SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
1© Copyright 2014 EMC Corporation. All rights reserved.
Julie Conroy
Research Director
Aite Group
Rueben Rodriguez
Principal Product Marketing Manager
RSA
2014 Card and
Payments Fraud
Forecast
2© Copyright 2014 EMC Corporation. All rights reserved.
Agenda
• EMV: Coming soon to a card near you
• E-commerce fraud trends
• Best practices for securing payment cards
• Case studies in financial and retail
3© Copyright 2013 EMC Corporation. All rights reserved.
EMV: Coming Soon to a
Card Near You
©2014 Aite Group LLC.
Page 4
The last G-20 country to embrace the EMV standard
©2014 Aite Group LLC.
Page 5
EMV: Why now?
• Interoperability
• Mobile payments
• Increasing fraud
• Decreasing costs
©2014 Aite Group LLC.
Page 6
Important milestones
PCI annual assessment forgivenessOctober 2012
Acquirer processing updates in placeApril 2013
Maestro liability shiftApril 2013
POS liability shiftOctober 2015
ATM liability shift (MC)October 2016
ATM liability shift (Visa)October 2017
Fuel dispenser liability shiftOctober 2017
©2014 Aite Group LLC.
Page 7
EMV: Coming Soon
Source: Aite Group interviews with payment networks and 18 large U.S. issuers,
April to May 2014
0.4%
4%
25%
70%
91%
98%
2012 2013 e2014 e2015 e2016 e2017
Percentage of U.S. Credit Cards with EMVCapability
©2014 Aite Group LLC.
Page 8
EMV’s impact in other countries
$245.4
$199.6
$171.5
$152.6 $145.3
$111.5
$128.4
$140.4
$176.1
$259.5 $268.6
$299.4
2008 2009 2010 2011 2012 2013
Changes in Canadian Credit Card Fraud Losses, 2008 to 2013 (In millions
of CAD)
Source: Canadian Bankers Association
©2014 Aite Group LLC.
Page 9
The U.S. will not be an exception
$2.1
$2.6
$2.8 $2.9 $3.1
$3.8
$5.2
$6.4
2011 2012 2013 e2014 e2015 e2016 e2017 e2018
U.S. CNP Credit Card Fraud Losses,
2011 to e2018 (In US$ Billions)
Source: Aite Group interviews with payment networks and 18 large U.S. issuers,
April to May 2014
10© Copyright 2013 EMC Corporation. All rights reserved.
E-Commerce Fraud
Trends
11© Copyright 2014 EMC Corporation. All rights reserved.
Mobile Is The New “Web”
• Sky rocketing usage of mobile devices creates a new
opportunity for fraudsters
• Mobile OS malware and phishing scams on the rise
• Criminal underground is all pointing to mobile with
web variants
– CitMo, ZitMo, Perkele
Banking
App
12© Copyright 2014 EMC Corporation. All rights reserved.
Bank Mobile Traffic is on the Rise
~25% of confirmed fraud is from the mobile channel
13© Copyright 2014 EMC Corporation. All rights reserved.
Citadel – RSA Underground Analysis
Mobile Malware & HTML Injection
14© Copyright 2014 EMC Corporation. All rights reserved.
Citadel
15© Copyright 2014 EMC Corporation. All rights reserved.
Citadel
16© Copyright 2014 EMC Corporation. All rights reserved.
Citadel
17© Copyright 2014 EMC Corporation. All rights reserved.
ZitMO
18© Copyright 2014 EMC Corporation. All rights reserved.
CNP Is Getting The “Squeeze”
• Customers don’t just want but demand ability to shop
on-line at anytime
• Fraud liability and customer convenience are at odds
• Fraud is being pushed to the path of least resistance
• Ecommerce sites are being manipulated
– Stolen card testing – validate card before selling
– Buy physical/digital goods with stolen cards
• EMV is now in full effect or at least underway
19© Copyright 2014 EMC Corporation. All rights reserved.
• Attacks on ecommerce sites is becoming the norm
• Threats come in various forms
– Botnet – DDOS
– Business logic abuse
– Competitive intel & scraping
– eCoupons abuse
• Very hard to detect or prevent
• Impacts to sales and brand are significant
Ecommerce Website Attacks
On The Rise
20© Copyright 2014 EMC Corporation. All rights reserved.
RSA Survey: Financial & Brand Revenue
Impact
Average of 5% of total on-line revenues impacted by fraud
21© Copyright 2014 EMC Corporation. All rights reserved.
3DS Is Evolving….
For both Issuers & Merchants
• RSA 3DS card transaction volume has grown 19% YoY
• Fraudsters targeting username/password deployments
• RSA analysis shows top 3DS fraud focus:
– Travel in Europe
– “Mail Order” in US
• Merchants have significant flexibility
– Implications vary based upon which side of the coin you represent
• Risk-based authentication is now preferred method
• RSA risk-based issuers prevent fraud on average ~$3M+/month
22© Copyright 2014 EMC Corporation. All rights reserved.
Best Practices for
Securing Payment Cards
©2014 Aite Group LLC.
Page 23
Technology to the rescue
• Application layer
• Behavioral analytics
• 3-D Secure
• Behind the scenes
• Tokenization
o Issuer
o Merchant
©2014 Aite Group LLC.
Page 24
Merchants are embracing these solutions
3%
13%
6%
13%
13%
19%
13%
9%
31%
31%
19%
19%
31%
25%
9%
47%
Tokenization
Behavioral
analytics
3-D Secure
Q: Please indicate the effectiveness of each of these technologies at
reducing card fraud and data security issues. (n=32)
Very low impact Low impact Moderate impact
High impact Very high impact No opinion/Don't know
Source: Aite Group survey of fraud executives at 36 large merchants, March to May
2014
©2014 Aite Group LLC.
Page 25
Many merchants and FIs are actively
deploying technology to mitigate CNP fraud
44%
22%
22%
16%
3%
3%
13%
22%
Tokenization
(n=26)
3-D Secure (n=20)
Q: What is your plan to deploy the following technologies?
Using today
On the 1- to 2-
year roadmap
Plan to use, but
not in the next 2
years
No plansto use
Source: Aite Group survey of fraud executives at 36 large merchants, March to May
2014
26© Copyright 2014 EMC Corporation. All rights reserved.
Case Studies
27© Copyright 2014 EMC Corporation. All rights reserved.
3DS is REAL!! - Case Study For A Card Issuer
Protecting Transactions Without The Cardholder Hassle
28© Copyright 2013 EMC Corporation. All rights reserved.
29© Copyright 2011 EMC Corporation. All rights reserved.
~400,000
30© Copyright 2014 EMC Corporation. All rights reserved.
Questions and Additional Resources
 Join the fraud conversation in the
RSA Fraud & Risk Intelligence
Community!
– https://community.emc.com/co
mmunity/connect/rsaxchange/fr
aud
 Follow the RSA Fraud Research
team on Twitter
– @RSAFraudAction
 Visit the RSA Online Fraud
Resource Center
– www.emc.com/onlinefraud

Weitere ähnliche Inhalte

Was ist angesagt?

2015 IAD Survey Report, FINAL
2015 IAD Survey Report, FINAL2015 IAD Survey Report, FINAL
2015 IAD Survey Report, FINALBryan Bauer
 
Villiger Book Section #1
Villiger Book Section #1Villiger Book Section #1
Villiger Book Section #1Peter Villiger
 
Huge And Smart Progressive Case
Huge And Smart   Progressive CaseHuge And Smart   Progressive Case
Huge And Smart Progressive Casesmehro
 
Villiger Book Section #2
Villiger Book Section #2 Villiger Book Section #2
Villiger Book Section #2 Peter Villiger
 
Will Usage Based Insurance (UBI) disrupt the insurance industry?
Will Usage Based Insurance (UBI) disrupt the insurance industry?Will Usage Based Insurance (UBI) disrupt the insurance industry?
Will Usage Based Insurance (UBI) disrupt the insurance industry?Mateusz Maj
 
ITL insurtech 5 value levers for auto telematics
ITL insurtech 5 value levers for auto telematicsITL insurtech 5 value levers for auto telematics
ITL insurtech 5 value levers for auto telematicsMatteo Carbone
 
Progressive Case Study.Scm
Progressive Case Study.ScmProgressive Case Study.Scm
Progressive Case Study.Scmsmehro
 
Progressive Corporation.Sssg
Progressive Corporation.SssgProgressive Corporation.Sssg
Progressive Corporation.Sssgsmehro
 
Mastergard vsib-2011
Mastergard vsib-2011Mastergard vsib-2011
Mastergard vsib-2011itiint
 
Enigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel AvivEnigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel AvivNOAH Advisors
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINALChris Evans
 
"Light Rises from the East" - Opportunities in the Orient for Payments
"Light Rises from the East" - Opportunities in the Orient for Payments"Light Rises from the East" - Opportunities in the Orient for Payments
"Light Rises from the East" - Opportunities in the Orient for Paymentsiyzico
 
Progressive Corp..Ashky
Progressive Corp..AshkyProgressive Corp..Ashky
Progressive Corp..Ashkysmehro
 
Connected cars and insurance claims - a new paradigm
Connected cars and insurance claims  - a new paradigmConnected cars and insurance claims  - a new paradigm
Connected cars and insurance claims - a new paradigmMatteo Carbone
 
Connected Insurance Observatory InsurTech
Connected Insurance Observatory InsurTechConnected Insurance Observatory InsurTech
Connected Insurance Observatory InsurTechMatteo Carbone
 
Oseven at Open Coffee Athens LXXXII
Oseven at Open Coffee Athens LXXXIIOseven at Open Coffee Athens LXXXII
Oseven at Open Coffee Athens LXXXIIOpen Coffee Greece
 
IBM Telematics for Insurance
IBM Telematics for InsuranceIBM Telematics for Insurance
IBM Telematics for InsuranceIBM Analytics
 

Was ist angesagt? (20)

2015 IAD Survey Report, FINAL
2015 IAD Survey Report, FINAL2015 IAD Survey Report, FINAL
2015 IAD Survey Report, FINAL
 
Villiger Book Section #1
Villiger Book Section #1Villiger Book Section #1
Villiger Book Section #1
 
Huge And Smart Progressive Case
Huge And Smart   Progressive CaseHuge And Smart   Progressive Case
Huge And Smart Progressive Case
 
Villiger Book Section #2
Villiger Book Section #2 Villiger Book Section #2
Villiger Book Section #2
 
Tentacles of fraud
Tentacles of fraud Tentacles of fraud
Tentacles of fraud
 
Will Usage Based Insurance (UBI) disrupt the insurance industry?
Will Usage Based Insurance (UBI) disrupt the insurance industry?Will Usage Based Insurance (UBI) disrupt the insurance industry?
Will Usage Based Insurance (UBI) disrupt the insurance industry?
 
ITL insurtech 5 value levers for auto telematics
ITL insurtech 5 value levers for auto telematicsITL insurtech 5 value levers for auto telematics
ITL insurtech 5 value levers for auto telematics
 
Progressive Case Study.Scm
Progressive Case Study.ScmProgressive Case Study.Scm
Progressive Case Study.Scm
 
Progressive Corporation.Sssg
Progressive Corporation.SssgProgressive Corporation.Sssg
Progressive Corporation.Sssg
 
Mastergard vsib-2011
Mastergard vsib-2011Mastergard vsib-2011
Mastergard vsib-2011
 
Enigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel AvivEnigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel Aviv
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINAL
 
"Light Rises from the East" - Opportunities in the Orient for Payments
"Light Rises from the East" - Opportunities in the Orient for Payments"Light Rises from the East" - Opportunities in the Orient for Payments
"Light Rises from the East" - Opportunities in the Orient for Payments
 
Top 10 Ubi Myths
Top 10 Ubi MythsTop 10 Ubi Myths
Top 10 Ubi Myths
 
Progressive Corp..Ashky
Progressive Corp..AshkyProgressive Corp..Ashky
Progressive Corp..Ashky
 
Connected cars and insurance claims - a new paradigm
Connected cars and insurance claims  - a new paradigmConnected cars and insurance claims  - a new paradigm
Connected cars and insurance claims - a new paradigm
 
Connected Insurance Observatory InsurTech
Connected Insurance Observatory InsurTechConnected Insurance Observatory InsurTech
Connected Insurance Observatory InsurTech
 
Oseven at Open Coffee Athens LXXXII
Oseven at Open Coffee Athens LXXXIIOseven at Open Coffee Athens LXXXII
Oseven at Open Coffee Athens LXXXII
 
Connected car slides
Connected car slidesConnected car slides
Connected car slides
 
IBM Telematics for Insurance
IBM Telematics for InsuranceIBM Telematics for Insurance
IBM Telematics for Insurance
 

Andere mochten auch

The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)EMC
 
ISAC constitution
ISAC constitution ISAC constitution
ISAC constitution Anuj Ramaiya
 
Designing API for mobile apps (MobileWarsaw 19.01.2015)
Designing API for mobile apps (MobileWarsaw 19.01.2015)Designing API for mobile apps (MobileWarsaw 19.01.2015)
Designing API for mobile apps (MobileWarsaw 19.01.2015)Wojtek Erbetowski
 
Provisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of ProvisioningProvisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of ProvisioningEMC
 
4 things you_cannot_recover
4 things you_cannot_recover4 things you_cannot_recover
4 things you_cannot_recoverChandan Dubey
 
Digipak research
Digipak researchDigipak research
Digipak researchloousmith
 
Webinar Tracker ABCs
Webinar Tracker ABCsWebinar Tracker ABCs
Webinar Tracker ABCsResearch Now
 
Flash Implications in Enterprise Storage Array Designs
Flash Implications in Enterprise Storage Array DesignsFlash Implications in Enterprise Storage Array Designs
Flash Implications in Enterprise Storage Array DesignsEMC
 
система профориентации и основные её направления
система профориентации и основные её направлениясистема профориентации и основные её направления
система профориентации и основные её направленияТатьяна Глинская
 
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגונית
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגוניתמנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגונית
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגוניתShirley Kantor
 
4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)Khendle Christie
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
Math Orientation Summer 2015
Math Orientation Summer 2015Math Orientation Summer 2015
Math Orientation Summer 2015Dan Etz
 
01 monday factors of production
01 monday factors of production01 monday factors of production
01 monday factors of productionTravis Klein
 

Andere mochten auch (20)

Jose esteves 1
Jose esteves 1Jose esteves 1
Jose esteves 1
 
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
 
ISAC constitution
ISAC constitution ISAC constitution
ISAC constitution
 
Designing API for mobile apps (MobileWarsaw 19.01.2015)
Designing API for mobile apps (MobileWarsaw 19.01.2015)Designing API for mobile apps (MobileWarsaw 19.01.2015)
Designing API for mobile apps (MobileWarsaw 19.01.2015)
 
Provisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of ProvisioningProvisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of Provisioning
 
4 things you_cannot_recover
4 things you_cannot_recover4 things you_cannot_recover
4 things you_cannot_recover
 
Digipak research
Digipak researchDigipak research
Digipak research
 
Webinar Tracker ABCs
Webinar Tracker ABCsWebinar Tracker ABCs
Webinar Tracker ABCs
 
Windows Server 2012 Disk Dedupe
Windows Server 2012 Disk DedupeWindows Server 2012 Disk Dedupe
Windows Server 2012 Disk Dedupe
 
Day 2 rebellion
Day 2 rebellionDay 2 rebellion
Day 2 rebellion
 
Flash Implications in Enterprise Storage Array Designs
Flash Implications in Enterprise Storage Array DesignsFlash Implications in Enterprise Storage Array Designs
Flash Implications in Enterprise Storage Array Designs
 
система профориентации и основные её направления
система профориентации и основные её направлениясистема профориентации и основные её направления
система профориентации и основные её направления
 
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגונית
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגוניתמנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגונית
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגונית
 
4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)
 
Friday japan
Friday japanFriday japan
Friday japan
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Clientes2
Clientes2Clientes2
Clientes2
 
Formulario ventas
Formulario ventasFormulario ventas
Formulario ventas
 
Math Orientation Summer 2015
Math Orientation Summer 2015Math Orientation Summer 2015
Math Orientation Summer 2015
 
01 monday factors of production
01 monday factors of production01 monday factors of production
01 monday factors of production
 

Ähnlich wie 2014 Card and Payments Fraud Forecast

Get Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present FraudGet Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present FraudTransUnion
 
Emv for f_is_webinar
Emv for f_is_webinarEmv for f_is_webinar
Emv for f_is_webinarWelchATM
 
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...NAFCU Services Corporation
 
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?Solutionreach
 
Emv for merchants 031715
Emv for merchants 031715Emv for merchants 031715
Emv for merchants 031715WCapra
 
EMV for Merchants
EMV for MerchantsEMV for Merchants
EMV for MerchantsWCapra
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Anil Jain
 
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”Werbeplanung.at Summit
 
EMV and Parking - 6 Months on
EMV and Parking - 6 Months onEMV and Parking - 6 Months on
EMV and Parking - 6 Months onCreditcall
 
Aviso EMV webinar
Aviso EMV webinarAviso EMV webinar
Aviso EMV webinarAvisoslides
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
Risk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechRisk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechGeo Coelho
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-securityKerri Lorch
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupLaurent Pacalin
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The i-Capital Africa Institute
 
Mobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk ManagementMobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk ManagementGeo Coelho
 
Payment Gateway by iPay88
Payment Gateway by iPay88Payment Gateway by iPay88
Payment Gateway by iPay88sitecmy
 

Ähnlich wie 2014 Card and Payments Fraud Forecast (20)

Get Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present FraudGet Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present Fraud
 
SBMS EMV Doc
SBMS EMV Doc SBMS EMV Doc
SBMS EMV Doc
 
Emv for f_is_webinar
Emv for f_is_webinarEmv for f_is_webinar
Emv for f_is_webinar
 
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...
 
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
 
Emv for merchants 031715
Emv for merchants 031715Emv for merchants 031715
Emv for merchants 031715
 
EMV for Merchants
EMV for MerchantsEMV for Merchants
EMV for Merchants
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”
 
EMV and Parking - 6 Months on
EMV and Parking - 6 Months onEMV and Parking - 6 Months on
EMV and Parking - 6 Months on
 
Aviso EMV webinar
Aviso EMV webinarAviso EMV webinar
Aviso EMV webinar
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Mobile Payment Security Trends for the Future
Mobile Payment Security Trends for the FutureMobile Payment Security Trends for the Future
Mobile Payment Security Trends for the Future
 
Risk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechRisk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTech
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-security
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite Group
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
 
EMV: What you Need to Know
EMV: What you Need to KnowEMV: What you Need to Know
EMV: What you Need to Know
 
Mobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk ManagementMobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk Management
 
Payment Gateway by iPay88
Payment Gateway by iPay88Payment Gateway by iPay88
Payment Gateway by iPay88
 

Mehr von EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Mehr von EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Kürzlich hochgeladen

Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Kürzlich hochgeladen (20)

Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

2014 Card and Payments Fraud Forecast

  • 1. 1© Copyright 2014 EMC Corporation. All rights reserved. Julie Conroy Research Director Aite Group Rueben Rodriguez Principal Product Marketing Manager RSA 2014 Card and Payments Fraud Forecast
  • 2. 2© Copyright 2014 EMC Corporation. All rights reserved. Agenda • EMV: Coming soon to a card near you • E-commerce fraud trends • Best practices for securing payment cards • Case studies in financial and retail
  • 3. 3© Copyright 2013 EMC Corporation. All rights reserved. EMV: Coming Soon to a Card Near You
  • 4. ©2014 Aite Group LLC. Page 4 The last G-20 country to embrace the EMV standard
  • 5. ©2014 Aite Group LLC. Page 5 EMV: Why now? • Interoperability • Mobile payments • Increasing fraud • Decreasing costs
  • 6. ©2014 Aite Group LLC. Page 6 Important milestones PCI annual assessment forgivenessOctober 2012 Acquirer processing updates in placeApril 2013 Maestro liability shiftApril 2013 POS liability shiftOctober 2015 ATM liability shift (MC)October 2016 ATM liability shift (Visa)October 2017 Fuel dispenser liability shiftOctober 2017
  • 7. ©2014 Aite Group LLC. Page 7 EMV: Coming Soon Source: Aite Group interviews with payment networks and 18 large U.S. issuers, April to May 2014 0.4% 4% 25% 70% 91% 98% 2012 2013 e2014 e2015 e2016 e2017 Percentage of U.S. Credit Cards with EMVCapability
  • 8. ©2014 Aite Group LLC. Page 8 EMV’s impact in other countries $245.4 $199.6 $171.5 $152.6 $145.3 $111.5 $128.4 $140.4 $176.1 $259.5 $268.6 $299.4 2008 2009 2010 2011 2012 2013 Changes in Canadian Credit Card Fraud Losses, 2008 to 2013 (In millions of CAD) Source: Canadian Bankers Association
  • 9. ©2014 Aite Group LLC. Page 9 The U.S. will not be an exception $2.1 $2.6 $2.8 $2.9 $3.1 $3.8 $5.2 $6.4 2011 2012 2013 e2014 e2015 e2016 e2017 e2018 U.S. CNP Credit Card Fraud Losses, 2011 to e2018 (In US$ Billions) Source: Aite Group interviews with payment networks and 18 large U.S. issuers, April to May 2014
  • 10. 10© Copyright 2013 EMC Corporation. All rights reserved. E-Commerce Fraud Trends
  • 11. 11© Copyright 2014 EMC Corporation. All rights reserved. Mobile Is The New “Web” • Sky rocketing usage of mobile devices creates a new opportunity for fraudsters • Mobile OS malware and phishing scams on the rise • Criminal underground is all pointing to mobile with web variants – CitMo, ZitMo, Perkele Banking App
  • 12. 12© Copyright 2014 EMC Corporation. All rights reserved. Bank Mobile Traffic is on the Rise ~25% of confirmed fraud is from the mobile channel
  • 13. 13© Copyright 2014 EMC Corporation. All rights reserved. Citadel – RSA Underground Analysis Mobile Malware & HTML Injection
  • 14. 14© Copyright 2014 EMC Corporation. All rights reserved. Citadel
  • 15. 15© Copyright 2014 EMC Corporation. All rights reserved. Citadel
  • 16. 16© Copyright 2014 EMC Corporation. All rights reserved. Citadel
  • 17. 17© Copyright 2014 EMC Corporation. All rights reserved. ZitMO
  • 18. 18© Copyright 2014 EMC Corporation. All rights reserved. CNP Is Getting The “Squeeze” • Customers don’t just want but demand ability to shop on-line at anytime • Fraud liability and customer convenience are at odds • Fraud is being pushed to the path of least resistance • Ecommerce sites are being manipulated – Stolen card testing – validate card before selling – Buy physical/digital goods with stolen cards • EMV is now in full effect or at least underway
  • 19. 19© Copyright 2014 EMC Corporation. All rights reserved. • Attacks on ecommerce sites is becoming the norm • Threats come in various forms – Botnet – DDOS – Business logic abuse – Competitive intel & scraping – eCoupons abuse • Very hard to detect or prevent • Impacts to sales and brand are significant Ecommerce Website Attacks On The Rise
  • 20. 20© Copyright 2014 EMC Corporation. All rights reserved. RSA Survey: Financial & Brand Revenue Impact Average of 5% of total on-line revenues impacted by fraud
  • 21. 21© Copyright 2014 EMC Corporation. All rights reserved. 3DS Is Evolving…. For both Issuers & Merchants • RSA 3DS card transaction volume has grown 19% YoY • Fraudsters targeting username/password deployments • RSA analysis shows top 3DS fraud focus: – Travel in Europe – “Mail Order” in US • Merchants have significant flexibility – Implications vary based upon which side of the coin you represent • Risk-based authentication is now preferred method • RSA risk-based issuers prevent fraud on average ~$3M+/month
  • 22. 22© Copyright 2014 EMC Corporation. All rights reserved. Best Practices for Securing Payment Cards
  • 23. ©2014 Aite Group LLC. Page 23 Technology to the rescue • Application layer • Behavioral analytics • 3-D Secure • Behind the scenes • Tokenization o Issuer o Merchant
  • 24. ©2014 Aite Group LLC. Page 24 Merchants are embracing these solutions 3% 13% 6% 13% 13% 19% 13% 9% 31% 31% 19% 19% 31% 25% 9% 47% Tokenization Behavioral analytics 3-D Secure Q: Please indicate the effectiveness of each of these technologies at reducing card fraud and data security issues. (n=32) Very low impact Low impact Moderate impact High impact Very high impact No opinion/Don't know Source: Aite Group survey of fraud executives at 36 large merchants, March to May 2014
  • 25. ©2014 Aite Group LLC. Page 25 Many merchants and FIs are actively deploying technology to mitigate CNP fraud 44% 22% 22% 16% 3% 3% 13% 22% Tokenization (n=26) 3-D Secure (n=20) Q: What is your plan to deploy the following technologies? Using today On the 1- to 2- year roadmap Plan to use, but not in the next 2 years No plansto use Source: Aite Group survey of fraud executives at 36 large merchants, March to May 2014
  • 26. 26© Copyright 2014 EMC Corporation. All rights reserved. Case Studies
  • 27. 27© Copyright 2014 EMC Corporation. All rights reserved. 3DS is REAL!! - Case Study For A Card Issuer Protecting Transactions Without The Cardholder Hassle
  • 28. 28© Copyright 2013 EMC Corporation. All rights reserved.
  • 29. 29© Copyright 2011 EMC Corporation. All rights reserved. ~400,000
  • 30. 30© Copyright 2014 EMC Corporation. All rights reserved. Questions and Additional Resources  Join the fraud conversation in the RSA Fraud & Risk Intelligence Community! – https://community.emc.com/co mmunity/connect/rsaxchange/fr aud  Follow the RSA Fraud Research team on Twitter – @RSAFraudAction  Visit the RSA Online Fraud Resource Center – www.emc.com/onlinefraud