SlideShare a Scribd company logo
1 of 24
Angie White, Product Marketing Manager
How E-Commerce Providers Can
Remove ATO from Their Carts
2
Account Takeover (ATO)
When a legitimate customer’s
account is illegally accessed
for the purposes of committing
fraud
3
0
1000
2000
3000
4000
5000
6000
Aug-17 Oct-17 Dec-17 Feb-18 Apr-18 Jun-18 Aug-18
iovation ATO Reports
220%
CONFIRMED E-COMMERCE ATO REPORTS
4
33%
23%
44%
Desktop Sales Mobile Web App-Based
Source: Criteo’s Q4 2017 commerce report
E-COMMERCE TRANSACTIONS BY CHANNEL
5
IMPACTS OF ATO ON E -COMMERCE
Loss of brand reputation
Regulatory non-compliance
Damage to customer relationships
Cost of lost goods and chargebacks
The cost of ATO fraud tripled
last year, reaching an estimated
$5.1 billion in the U.S.
1
Identity theft victims hit
16.7 million in 2017.
6
Fraud isn’t Just a Business Problem.
It’s a Customer Experience Problem
E-commerce chargebacks due
to fraud are expected to reach
$30 billion by 2020.
3
False declines are valued
at $118 billion per year.
2
Consumers spend 16 hours on
average resolving issues after
their account is taken over.
4
44% of shoppers said they will
never buy from a retailer again
after a data breach.
5
Business Impact Consumer Impact
Source: 1 2017 SalesCycle Report ; ² MasterCard targets rising number of false declines; 3 TotalRetail 5 Ways E-Commerce Merchants Can Combat Identity Fraud; 4 Javelin 2018 Identity Fraud: Fraud Enters a New
Era of Complexity; 5 TransUnion 2018 Retail Consumer Survey Insights; 6 2018 Identity Fraud Study, Javelin Strategy & Research
7
ATO ATTACK METHODS
Phishing Attacks
Credential Stuffing
Social Engineering
Malware, Bots,
Spyware
Data breaches were up 45% in 2017
Source: Identity Theft Resource Center 2017 Annual Data Breach Year End Review
SIM Swapping
906
1070
1261
1429 1470
1899
2115
2176
2664
3141
3050
321
446
656
498
662
421
471
614
783 780
1091
0
200
400
600
800
1000
1200
1400
1600
1800
0
500
1000
1500
2000
2500
3000
3500
Data Breaches and Consumer Complaints of ID Theft & Fraud
Source: 1Federal Trade Commission, Consumer Sentinel Network Databook Jan-Dec 2016
2Identity Theft Resource Center
Data Breaches2
Consumer Complaints1
2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017
9
SYMPTOMS OF AN ATO ATTACK
Use of VPNs or proxy servers
Using an older browser or operating system
Geolocation mismatches
High velocity of login attempts from one device
Changing account details such as ship to address
10
REAL COST OF AN ATO ATTACK
2,500ACCOUNTS
$75K
WAGES
$$$
BRAND
REPUTATION
5,000
MAN HOURS
TO REPAIR
O n e
D e v i c e
$5,000
CHARGEBACK
S
Source: iovation Customer Case Study
WHAT’S THE
SOLUTION?
12
COMPETING NEEDS
• Less friction overall
• Better customer experiences
• More immediate access
• Reduce cart abandonments,
and grow revenue
PRODUCT, CX & APP
OWNERS
• Reduce attack surface
• Assurance on ID and access
• Leverage existing
capabilities, infrastructure
• Real-time threat and risk
indicators
FRAUD & SECURITY TEAMS
13
Baymard estimates that 28% of
carts were abandoned because of
a checkout process that was too
long/complicated.”
14
CONVERSION RATES
0%
2%
4%
6%
8%
10%
12%
14%
Median Top 25% Top 10%
Source: WordStream conversion rate analysis
15
v Or this much assurance?Do you need this much
assurance?
Σ Risk mitigation by authentication challenges = (Probability of compromise) x (impact)
Match
Grant
Access
No
Match
or Risk
Signals
Account-to-
Device Pairing &
Risk Evaluation
Persistent
Session
Token
Login
User
Access
Customer
Access
Login
Device
Registration SUCCESS
Step-Up
***
DEVICE-BASED AUTHENTICATION
***
17
ATO Case Study
Attack
Method
Social engineering
through dating sites
Business
Losses
• Thousands in lost merchandise
• Payment chargebacks
• Lost revenue from service
cancellations
• First attempted auth solution
resulted in increased call center
volume and complaints
Benefits
• Stopped account takeovers
• Improved login experience
increased customer satisfaction
• Reduced call center volume
18
DEVICE-BASED
AUTHENTICATION
Transparent
and Frictionless
• SIMPLIFY access for good users
• LOWER barriers to usage
• IMPROVE customer experience
Context and
Risk
• UNDERSTAND context around device
• SEE risk indications before it’s too late
• DETECT attempts to evade recognition or
mask identity
Adaptive and
Dynamic
• DYNAMICALLY react to changes in risk
• DELIVER the right level of assurance
• MINIMIZE account takeovers
19
s
U N I F I E D , S I M P L I F I E D A N D P E R S O N A L I Z E D M F A F O R A N Y M O B I L E A P P
LAUNCHKEY
20
LAUNCHKEY
A U T H O R I Z A T I O N C A P A B I L I T I E S
 Real-time authorization
 Single-party or multi-party
 Web or call center offline workflows
21
MFA
BENEFITS
Simple, Unified
Experience
• UNIFY experience across all touchpoints
• REDUCE friction from multiple experiences
• IMPROVE usability with every login
Secure by
Design
• REMOVE credential stores that can be
compromised and exfiltrated
• LOCK DOWN with top grade cryptography
• ALIGN with standards like OAuth and OpenID
Customizable
for Any App
• WHITE-LABEL functionality
• BUILD FAST with APIs for any platform
• CHOOSE from a number of interactive or
passive authentication options
22
COMBATING ATO
Automated Screening: Relying on the Right Set of Tools
Use the device as the 2nd Factor of authentication and challenge only when necessary
Give Customers Confidence to Purchase
Provide the account protection that customers demand without adding friction
Working with Peers to Stop Known Threats
A shared intelligence source to stop known fraud across industries and geographies
Importance of Protecting Against Account Takeover
Recognise and assess risks currently unseen at device level in real-time
Q&A
Join the chargebacks experts, Chargebacks
911, and fraud experts, iovation, as we discuss
combatting 1st party chargebacks and 3rd party
fraud without increasing false positives.
YOU’LL LEARN ABOUT:
• Problems that arise during the chargeback
process.
• The importance in utilizing fraud systems
pre- and post- transactions.
• Providing defensible evidence to win
chargeback disputes.
• Identify and stop repeat 3rd party fraud
offenders.
• Combining the power of iovation and
Chargebacks 911 to mitigate overall losses.
Date: February 12, 2019
Time: 10 AM PST
Register
Keeping Your Fraud Prevention Resolutions

More Related Content

What's hot

3-D Secure 2.0
3-D Secure 2.03-D Secure 2.0
3-D Secure 2.0Netcetera
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4TransUnion
 
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamentiPaola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamentiEcommerce HUB
 
Middle East Payment Gateway
Middle East Payment GatewayMiddle East Payment Gateway
Middle East Payment GatewayJaladhi Bhatt
 
SlimPay - Service & Platform Overview
SlimPay - Service & Platform OverviewSlimPay - Service & Platform Overview
SlimPay - Service & Platform OverviewMartijn van Gijlswijk
 
mobiquity®Wallet checkout - Quick, seamless and secure checkout
mobiquity®Wallet checkout - Quick, seamless and secure checkout mobiquity®Wallet checkout - Quick, seamless and secure checkout
mobiquity®Wallet checkout - Quick, seamless and secure checkout Mahindra Comviva
 
LOYALTY PROGRAM FOR RETAIL CHAIN: from discounts to bonuses
LOYALTY PROGRAM  FOR RETAIL CHAIN: from discounts to bonusesLOYALTY PROGRAM  FOR RETAIL CHAIN: from discounts to bonuses
LOYALTY PROGRAM FOR RETAIL CHAIN: from discounts to bonusesMikhail Miroshnichenko
 
201603_SlimPay General
201603_SlimPay General201603_SlimPay General
201603_SlimPay GeneralSami Bouzenad
 
SlimPay - #1 in the euro zone for SEPA online direct debit payments
SlimPay - #1 in the euro zone for SEPA online direct debit paymentsSlimPay - #1 in the euro zone for SEPA online direct debit payments
SlimPay - #1 in the euro zone for SEPA online direct debit paymentsMartijn van Gijlswijk
 
Best online payment gateway list - Middle east
Best online payment gateway list - Middle eastBest online payment gateway list - Middle east
Best online payment gateway list - Middle eastPadmanabhan Ravi
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...Vesta Corporation
 
R.Grassi - P.Sardo - One integration: every wat to pay
R.Grassi - P.Sardo - One integration: every wat to payR.Grassi - P.Sardo - One integration: every wat to pay
R.Grassi - P.Sardo - One integration: every wat to payMeet Magento Italy
 
Vesta Corporation V-Guaranteed Payments Solution
Vesta Corporation V-Guaranteed Payments SolutionVesta Corporation V-Guaranteed Payments Solution
Vesta Corporation V-Guaranteed Payments SolutionMichael Alberse
 
E-commerce Berlin Expo - SlimPay - Matthias Janocha
E-commerce Berlin Expo - SlimPay - Matthias JanochaE-commerce Berlin Expo - SlimPay - Matthias Janocha
E-commerce Berlin Expo - SlimPay - Matthias JanochaE-Commerce Berlin EXPO
 
How an online payment gateway works
How an online payment gateway worksHow an online payment gateway works
How an online payment gateway worksIkajo International
 
Fireworks product to customer loyatly ( p2 c )
Fireworks product to customer loyatly ( p2 c )Fireworks product to customer loyatly ( p2 c )
Fireworks product to customer loyatly ( p2 c )Yanzer Lee
 

What's hot (19)

Payment Gateway
Payment Gateway Payment Gateway
Payment Gateway
 
3-D Secure 2.0
3-D Secure 2.03-D Secure 2.0
3-D Secure 2.0
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Re-Fi Platform
Re-Fi PlatformRe-Fi Platform
Re-Fi Platform
 
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamentiPaola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
 
Middle East Payment Gateway
Middle East Payment GatewayMiddle East Payment Gateway
Middle East Payment Gateway
 
SlimPay - Service & Platform Overview
SlimPay - Service & Platform OverviewSlimPay - Service & Platform Overview
SlimPay - Service & Platform Overview
 
mobiquity®Wallet checkout - Quick, seamless and secure checkout
mobiquity®Wallet checkout - Quick, seamless and secure checkout mobiquity®Wallet checkout - Quick, seamless and secure checkout
mobiquity®Wallet checkout - Quick, seamless and secure checkout
 
LOYALTY PROGRAM FOR RETAIL CHAIN: from discounts to bonuses
LOYALTY PROGRAM  FOR RETAIL CHAIN: from discounts to bonusesLOYALTY PROGRAM  FOR RETAIL CHAIN: from discounts to bonuses
LOYALTY PROGRAM FOR RETAIL CHAIN: from discounts to bonuses
 
201603_SlimPay General
201603_SlimPay General201603_SlimPay General
201603_SlimPay General
 
We Authenticate the World
We Authenticate the WorldWe Authenticate the World
We Authenticate the World
 
SlimPay - #1 in the euro zone for SEPA online direct debit payments
SlimPay - #1 in the euro zone for SEPA online direct debit paymentsSlimPay - #1 in the euro zone for SEPA online direct debit payments
SlimPay - #1 in the euro zone for SEPA online direct debit payments
 
Best online payment gateway list - Middle east
Best online payment gateway list - Middle eastBest online payment gateway list - Middle east
Best online payment gateway list - Middle east
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
 
R.Grassi - P.Sardo - One integration: every wat to pay
R.Grassi - P.Sardo - One integration: every wat to payR.Grassi - P.Sardo - One integration: every wat to pay
R.Grassi - P.Sardo - One integration: every wat to pay
 
Vesta Corporation V-Guaranteed Payments Solution
Vesta Corporation V-Guaranteed Payments SolutionVesta Corporation V-Guaranteed Payments Solution
Vesta Corporation V-Guaranteed Payments Solution
 
E-commerce Berlin Expo - SlimPay - Matthias Janocha
E-commerce Berlin Expo - SlimPay - Matthias JanochaE-commerce Berlin Expo - SlimPay - Matthias Janocha
E-commerce Berlin Expo - SlimPay - Matthias Janocha
 
How an online payment gateway works
How an online payment gateway worksHow an online payment gateway works
How an online payment gateway works
 
Fireworks product to customer loyatly ( p2 c )
Fireworks product to customer loyatly ( p2 c )Fireworks product to customer loyatly ( p2 c )
Fireworks product to customer loyatly ( p2 c )
 

Similar to How E-Commerce Providers Can Remove ATO from Their Carts

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...TransUnion
 
8 Reasons You Should Switch to Biometrics Authentication for Digital Onboarding
8 Reasons You Should Switch to Biometrics Authentication for Digital Onboarding8 Reasons You Should Switch to Biometrics Authentication for Digital Onboarding
8 Reasons You Should Switch to Biometrics Authentication for Digital OnboardingPanamax, Inc
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit123
 
Fraud Prevention - Experian
Fraud Prevention - ExperianFraud Prevention - Experian
Fraud Prevention - ExperianAlex Robbins
 
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...Alan Quayle
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToAlan Percy
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToTelcoBridges Inc.
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment AuthenticationFIDO Alliance
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Ivona M
 
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...CDGcommerce
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfIDMERIT IDMERIT
 
Evolution of Banks in the Digital Age
Evolution of Banks in the Digital AgeEvolution of Banks in the Digital Age
Evolution of Banks in the Digital AgeAxway
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 FinTech Belgium
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesTransUnion
 
APIdays London 2019 - Evolution of Banks in the Digital Age with Eric Horesny...
APIdays London 2019 - Evolution of Banks in the Digital Age with Eric Horesny...APIdays London 2019 - Evolution of Banks in the Digital Age with Eric Horesny...
APIdays London 2019 - Evolution of Banks in the Digital Age with Eric Horesny...apidays
 
AppFolio Orange County Meet-up Presentation
AppFolio Orange County Meet-up PresentationAppFolio Orange County Meet-up Presentation
AppFolio Orange County Meet-up PresentationAppFolio
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayTransUnion
 
Dmtm --final
Dmtm --finalDmtm --final
Dmtm --finalRima Dave
 

Similar to How E-Commerce Providers Can Remove ATO from Their Carts (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
8 Reasons You Should Switch to Biometrics Authentication for Digital Onboarding
8 Reasons You Should Switch to Biometrics Authentication for Digital Onboarding8 Reasons You Should Switch to Biometrics Authentication for Digital Onboarding
8 Reasons You Should Switch to Biometrics Authentication for Digital Onboarding
 
IBM Payments Gateway
IBM Payments GatewayIBM Payments Gateway
IBM Payments Gateway
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
 
Fraud Prevention - Experian
Fraud Prevention - ExperianFraud Prevention - Experian
Fraud Prevention - Experian
 
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment Authentication
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
 
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
Evolution of Banks in the Digital Age
Evolution of Banks in the Digital AgeEvolution of Banks in the Digital Age
Evolution of Banks in the Digital Age
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
APIdays London 2019 - Evolution of Banks in the Digital Age with Eric Horesny...
APIdays London 2019 - Evolution of Banks in the Digital Age with Eric Horesny...APIdays London 2019 - Evolution of Banks in the Digital Age with Eric Horesny...
APIdays London 2019 - Evolution of Banks in the Digital Age with Eric Horesny...
 
AppFolio Orange County Meet-up Presentation
AppFolio Orange County Meet-up PresentationAppFolio Orange County Meet-up Presentation
AppFolio Orange County Meet-up Presentation
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
Dmtm --final
Dmtm --finalDmtm --final
Dmtm --final
 

More from TransUnion

A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesTransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipTransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar TransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedTransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalTransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingTransUnion
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropeTransUnion
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report HighlightsTransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...TransUnion
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...TransUnion
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...TransUnion
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...TransUnion
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)TransUnion
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPRTransUnion
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?TransUnion
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceTransUnion
 
Webinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportWebinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportTransUnion
 
Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?TransUnion
 

More from TransUnion (20)

A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer Experience
 
Webinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportWebinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry Report
 
Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

How E-Commerce Providers Can Remove ATO from Their Carts

  • 1. Angie White, Product Marketing Manager How E-Commerce Providers Can Remove ATO from Their Carts
  • 2. 2 Account Takeover (ATO) When a legitimate customer’s account is illegally accessed for the purposes of committing fraud
  • 3. 3 0 1000 2000 3000 4000 5000 6000 Aug-17 Oct-17 Dec-17 Feb-18 Apr-18 Jun-18 Aug-18 iovation ATO Reports 220% CONFIRMED E-COMMERCE ATO REPORTS
  • 4. 4 33% 23% 44% Desktop Sales Mobile Web App-Based Source: Criteo’s Q4 2017 commerce report E-COMMERCE TRANSACTIONS BY CHANNEL
  • 5. 5 IMPACTS OF ATO ON E -COMMERCE Loss of brand reputation Regulatory non-compliance Damage to customer relationships Cost of lost goods and chargebacks
  • 6. The cost of ATO fraud tripled last year, reaching an estimated $5.1 billion in the U.S. 1 Identity theft victims hit 16.7 million in 2017. 6 Fraud isn’t Just a Business Problem. It’s a Customer Experience Problem E-commerce chargebacks due to fraud are expected to reach $30 billion by 2020. 3 False declines are valued at $118 billion per year. 2 Consumers spend 16 hours on average resolving issues after their account is taken over. 4 44% of shoppers said they will never buy from a retailer again after a data breach. 5 Business Impact Consumer Impact Source: 1 2017 SalesCycle Report ; ² MasterCard targets rising number of false declines; 3 TotalRetail 5 Ways E-Commerce Merchants Can Combat Identity Fraud; 4 Javelin 2018 Identity Fraud: Fraud Enters a New Era of Complexity; 5 TransUnion 2018 Retail Consumer Survey Insights; 6 2018 Identity Fraud Study, Javelin Strategy & Research
  • 7. 7 ATO ATTACK METHODS Phishing Attacks Credential Stuffing Social Engineering Malware, Bots, Spyware Data breaches were up 45% in 2017 Source: Identity Theft Resource Center 2017 Annual Data Breach Year End Review SIM Swapping
  • 8. 906 1070 1261 1429 1470 1899 2115 2176 2664 3141 3050 321 446 656 498 662 421 471 614 783 780 1091 0 200 400 600 800 1000 1200 1400 1600 1800 0 500 1000 1500 2000 2500 3000 3500 Data Breaches and Consumer Complaints of ID Theft & Fraud Source: 1Federal Trade Commission, Consumer Sentinel Network Databook Jan-Dec 2016 2Identity Theft Resource Center Data Breaches2 Consumer Complaints1 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017
  • 9. 9 SYMPTOMS OF AN ATO ATTACK Use of VPNs or proxy servers Using an older browser or operating system Geolocation mismatches High velocity of login attempts from one device Changing account details such as ship to address
  • 10. 10 REAL COST OF AN ATO ATTACK 2,500ACCOUNTS $75K WAGES $$$ BRAND REPUTATION 5,000 MAN HOURS TO REPAIR O n e D e v i c e $5,000 CHARGEBACK S Source: iovation Customer Case Study
  • 12. 12 COMPETING NEEDS • Less friction overall • Better customer experiences • More immediate access • Reduce cart abandonments, and grow revenue PRODUCT, CX & APP OWNERS • Reduce attack surface • Assurance on ID and access • Leverage existing capabilities, infrastructure • Real-time threat and risk indicators FRAUD & SECURITY TEAMS
  • 13. 13 Baymard estimates that 28% of carts were abandoned because of a checkout process that was too long/complicated.”
  • 14. 14 CONVERSION RATES 0% 2% 4% 6% 8% 10% 12% 14% Median Top 25% Top 10% Source: WordStream conversion rate analysis
  • 15. 15 v Or this much assurance?Do you need this much assurance? Σ Risk mitigation by authentication challenges = (Probability of compromise) x (impact)
  • 16. Match Grant Access No Match or Risk Signals Account-to- Device Pairing & Risk Evaluation Persistent Session Token Login User Access Customer Access Login Device Registration SUCCESS Step-Up *** DEVICE-BASED AUTHENTICATION ***
  • 17. 17 ATO Case Study Attack Method Social engineering through dating sites Business Losses • Thousands in lost merchandise • Payment chargebacks • Lost revenue from service cancellations • First attempted auth solution resulted in increased call center volume and complaints Benefits • Stopped account takeovers • Improved login experience increased customer satisfaction • Reduced call center volume
  • 18. 18 DEVICE-BASED AUTHENTICATION Transparent and Frictionless • SIMPLIFY access for good users • LOWER barriers to usage • IMPROVE customer experience Context and Risk • UNDERSTAND context around device • SEE risk indications before it’s too late • DETECT attempts to evade recognition or mask identity Adaptive and Dynamic • DYNAMICALLY react to changes in risk • DELIVER the right level of assurance • MINIMIZE account takeovers
  • 19. 19 s U N I F I E D , S I M P L I F I E D A N D P E R S O N A L I Z E D M F A F O R A N Y M O B I L E A P P LAUNCHKEY
  • 20. 20 LAUNCHKEY A U T H O R I Z A T I O N C A P A B I L I T I E S  Real-time authorization  Single-party or multi-party  Web or call center offline workflows
  • 21. 21 MFA BENEFITS Simple, Unified Experience • UNIFY experience across all touchpoints • REDUCE friction from multiple experiences • IMPROVE usability with every login Secure by Design • REMOVE credential stores that can be compromised and exfiltrated • LOCK DOWN with top grade cryptography • ALIGN with standards like OAuth and OpenID Customizable for Any App • WHITE-LABEL functionality • BUILD FAST with APIs for any platform • CHOOSE from a number of interactive or passive authentication options
  • 22. 22 COMBATING ATO Automated Screening: Relying on the Right Set of Tools Use the device as the 2nd Factor of authentication and challenge only when necessary Give Customers Confidence to Purchase Provide the account protection that customers demand without adding friction Working with Peers to Stop Known Threats A shared intelligence source to stop known fraud across industries and geographies Importance of Protecting Against Account Takeover Recognise and assess risks currently unseen at device level in real-time
  • 23. Q&A
  • 24. Join the chargebacks experts, Chargebacks 911, and fraud experts, iovation, as we discuss combatting 1st party chargebacks and 3rd party fraud without increasing false positives. YOU’LL LEARN ABOUT: • Problems that arise during the chargeback process. • The importance in utilizing fraud systems pre- and post- transactions. • Providing defensible evidence to win chargeback disputes. • Identify and stop repeat 3rd party fraud offenders. • Combining the power of iovation and Chargebacks 911 to mitigate overall losses. Date: February 12, 2019 Time: 10 AM PST Register Keeping Your Fraud Prevention Resolutions

Editor's Notes

  1. Thank you Wendy, and thank you to everyone for joining us today. We appreciate you taking the time, I know this is a really busy time of year for most. This is a really interesting topic. Account takeover isn’t a new phenomenon, it’s been around for years but it’s rapid increase in e-commerce is newer. So today we’re going to look at what are some of the drivers of this increase. How do criminals infiltrate accounts and what can you do to better protect customers without degrading the shopping experience.
  2. Before we do that, let’s just level set on the definition of account takeover, or ATO. Account takeover is when a known, good customers account is breached for the purposes of committing fraud. Account takeover, as I said before, is not a new phenomenon, this is something online banks, credit issuers and even gaming sites have dealt with for years, but it historically hadn’t been a large problem in e-commerce. Until recently.
  3. We were hearing from a number of our retail customers that this was a growing problem for them, so we looked at confirmed fraud reports for account takeover in e-commerce from August 2017 to August 2018. In that period we saw a 220% increase.
  4. So why the big increase? To begin with Retailers are moving away from guest checkout, adding persistent accounts and dedicated apps to meet rising customer expectations. This brings a lot of benefits, allowing retailers to expedite the checkout process and gives more identity assurance. It also had the unintended consequence of opening the the door for account takeover. Recent report found that Retailers that have both mobile sites and apps are seeing, on average, two-thirds of their online sales coming from mobile devices, 44% in-app and 23% from mobile web and the remaining 33% from desktop. It also found that conversion rates are 3x higher for mobile apps than mobile Web. With such high conversion rates, you’ll likely see that more retailers are going to be launching dedicated apps. Creating a new target for cybercriminals. Source: https://marketingland.com/retailers-shopping-apps-now-see-majority-e-commerce-sales-mobile-234931
  5. The impacts of ATO reach far beyond just the cost of the lost good and chargebacks. It can cause lasting damage to customer relationships, loss of brand reputation with current and future customers and could also put you into non-compliance with many new regulations such as the GDPR and PSD2.
  6. Let’s dig into some of the costs of ATO both from a business and customer perspective. I think one of the most interesting points is that it take consumers an average of 16 hours to resolve issues after their account is taken over. That’s a lot of time for busy shoppers to have to devote to proving that they’re not a criminal. Which is why it’s not surprising that 44% of shoppers said they would never buy from a retailer again after a data breach. You need solutions that simultaneously: Increase security Establish confidence Provide outstanding online experiences 55% of respondents said additional identity validation requirements during the checkout process is viewed positively and makes them more likely to continue their purchase.
  7. At least 16 separate security breaches occurred at retailers from January 2017 until now. Many of them were caused by flaws in payment systems, either online or in stores. - https://www.businessinsider.com/data-breaches-2018-4 Data breaches were up 45% in 2017, with the flood of stolen credentials and personal data available on the dark web fraudsters are using that data to perpetrate ATO through a variety of tactics. Credential Stuffing - According to Verizon’s 2017 Data Breach Investigations report the number of data breaches involving stolen or weak passwords has gone from 50 per cent to 66 per cent to 81 per cent during the past three years. This alarming trend clearly illustrates that today’s security isn’t working. Source: https://www.cso.com.au/mediareleases/29642/hacked-passwords-cause-81-of-data-breaches/ Social Engineering - Case study on ATO: https://drive.google.com/file/d/1G4C0IqUSTUsIm4oYLk0plsqPbMy7SB7P/view?ts=5b906058 SIM Swapping – Recent
  8. As you can see there is a very close correlation between rising consumer complaints about fraud and ID theft and data breaches
  9. 2500 accounts accessed from a single device Those 2500 accounts had made us 50k in revenue before the attempted compromise If those accounts had been compromised 1 account to process emails and return to its "original state" and keep the customer happy equaled 2 hours of work 2 hours of work x 15/hour = $30 $30 x 2500 accounts = $75,000 We would have received chargebacks and lost revenue had we been unable to stop the attacks even if we returned the accounts back to their "original" state Brand Reputation - In terms of customer trust lost and brand damage, ATO can be a nightmare for companies. Collectively, victims spent 20.7 million hours resolving ATOs in 2016, according to data from Javelin Strategy & Research. 
  10. You’re challenge is stopping ATO without deteriorating the customer experience and thus increasing cart abandonments.
  11.  WordStream’s conversion rate analysis gives an overall conversion rate of 2.35%. However, the top 25% of companies convert at 5.31% and the top 10% at 11.45%.
  12. In a well designed system you can incorporate risk signals to tailor the level of authentication to the riskiness of the transaction. So for instance if a customer is logging in from a known device and just wants to view their balance, that’s a low risk transaction. But if the same customer want logs in from a new, unknown device and wants to transfer $10,000 out of their account; that’s a much riskier transaction. This is why risk insight is so important. Not only will it allow you to apply the right level of authentication based on risk-insight, it’ll also help you create a better user experience.
  13. Device based authentication isn’t reliant on personal data that has likely been breached, and is very low friction for customers. Refer back to case study
  14. Stops fraud in real-time based on context, behavior, location Device, account, and fraud reports across subscriber and industry Global view of fraud Search & reporting for assisting with fraud forensics After initial integration, fraud rules can be easily modified without additional coding
  15. MFA used three factors: Knowledge factor – something you know, i.e. a password, the PIN for your ATM or a knowledge based question Possession Factor – something you have Inherence – Something you ARE, i.e. facial recognition, my thumbprint, the way heartbeat Do you want to have to manage these different factors within different systems, or would you rather drive all authentication through one fully configurable experience We’re still missing a piece with all of this, the customer. So how can we make this all easier on the customer?
  16. ATO occurs when a fraudster exploits a customer’s personal information, stored with a merchant, to take control of an existing account or establish a new one, and then uses the account to make unauthorized transactions. Look for retailer with recurring or subscription payment. Automation Finding the right tools to automatically screen for fraud is key to achieve the right balance among minimizing losses, maximizing revenues, and controlling costs. Businesses can lower their fraud losses by deploying accurate, automated detection, and avoid unnecessary overhead by saving manual review for only the most ambiguous orders. During the automated screening process, a combination of tools—including validation services, proprietary data, multi-merchant data, and device tracking—is typically applied to determine the likelihood of fraud.