SlideShare a Scribd company logo
1 of 48
WEBINAR
DEFINITIVE GUIDE TO NEXT
GENERATION FRAUD
PREVENTION
NOVEMBER 2018
EDDIE GLENN
2
EDDIE GLENN
F r a u d E x p e r t
a n d c o - a u t h o r o f
D e f i n i t i v e G u i d e t o N e x t G e n e r a t i o n
F r a u d P r e v e n t i o n
 25+ years in product management and product marketing,
with focus on online fraud prevention, safety-critical and risk-
prone software
 Authored articles for ITSP Magazine, Totally Gaming,
Gambling Insider, iGaming,
AGENDA
3
 How did we get here?
 Understanding the enemy
 Shortcomings of current fraud
prevention measures
 Next gen fraud prevention tools &
their benefits
 Buying criteria
 Q & A
4
HOW DID WE GET HERE?
5
HOW DID WE GET HERE?
Lack of anonymity
Physical presence required
Dangerous work
Jessie James
1847-1882
More than 20 bank & train robberies
6
HOW DID WE GET HERE?
Lack of anonymity
Physical presence required
Dangerous work
1980’s
Fixed remote location
Limited access & options
7
HOW DID WE GET HERE?
8
HOW DID WE GET HERE?
During the 1990’s, the Internet went
from non-existent to over 17 million
websites
Anonymous
Many locations, but still
tethered
Real business conducted
online
Not always real-time
9
ENTER THE MOBILE AGE
Real-time transactions
Global customer base
24/7/365 revenue
opportunities
New markets
10
DANGERS LURK
BEHIND THE DEVICE
Fraudsters can work
anywhere, anytime
Anonymous
Real-time & repetitive
attacks
11
IMPACT OF ONLINE FRAUD
ON BUSINESS
FRAUD
LOSSES
REVENUE
LOSSES
FRAUD PREVENTION
COSTS
CUSTOMER
ATTRITION
TARNISHED
REPUTATION
LEGAL &
REGULATORY
PENALTIES
12
IMPACT OF ONLINE FRAUD
ON CONSUMERS
FINANCIAL
LOSSES
WASTED
TIME
DAMAGED
CREDIT
LOSS OF
BRAND CONFIDENCE
KNOW YOUR ENEMY
THE MANY FACES OF FRAUD
14
WHO’S BEHIND FRAUD?
D I F F E R E N T T A C T I C S N E E D E D F O R D I F F E R E N T F R A U D S T E R S
Unintentional
Fraud
First Party
Fraud
Synthetic Identity
Fraud
Stolen Identity
Fraud
15
COMMON TYPES OF FRAUD
This is what most people think of
when asked about online fraud…
…and is a problem for almost
every industry…
…but is not the only type to be
concerned with…
16
COMMON TYPES OF FRAUD
“ B E F O R E Y O U K N O W Y O U R C U S T O M E R ” F R A U D
Credit card application, loan
origination fraud results in…
…not only financial losses…
…but increased costs incurred
from time/resources used in
processing fake applications
CREDIT
APPLICATION
17
COMMON TYPES OF FRAUD
“ B E F O R E Y O U K N O W Y O U R C U S T O M E R ”
Insurance industry: quote
manipulation
E-Commerce industry: multiple
online accounts
Gambling & gaming
industries: multiple online
accounts
APPLICATION
18
MA N Y C R EATIVE WAYS TO C OMMIT ON LIN E FR A U D
19
TOOLS OF THE TRADE
E V O L V I N G , M O R E P O T E N T I A L F O R D A M A G E
BOTNETS – automated
programs
EMULATORS &
SIMULATORS –
pretend to be other
devices
PROXY MASKING–
hide true locations
MACHINE LEARNING–
smarter, more human
like
20
CYBERCRIMINALS COUNT ON…
ANONYMITY SCALE COMPLEXITY
FLEXIBILITY MOBILITY PERSISTENCE
SHORTCOMINGS OF
CURRENT FRAUD
PREVENTION
TECHNIQUES
22
IP
ADDRESS
PERSON
FRAUD HAS TO
OCCUR FIRST
IT HAS TO BE
DISCOVERED
YOU NEED A
WAY TO BLOCK
IT
23
SILOS CREATE BLIND SPOTS THAT ENABLE FRAUDSTERS
FRAUD
TEAM
PAYMENTS
TEAM
UNDERWRITIN
G
SECURITY
TEAM
YOUR
BUSINESS
YOUR
COMPETITOR
ANY
BUSINESS
FRAUDSTERS KNOW THIS. THEY EXPLOIT THIS.
PERSONAL
IDENTITY
DIGITAL
IDENTITY
24
ARE YOUR
FRAUD PREVENTION EFFORTS
KILLING YOUR CUSTOMER EXPERIENCE?
 TOO MUCH FRICTION?
 SLOW PROCESSING TIMES?
 STOPPING GOOD CUSTOMERS?
25
6 STEPS TO
NEXT GEN
FRAUD
PREVENTION
ADVANCED DEVICE
INTELLIGENCE
CONNECTING THE DOTS
HUMAN + MACHINE
A TEAM APPROACH
GUARDING THE
FRONT DOOR
MULTI-CHANNEL
26
STEP 1
ADVANCED DEVICE
INTELLIGENCE
27
BE PREPARED FOR ANY
TYPE OF ONLINE DEVICE
 No user friction
 No personal information
 Thwart evasion attempts and device
manipulation
 Re-recognize the same device
 Maintain a broad and deep device database
ACCURATE DEVICE RECOGNITION
28
IDENTIFY DEVICE RISKS
 Context:
 Is device in a risky geolocation?
 Are there geo-location inconsistencies?
 Behavior:
 Is this a new device?
 Is transaction volume high?
 Is device being evasive?
 Characteristics:
 Are device attributes consistent?
 Are there device anomalies?
 Are there known risky attributes?
29
DEVICE REPUTATION
 New device?
 Device have a past history of fraud or
abuse?
 Type of past fraud or abuse?
 Detailed & granular
 Associated with other devices with a bad
reputation?
 Vast database of fraud/abuse reports
30
IOVATION DEVICE REPUTATION
FINANCIAL
FRAUD
MISCONDUCT CHEATING
IDENTITY
THEFT
POLICY
FRAUD
B2B
FINANCIAL
• Industry collaboration
• 4,000+ fraud analysts in the iovation network
• 55M+ confirmed fraud and abuse reports
placed
• 45 types of fraud & abuse reports in 6 major
categories
31
IOVATION DEVICE REPUTATION
0%
5%
10%
15%
20%
25%
30%
35%
40%
RETAIL INDUSTRY CY 2017 (1.7M total)
0%
5%
10%
15%
20%
25%
30%
35%
FINANCIAL INDUSTRY CY 2017 (1.4M total)
32
STEP 2
CONNECTING THE DOTS
33
FRAUDSTERS RARELY USE JUST ONE DEVICE
 Identify relationships between
devices
 Don’t rely on personal identity
 If one device is involved in fraud,
then it’s likely other associated
devices will be risky too
 Effective at stopping credit
application fraud and other types
of new account fraud
34
FRAUDSTERS RARELY USE JUST ONE DEVICE
35
CHARIT
Y
RETAIL
A
BANK A BANK B
Stolen ID: New CC Synthetic ID: New CC
Stolen CC
Over time, iovation is able to determine that
these devices are associated with each other
CHARGE
BACK
For a while, no one realizes that there is a
problem even though the fraudsters have
successfully applied for new credit cards
THE POWER OF CONNECTIONS & REPUTATION
36
STEP 3
 Both are needed for a comprehensive fraud
prevention strategy
 Separately they leave gaps
37
AIMACHINE
LEARNING
DEEP
LEARNING
MACHINE LEARNING
Parse data
Learn from it
Make a prediction about
something in the world
Sometimes the prediction is
right. Sometimes not.
Rinse and repeat.
38
Human
Machine
Learning
Detect obvious risk patterns ✓ ✓
Detect subtle risk patterns ✓
Stop specific, targeted threats ✓
Stop emerging threats ✓
Stop evolving threats ✓
H U MA N + MA C H IN E
39
PREDICT
INSTEAD
OF REACTING
Save time.
Stop more fraud.
Better consumer experience.
40
STEP 4
A TEAM APPROACH
Cybercriminals count on you not working together
 Collaborate. Collaborate.
Collaborate.
 Within your business
 With other businesses in your
industry
 With other businesses outside of
your industry
 Globally
 Stop repeat offenders
41
STEP 5
Guard the front door
 Be proactive. Not reactive.
 Even if your business isn’t breached, the
chances are high that your customers have
been & they use the same username/password
 Fraud from ATO is preventable.
 Use frictionless device based
authentication
 Use Multi-factor authentication
42
STEP 6
Multi-Channel Approach
 Plug one fraud hole and fraudsters just move to
another channel.
 Coordinate efforts between online, call center
channel, and on premise
 Form a comprehensive strategy
 Different fraud prevention tools prevent
different types of fraud
 Don’t rely on just one tool, process, or
technique
THE POWER OF
NEXT GEN FRAUD
PREVENTION
44
BENEFITS
CATCH MORE
FRAUD
IMPROVE
OPERATIONAL
EFFICIENCIES
ADDRESS
COMPLIANCE
REQUIREMENTS
IMPROVE USER
ACCOUNT
SECURITY
IMPROVE
USER EXPERIENCE
45
CUSTOMER CASE STUDY
 Credit application
fraud
 Long processing
times frustrated
customers and
reduced new loan
rates
 Device reputation
leveraged
 RESULTS:
 Significant reduction in
fraud loss
 Doubled loans approved
 Reduced customer
friction by 50%
46
CUSTOMER CASE STUDY
 Large electronics relater
 Even with credit card validation,
reshipping scams were a
problem
 Difficulty in identifying related
orders
 RESULTS:
 Fraud catch tripled
 Reduced time to process
orders
 No increased friction
47
10 BUYING CRITERIA
F O R N E X T - G E N F R A U D P R E V E N T I O N
Advanced Device
Recognition
1
Machine Learning
2
Human Insight
3
Online & Mobile
Support
4
Granular Device
Reputation
5
Active Industry
Participation
6
Device
Associations
7
Comprehensive
Device Risks
8
Flexible
Configuration
9
Service Reliability
10
Q&A

More Related Content

Similar to Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobile Age

Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesTransUnion
 
Creating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online FraudCreating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online FraudTransUnion
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionTransUnion
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...TransUnion
 
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...TransUnion
 
Bucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalBucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalEric Bozinny
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...TransUnion
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)TransUnion
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...FortuneCMO, LLC
 
How to reduce payments fraud? Payments Fraud
How to reduce payments fraud? Payments FraudHow to reduce payments fraud? Payments Fraud
How to reduce payments fraud? Payments FraudITIO Innovex
 
idBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewidBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewSteven Lane
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Molly Alexander
 
Insurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesInsurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesCallcredit123
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...EY
 
MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018Match-Maker Ventures
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008ClubHack
 

Similar to Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobile Age (20)

Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
Creating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online FraudCreating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online Fraud
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
The Mobile Device: The New Center of the Fraud Prevention Universe with Aite ...
 
Bucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalBucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in Digital
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
 
state-of-fraud-2021.pdf
state-of-fraud-2021.pdfstate-of-fraud-2021.pdf
state-of-fraud-2021.pdf
 
How to reduce payments fraud? Payments Fraud
How to reduce payments fraud? Payments FraudHow to reduce payments fraud? Payments Fraud
How to reduce payments fraud? Payments Fraud
 
idBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewidBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules Overview
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
 
Insurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesInsurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slides
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
 
MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 

More from TransUnion

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...TransUnion
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesTransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipTransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar TransUnion
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4TransUnion
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayTransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedTransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalTransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingTransUnion
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...TransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropeTransUnion
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsTransUnion
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report HighlightsTransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityTransUnion
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...TransUnion
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPRTransUnion
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?TransUnion
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceTransUnion
 
Webinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportWebinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportTransUnion
 
Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?TransUnion
 

More from TransUnion (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer Experience
 
Webinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportWebinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry Report
 
Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?
 

Recently uploaded

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobile Age

  • 1. WEBINAR DEFINITIVE GUIDE TO NEXT GENERATION FRAUD PREVENTION NOVEMBER 2018 EDDIE GLENN
  • 2. 2 EDDIE GLENN F r a u d E x p e r t a n d c o - a u t h o r o f D e f i n i t i v e G u i d e t o N e x t G e n e r a t i o n F r a u d P r e v e n t i o n  25+ years in product management and product marketing, with focus on online fraud prevention, safety-critical and risk- prone software  Authored articles for ITSP Magazine, Totally Gaming, Gambling Insider, iGaming,
  • 3. AGENDA 3  How did we get here?  Understanding the enemy  Shortcomings of current fraud prevention measures  Next gen fraud prevention tools & their benefits  Buying criteria  Q & A
  • 4. 4 HOW DID WE GET HERE?
  • 5. 5 HOW DID WE GET HERE? Lack of anonymity Physical presence required Dangerous work Jessie James 1847-1882 More than 20 bank & train robberies
  • 6. 6 HOW DID WE GET HERE? Lack of anonymity Physical presence required Dangerous work 1980’s Fixed remote location Limited access & options
  • 7. 7 HOW DID WE GET HERE?
  • 8. 8 HOW DID WE GET HERE? During the 1990’s, the Internet went from non-existent to over 17 million websites Anonymous Many locations, but still tethered Real business conducted online Not always real-time
  • 9. 9 ENTER THE MOBILE AGE Real-time transactions Global customer base 24/7/365 revenue opportunities New markets
  • 10. 10 DANGERS LURK BEHIND THE DEVICE Fraudsters can work anywhere, anytime Anonymous Real-time & repetitive attacks
  • 11. 11 IMPACT OF ONLINE FRAUD ON BUSINESS FRAUD LOSSES REVENUE LOSSES FRAUD PREVENTION COSTS CUSTOMER ATTRITION TARNISHED REPUTATION LEGAL & REGULATORY PENALTIES
  • 12. 12 IMPACT OF ONLINE FRAUD ON CONSUMERS FINANCIAL LOSSES WASTED TIME DAMAGED CREDIT LOSS OF BRAND CONFIDENCE
  • 13. KNOW YOUR ENEMY THE MANY FACES OF FRAUD
  • 14. 14 WHO’S BEHIND FRAUD? D I F F E R E N T T A C T I C S N E E D E D F O R D I F F E R E N T F R A U D S T E R S Unintentional Fraud First Party Fraud Synthetic Identity Fraud Stolen Identity Fraud
  • 15. 15 COMMON TYPES OF FRAUD This is what most people think of when asked about online fraud… …and is a problem for almost every industry… …but is not the only type to be concerned with…
  • 16. 16 COMMON TYPES OF FRAUD “ B E F O R E Y O U K N O W Y O U R C U S T O M E R ” F R A U D Credit card application, loan origination fraud results in… …not only financial losses… …but increased costs incurred from time/resources used in processing fake applications CREDIT APPLICATION
  • 17. 17 COMMON TYPES OF FRAUD “ B E F O R E Y O U K N O W Y O U R C U S T O M E R ” Insurance industry: quote manipulation E-Commerce industry: multiple online accounts Gambling & gaming industries: multiple online accounts APPLICATION
  • 18. 18 MA N Y C R EATIVE WAYS TO C OMMIT ON LIN E FR A U D
  • 19. 19 TOOLS OF THE TRADE E V O L V I N G , M O R E P O T E N T I A L F O R D A M A G E BOTNETS – automated programs EMULATORS & SIMULATORS – pretend to be other devices PROXY MASKING– hide true locations MACHINE LEARNING– smarter, more human like
  • 20. 20 CYBERCRIMINALS COUNT ON… ANONYMITY SCALE COMPLEXITY FLEXIBILITY MOBILITY PERSISTENCE
  • 22. 22 IP ADDRESS PERSON FRAUD HAS TO OCCUR FIRST IT HAS TO BE DISCOVERED YOU NEED A WAY TO BLOCK IT
  • 23. 23 SILOS CREATE BLIND SPOTS THAT ENABLE FRAUDSTERS FRAUD TEAM PAYMENTS TEAM UNDERWRITIN G SECURITY TEAM YOUR BUSINESS YOUR COMPETITOR ANY BUSINESS FRAUDSTERS KNOW THIS. THEY EXPLOIT THIS. PERSONAL IDENTITY DIGITAL IDENTITY
  • 24. 24 ARE YOUR FRAUD PREVENTION EFFORTS KILLING YOUR CUSTOMER EXPERIENCE?  TOO MUCH FRICTION?  SLOW PROCESSING TIMES?  STOPPING GOOD CUSTOMERS?
  • 25. 25 6 STEPS TO NEXT GEN FRAUD PREVENTION ADVANCED DEVICE INTELLIGENCE CONNECTING THE DOTS HUMAN + MACHINE A TEAM APPROACH GUARDING THE FRONT DOOR MULTI-CHANNEL
  • 27. 27 BE PREPARED FOR ANY TYPE OF ONLINE DEVICE  No user friction  No personal information  Thwart evasion attempts and device manipulation  Re-recognize the same device  Maintain a broad and deep device database ACCURATE DEVICE RECOGNITION
  • 28. 28 IDENTIFY DEVICE RISKS  Context:  Is device in a risky geolocation?  Are there geo-location inconsistencies?  Behavior:  Is this a new device?  Is transaction volume high?  Is device being evasive?  Characteristics:  Are device attributes consistent?  Are there device anomalies?  Are there known risky attributes?
  • 29. 29 DEVICE REPUTATION  New device?  Device have a past history of fraud or abuse?  Type of past fraud or abuse?  Detailed & granular  Associated with other devices with a bad reputation?  Vast database of fraud/abuse reports
  • 30. 30 IOVATION DEVICE REPUTATION FINANCIAL FRAUD MISCONDUCT CHEATING IDENTITY THEFT POLICY FRAUD B2B FINANCIAL • Industry collaboration • 4,000+ fraud analysts in the iovation network • 55M+ confirmed fraud and abuse reports placed • 45 types of fraud & abuse reports in 6 major categories
  • 31. 31 IOVATION DEVICE REPUTATION 0% 5% 10% 15% 20% 25% 30% 35% 40% RETAIL INDUSTRY CY 2017 (1.7M total) 0% 5% 10% 15% 20% 25% 30% 35% FINANCIAL INDUSTRY CY 2017 (1.4M total)
  • 33. 33 FRAUDSTERS RARELY USE JUST ONE DEVICE  Identify relationships between devices  Don’t rely on personal identity  If one device is involved in fraud, then it’s likely other associated devices will be risky too  Effective at stopping credit application fraud and other types of new account fraud
  • 34. 34 FRAUDSTERS RARELY USE JUST ONE DEVICE
  • 35. 35 CHARIT Y RETAIL A BANK A BANK B Stolen ID: New CC Synthetic ID: New CC Stolen CC Over time, iovation is able to determine that these devices are associated with each other CHARGE BACK For a while, no one realizes that there is a problem even though the fraudsters have successfully applied for new credit cards THE POWER OF CONNECTIONS & REPUTATION
  • 36. 36 STEP 3  Both are needed for a comprehensive fraud prevention strategy  Separately they leave gaps
  • 37. 37 AIMACHINE LEARNING DEEP LEARNING MACHINE LEARNING Parse data Learn from it Make a prediction about something in the world Sometimes the prediction is right. Sometimes not. Rinse and repeat.
  • 38. 38 Human Machine Learning Detect obvious risk patterns ✓ ✓ Detect subtle risk patterns ✓ Stop specific, targeted threats ✓ Stop emerging threats ✓ Stop evolving threats ✓ H U MA N + MA C H IN E
  • 39. 39 PREDICT INSTEAD OF REACTING Save time. Stop more fraud. Better consumer experience.
  • 40. 40 STEP 4 A TEAM APPROACH Cybercriminals count on you not working together  Collaborate. Collaborate. Collaborate.  Within your business  With other businesses in your industry  With other businesses outside of your industry  Globally  Stop repeat offenders
  • 41. 41 STEP 5 Guard the front door  Be proactive. Not reactive.  Even if your business isn’t breached, the chances are high that your customers have been & they use the same username/password  Fraud from ATO is preventable.  Use frictionless device based authentication  Use Multi-factor authentication
  • 42. 42 STEP 6 Multi-Channel Approach  Plug one fraud hole and fraudsters just move to another channel.  Coordinate efforts between online, call center channel, and on premise  Form a comprehensive strategy  Different fraud prevention tools prevent different types of fraud  Don’t rely on just one tool, process, or technique
  • 43. THE POWER OF NEXT GEN FRAUD PREVENTION
  • 45. 45 CUSTOMER CASE STUDY  Credit application fraud  Long processing times frustrated customers and reduced new loan rates  Device reputation leveraged  RESULTS:  Significant reduction in fraud loss  Doubled loans approved  Reduced customer friction by 50%
  • 46. 46 CUSTOMER CASE STUDY  Large electronics relater  Even with credit card validation, reshipping scams were a problem  Difficulty in identifying related orders  RESULTS:  Fraud catch tripled  Reduced time to process orders  No increased friction
  • 47. 47 10 BUYING CRITERIA F O R N E X T - G E N F R A U D P R E V E N T I O N Advanced Device Recognition 1 Machine Learning 2 Human Insight 3 Online & Mobile Support 4 Granular Device Reputation 5 Active Industry Participation 6 Device Associations 7 Comprehensive Device Risks 8 Flexible Configuration 9 Service Reliability 10
  • 48. Q&A

Editor's Notes

  1. What kind of crime could one man, one gang actually commit. For the most part, after the first couple of robberies he became well known and was no longer anonymous. Law enforcement was looking for him. In addition, his physical presence was always required. And the number of different people wanting to copy what he did was limited b/c it was dangerous work. People were constantly shooting at him.
  2. Last fast forward 100 years. We are now at the dawn of the digital era. People could now sit at a desk, behind a large & bulky computer and attempt to commit crimes.
  3. By the end of the 1990s, the perfect conditions for cybercrime had formed: everyone was online, lots of people conducting online banking and credit card transactions, lack of legal framework and resources to prosecute cyber crime, and poor security. Two huge events in the 1990s made this happen. The first was the invention of the World Wide Web. In 1990, Tim Berners-Lee completed his build out of all the components necessary for his ‘WorldWideWeb’ project - a web server, a web browser, a web editor, and the first web pages. In 1991, he made his project publicly available on the Internet as the ‘Web’. In a single decade, the Web grew from non-existent to over 17 million web sites. [1]
  4. https://www.istockphoto.com/photo/reactive-marketing-terms-written-on-blackboard-background-high-resolution-gm179057859-25237424
  5. https://www.istockphoto.com/photo/moonlight-farm-gm545263044-98187597
  6. https://www.istockphoto.com/photo/hand-of-a-businessman-holding-the-fifth-star-gm954330972-260552774
  7. What can iovation do in 100ms or less?
  8. What can iovation do in 100ms or less?
  9. What can iovation do in 100ms or less?
  10. What can iovation do in 100ms or less?
  11. What can iovation do in 100ms or less?
  12. 1995 Terminator