com/en/knowledge-centre.html
          •     2013 Trends — https://www.deticanetreveal.com/en/knowledge-centre/news/item/bae-systems-detica-forecasts-
                top-us-fraud-and-compliance-trends-for-2013.html
          •     Cross Channel Fraud — https://www.deticanetreveal.com/en/knowledge-centre/financial-services-collateral-
                en/general.html?task=weblink.go&id=119

AFP
          •     2012 Survey: Key Results —
                http://www.afponline.org/pub/pdf/2012_AFP_Payments_Fraud_and_Control_Survey--
                Introduction_and_Key_Results.pdf

Google
          •     Mobile Trends — http://www.thinkwithgoogle.com/insights/library/studies/our-mobile-planet-us/
          •     Mobile Banking Trends — http://www.thinkwithgoogle.com/insights/library/studies/mobile-banking-trends-2012/

Federal Reserve
         •      Payment Fraud Survey — http://www.minneapolisfed.org/about/whatwedo/payments/2012-payments-fraud-
                survey-consolidated-results.pdf




© BAE Systems Detica 2013 Company Confidential                                                                         23

Contenu connexe

Tendances

Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
Michael Solomon
 
20 Questions to ask your Cyber Carrier - Wis Banker 12-2015
20 Questions to ask your Cyber Carrier - Wis Banker 12-201520 Questions to ask your Cyber Carrier - Wis Banker 12-2015
20 Questions to ask your Cyber Carrier - Wis Banker 12-2015
Jeff Otteson
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
DFickett
 
Cybersecurity_Alert_Dec_16_2014
Cybersecurity_Alert_Dec_16_2014Cybersecurity_Alert_Dec_16_2014
Cybersecurity_Alert_Dec_16_2014
Paul Ferrillo
 
DoD Implements Broad Cybersecurity Information–Sharing Program
DoD Implements Broad Cybersecurity Information–Sharing Program DoD Implements Broad Cybersecurity Information–Sharing Program
DoD Implements Broad Cybersecurity Information–Sharing Program
Patton Boggs LLP
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
Ulf Mattsson
 

Tendances (19)

Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
20 Questions to ask your Cyber Carrier - Wis Banker 12-2015
20 Questions to ask your Cyber Carrier - Wis Banker 12-201520 Questions to ask your Cyber Carrier - Wis Banker 12-2015
20 Questions to ask your Cyber Carrier - Wis Banker 12-2015
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Cybersecurity_Alert_Dec_16_2014
Cybersecurity_Alert_Dec_16_2014Cybersecurity_Alert_Dec_16_2014
Cybersecurity_Alert_Dec_16_2014
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
Cyber Crime is Wreaking Havoc
Cyber Crime is Wreaking HavocCyber Crime is Wreaking Havoc
Cyber Crime is Wreaking Havoc
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
DoD Implements Broad Cybersecurity Information–Sharing Program
DoD Implements Broad Cybersecurity Information–Sharing Program DoD Implements Broad Cybersecurity Information–Sharing Program
DoD Implements Broad Cybersecurity Information–Sharing Program
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
 

En vedette

Financial management function bae system plc
Financial management function  bae system plcFinancial management function  bae system plc
Financial management function bae system plc
Clifford Moon
 
FDI in Defence Sector
FDI in Defence SectorFDI in Defence Sector
FDI in Defence Sector
DK Sharma
 
Global and china military industry report, 2009 2010
Global and china military industry report, 2009 2010Global and china military industry report, 2009 2010
Global and china military industry report, 2009 2010
ResearchInChina
 
BAE Tactical Vehicles Overview
BAE Tactical Vehicles OverviewBAE Tactical Vehicles Overview
BAE Tactical Vehicles Overview
Jerry Lee Davis
 
Macro diagrams and definitions
Macro diagrams and definitionsMacro diagrams and definitions
Macro diagrams and definitions
12jostma
 
Resume Mcgregor March 2016
Resume Mcgregor March 2016Resume Mcgregor March 2016
Resume Mcgregor March 2016
Arthur McGregor
 
3.4 Demand And Supply Side Policies
3.4   Demand And Supply Side Policies3.4   Demand And Supply Side Policies
3.4 Demand And Supply Side Policies
Andrew McCarthy
 
Pakistan Education Plan
Pakistan Education PlanPakistan Education Plan
Pakistan Education Plan
Minhaaj Rehman
 

En vedette (20)

2008
20082008
2008
 
Resume: Robert C. Parker, Principal Systems Engineer
Resume:  Robert C. Parker, Principal Systems Engineer Resume:  Robert C. Parker, Principal Systems Engineer
Resume: Robert C. Parker, Principal Systems Engineer
 
The Road to Enterprise Grade
The Road to Enterprise GradeThe Road to Enterprise Grade
The Road to Enterprise Grade
 
Financial management function bae system plc
Financial management function  bae system plcFinancial management function  bae system plc
Financial management function bae system plc
 
FDI in Defence Sector
FDI in Defence SectorFDI in Defence Sector
FDI in Defence Sector
 
Mission Ready PLM
Mission Ready PLMMission Ready PLM
Mission Ready PLM
 
Global and china military industry report, 2009 2010
Global and china military industry report, 2009 2010Global and china military industry report, 2009 2010
Global and china military industry report, 2009 2010
 
Mil Pac Solutions Overview
Mil Pac Solutions OverviewMil Pac Solutions Overview
Mil Pac Solutions Overview
 
Financial Analysis of BAE Systems and Rolls Royce
Financial Analysis of BAE Systems and Rolls Royce Financial Analysis of BAE Systems and Rolls Royce
Financial Analysis of BAE Systems and Rolls Royce
 
Counterfeit Avoidance Through Purchasing Processes and Supplier Control - Liv...
Counterfeit Avoidance Through Purchasing Processes and Supplier Control - Liv...Counterfeit Avoidance Through Purchasing Processes and Supplier Control - Liv...
Counterfeit Avoidance Through Purchasing Processes and Supplier Control - Liv...
 
BAE Tactical Vehicles Overview
BAE Tactical Vehicles OverviewBAE Tactical Vehicles Overview
BAE Tactical Vehicles Overview
 
UK Spectrum Policy Forum - Jade McCready, BAE Systems -Defence Sector Briefin...
UK Spectrum Policy Forum - Jade McCready, BAE Systems -Defence Sector Briefin...UK Spectrum Policy Forum - Jade McCready, BAE Systems -Defence Sector Briefin...
UK Spectrum Policy Forum - Jade McCready, BAE Systems -Defence Sector Briefin...
 
BAE Systems Naval Ships – MARS to ERM Transformation by Ken McCrae, BAE Systems
BAE Systems Naval Ships – MARS to ERM Transformation by Ken McCrae, BAE SystemsBAE Systems Naval Ships – MARS to ERM Transformation by Ken McCrae, BAE Systems
BAE Systems Naval Ships – MARS to ERM Transformation by Ken McCrae, BAE Systems
 
Set off and carry forward of losses
Set off and carry forward of losses Set off and carry forward of losses
Set off and carry forward of losses
 
Missles flight control systems
Missles flight control systemsMissles flight control systems
Missles flight control systems
 
Macro diagrams and definitions
Macro diagrams and definitionsMacro diagrams and definitions
Macro diagrams and definitions
 
Resume Mcgregor March 2016
Resume Mcgregor March 2016Resume Mcgregor March 2016
Resume Mcgregor March 2016
 
7 Lessons for Aspiring Leaders
7 Lessons for Aspiring Leaders7 Lessons for Aspiring Leaders
7 Lessons for Aspiring Leaders
 
3.4 Demand And Supply Side Policies
3.4   Demand And Supply Side Policies3.4   Demand And Supply Side Policies
3.4 Demand And Supply Side Policies
 
Pakistan Education Plan
Pakistan Education PlanPakistan Education Plan
Pakistan Education Plan
 

Similaire à Countering Cross-Channel Fraud Threats

CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
SophiaPalmira1
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
James Fisher
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
Visa
 
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce TrendsPrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
PrestaShop
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013
avelinakauffman
 

Similaire à Countering Cross-Channel Fraud Threats (20)

CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptx
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
 
La Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las AplicacionesLa Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las Aplicaciones
 
Managing Risk in a digital world: successfully enabling the quest for new rev...
Managing Risk in a digital world: successfully enabling the quest for new rev...Managing Risk in a digital world: successfully enabling the quest for new rev...
Managing Risk in a digital world: successfully enabling the quest for new rev...
 
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce TrendsPrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 

Plus de Vivastream

Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
Vivastream
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
Vivastream
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Vivastream
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce Report
Vivastream
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014
Vivastream
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking Survey
Vivastream
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and Mobile
Vivastream
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation Center
Vivastream
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition Solutions
Vivastream
 
Automation Services
Automation ServicesAutomation Services
Automation Services
Vivastream
 
Company Overview
Company OverviewCompany Overview
Company Overview
Vivastream
 

Plus de Vivastream (20)

Exchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceExchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_Ecommerce
 
Exchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapExchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement Roadmap
 
Test
TestTest
Test
 
Tcap
TcapTcap
Tcap
 
SQA
SQASQA
SQA
 
Jeeva jessf
Jeeva jessfJeeva jessf
Jeeva jessf
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
APEX
APEXAPEX
APEX
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce Report
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking Survey
 
Serano
SeranoSerano
Serano
 
Accura XV
Accura XVAccura XV
Accura XV
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and Mobile
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation Center
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition Solutions
 
Automation Services
Automation ServicesAutomation Services
Automation Services
 
Company Overview
Company OverviewCompany Overview
Company Overview
 

Countering Cross-Channel Fraud Threats

  • 1. Countering Cross-Channel Fraud Threats Dena Hamilton BAI Payments Connect March 11, 2013 — 11:00 a.m.-11:30 a.m. 1
  • 2. Countering Cross-Channel Fraud Threats Detica’s - 2013 Top Three U.S. Fraud and Compliance Trends • Enhanced focus on the fraudster footprint Fraudsters were accountable for significant financial losses in 2012, as many firms overlooked key fraudster behavior and risk characteristics until it was too late. Institutions will need to carefully and consistently investigate and better understand the fraudster to better protect against financial crime in 2013 – reviewing history, patterns and other characteristics to provide investigators with more well rounded insight and create a clear view of relationships in the networks in which the fraudsters operate. • ACH and wire fraud remain favorite tools for organized criminals With FI’s seen as easy prey, 2013 will see an increased exploitation of ACH and wire fraud by organized criminal rings. Firms will need to invest more to develop their defenses and implement anomaly detection to combat both anticipated and unexpected attacks. • Mobile fraud matures Mobile fraud will finally come into its own in 2013, as criminals leverage past source-code and tested techniques to develop more resilient malware and gain access to high level data stored on mobile devices. FI’s will be challenged to protect mobile data as the number of transactions and volume of data on smart phones grows © BAE Systems Detica 2013 Company Confidential 2
  • 3. Cross-Channel Fraud Definition Federal Reserve Presentation 2009 Cross-Channel Fraud — “Theft from deposit accounts by way of multiple points of access — whether branch, automated teller machine, call center, debit card, online banking, ACH or wire.” - Dan Tobin, IT Examiner Supervision, Regulation and Credit Federal Reserve Bank of Boston © BAE Systems Detica 2013 Company Confidential 3
  • 4. These Threats Are Pervasive and Relentless © BAE Systems Detica 2013 Company Confidential 4
  • 5. Why This Topic and What’s New? Global Evolution of Emergence of New Payment Existing Payments Players and Mechanisms © BAE Systems Detica 2013 Company Confidential 5
  • 6. Why This Topic and What’s New? The Rise of Mobile In the U.S. © BAE Systems Detica 2013 Company Confidential 6
  • 7. Why This Topic and What’s New? The Rise of Mobile © BAE Systems Detica 2013 Company Confidential 7
  • 8. Why This Topic and What’s New? The Rise of Mobile © BAE Systems Detica 2013 Company Confidential 8
  • 9. Why This Topic and What’s New? 2012 Payments Fraud Survey Summary of Results — September 2012 Source: Payments Information and Outreach Office — Federal Reserve Bank of Minneapolis © BAE Systems Detica 2013 Company Confidential 9
  • 10. Why This Topic and What’s New? Source: Payments Information and Outreach Office — Federal Reserve Bank of Minneapolis © BAE Systems Detica 2013 Company Confidential 10
  • 11. Why This Topic and What’s New? Source: Payments Information and Outreach Office — Federal Reserve Bank of Minneapolis © BAE Systems Detica 2013 Company Confidential 11
  • 12. Why This Topic and What’s New? • The faces of fraud are changing and evolving. Organizations are familiar with the traditional forms of fraud with checks and payment cards, but over the past year many different fraud events have made the headlines: • ATM skimming sprees • Multiple retail chain breaches • Social networking sites infiltrated • Fraudsters swapping out POS pin pad units at a favorite arts and craft retailer • ACH and wire fraud with business banking clients • Many targeted phishing schemes • Because of the increase in these access points as well as the innovation of new electronic payment methods, criminals and their attacks are becoming much more sophisticated © BAE Systems Detica 2013 Company Confidential 12
  • 13. Regardless of the Source In the 2012 AFP Payments Fraud and Control Survey • Introduction and Key Findings: “As payment options proliferate, so, too, do new twists on fraudster’s schemes and techniques. Checks continue to lead as the payment type most attached, even as their use dramatically declines. But as paper gives way to plastic, Internet and mobile payments accelerate, and the globalization of business continues to grow, the need for new security models becomes ever more important” - Stephen W. Markwell, Product Executive of Treasury Services, J.P. Morgan © BAE Systems Detica 2013 Company Confidential 13
  • 14. Why This Topic? • Financial Crime Survey 2012 — Operational Risk and Regulation in conjunction with Detica NetReveal®: • The outlook for continued investment in financial crime detection and prevention remains positive for 2013, with anticipated annual growth well ahead of the previous On average, 83% of respondents expect an increase in their financial crime and compliance budgets (compared to 42% in both 2011 and 2010), of which a staggering 56% predict an increase of more than 20% (compared to 14% in both 2011 and 2010). © BAE Systems Detica 2013 Company Confidential 14
  • 15. Mitigating Residual Risks • In the current climate of advanced persistent threats, data breaches and malware-infected end-points, it is not surprising that information security stands out as a serious concern that warrants more attention © BAE Systems Detica 2013 Company Confidential 15
  • 16. Countering Cross-Channel Fraud Why so hard to catch? • Multiple interactions with distinct touch-points • Forensics typically focuses on the point of the breach, not the interactions leading up to it • When accessed only for exploration, the online channel typically doesn’t record activity © BAE Systems Detica 2013 Company Confidential 16
  • 17. Countering Cross-Channel Fraud Why is the risk growing? • Payments products are increasingly using multiple channels • Emerging payments products are being adopted by financial institutions • The increasing role of third-party processors • Operational, information security and legal/compliance risks may not be fully understood • Growing complexity of systems © BAE Systems Detica 2013 Company Confidential 17
  • 18. Detica’s Financial and Cyber Crimes Intelligence Platforms © BAE Systems Detica 2013 Company Confidential 18
  • 19. Securing a Connected World A full suite of products and services to protect institutions INSIDE, AT, and OUTSIDE THE PERIMETER INSIDE THE PERIMETER • Fraud Detection/Management • AML/Compliance • Cyber Monitoring and Detection (CyberReveal) • Cyber Response and Remediation • Communications Monitoring INSIDE AT AT THE PERIMETER • Penetration Testing • Secure Network Guard (SNG) OUTSIDE OUTSIDE THE PERIMETER • Threat Intelligence • Cyber Defense Strategies and Consulting © BAE Systems Detica 2013 Company Confidential 19
  • 20. Offers Depth of Defense ENTITY ANALYTICS DETECTION SCENARIOS • Single view of entities • Out of the box scenarios — • Applies analytics to create combines rules and analytics electronic fingerprints / profiles • Risk Scores • Holistic, cross-channel • Ability to incorporate external approach ENTITY DETECTION models and behavioral scores ANALYTICS SCENARIOS SOCIAL ALERT AND NETWORK CASE ANALYTICS MANAGEMENT SOCIAL NETWORK ALERT AND CASE ANALYTICS MANAGEMENT • Relational approach of entities • 360° view of client • Detect collusive behavior and • Single technology platform hidden relationships • Alert Triage and Optimization EXPERTISE • Industry risk, fraud and compliance SMEs • Highly regarded graduate program • In-house data labs © BAE Systems Detica 2013 Company Confidential
  • 21. Detica Recommendations • Single platform approach — risk, fraud, and compliance • Integrated command and control KPIs and risk indicators • Full solution suite — across every stage of the customer journey from initiation through to remediation • Full 360° view of the customer • Unprecedented, perceptive approach to detection and prevention • Predefined social network analytics • Customer-centric analytics and profiling • Watch list management • Enterprise case management • Compliance reporting capabilities • Real time and batch, proven detection and prevention industry models © BAE Systems Detica 2013 Company Confidential 21
  • 22. Contact Details If you have any questions or would like to find out more about Detica NetReveal® please contact: North America Head Office BAE Systems Detica 265 Franklin Street Boston Dena Hamilton MA 02110 USA Tel: +1 (617) 737 4170 Dena.Hamilton@BAESystemsDetica.com Fax: +1 (617) 737 4190 International Offices Australia Belgium Canada Dubai France Germany Ireland India Poland Singapore Spain The Netherlands UK netreveal@detica.com www.deticanetreveal.com © BAE Systems plc 2013. All Rights Reserved. BAE SYSTEMS, DETICA, NETREVEAL, Detica NetReveal are trademarks of BAE Systems plc. Detica Limited is a BAE Systems company registered in England and Wales under number 1337451. Its registered office is at Surrey Research Park, Guildford, England, GU2 7YP © BAE Systems Detica 2013 Company Confidential 22
  • 23. References and Resources Detica • Knowledge Center — https://www.deticanetreveal.com/en/knowledge-centre.html • 2013 Trends — https://www.deticanetreveal.com/en/knowledge-centre/news/item/bae-systems-detica-forecasts- top-us-fraud-and-compliance-trends-for-2013.html • Cross Channel Fraud — https://www.deticanetreveal.com/en/knowledge-centre/financial-services-collateral- en/general.html?task=weblink.go&id=119 AFP • 2012 Survey: Key Results — http://www.afponline.org/pub/pdf/2012_AFP_Payments_Fraud_and_Control_Survey-- Introduction_and_Key_Results.pdf Google • Mobile Trends — http://www.thinkwithgoogle.com/insights/library/studies/our-mobile-planet-us/ • Mobile Banking Trends — http://www.thinkwithgoogle.com/insights/library/studies/mobile-banking-trends-2012/ Federal Reserve • Payment Fraud Survey — http://www.minneapolisfed.org/about/whatwedo/payments/2012-payments-fraud- survey-consolidated-results.pdf © BAE Systems Detica 2013 Company Confidential 23