Chris Farmer Director of Fraud Strategy

Slides:



Advertisements
Similar presentations
Achieving online trust through Mutual Authentication.
Advertisements

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Building Confidence in E-government Services ITU-T Workshop on.
Help File For User Creation Click the “Course” button for Creating/Add User.
Stephen Upton – 2 June 2005EURIM Personal Identity Working Group Secure identity – a personal view Stephen Upton Office: Mobile:
EURIM Personal Identity Group Data Sharing Model for Public Services 13 th January 2005 Jim Lound © Experian Ltd 2005.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
Enter date here Authenticate Pro Helen Clift 15 th November 2005.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Functional component terminology - thoughts C. Tilton.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
C REDIT H ISTORY A ND R ATINGS 1 Copyright © Texas Education Agency, All rights reserved.
Chapter 21 Section 3. Banking Services What Banks Do Banks accept deposits to create different types of accounts and then use these deposited funds to.
FDIC Money Smart for Young Adults
Address Verification Service (AVS). Introduction Introduction o The internet Address Verification System (I-AVS) is a business service for resolving the.
© 2004 TransUnion LLC. All Rights Reserved. August 10, 2005 Seven Easy Steps to Fraud Prevention Northwestern University Clifton M. O’Neal Director, Corporate.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
The Need for Trusted Credentials Information Assurance in Cyberspace Judith Spencer Chair, Federal PKI Steering Committee
Policy, Trust and Technology Mitigating Risk in the Digital World David L. Wasley Camp 2006 © David L. Wasley, 2006.
Identity Relationship Management The Next Evolution of Identity and Access Management for the Internet of Everything.
Identity verification in the private sector Chris Gration 30 March 2006.
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Scams & Schemes Common Sense Media.
30/09/09Copyright - The Earl of Erroll1 Lord Erroll - Merlin Member of the HOUSE of LORDS - an Independent Peer PITCOMParliamentary Information Technology.
By Renata Jaruseviciute 1 ©Renata Jaruseviciute.  Financial Crime definition & types  Regulatory body  Legislation  Questions to be asked yourself.
Establishing a Digital Identity Martin Roe - Director of Technology, Royal Mail ViaCode.
“Stronger” Web Authentication: A Security Review Cory Scott.
Garry Compton Manager Government Authentication ANTA Workshop 05/08/03 Canberra, Australia An update on Commonwealth Authentication.
ELECTRONIC CONVEYANCING WORKSHOPS 2009 Simon Libbis Executive Director Ann Kinnear Operations Manager.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Director Education E-Fraud Spring What is E-fraud? Credit & Debit Card Fraud Internet Fraud Phishing Pharming Advance Fee Fraud.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
Windows CardSpace Martin Parry Developer Evangelist Microsoft
Identity Theft The Dangers Involved and How It Affects You!
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 ICT and E-Business Strategies For Development Geneva, October.
Presented By Plano Police Department Crime Prevention Unit.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 ©2016 Experian Limited. All rights reserved. Experian Public. ©2016 Experian Limited. All rights reserved. Experian and the marks used herein are trademarks.
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Fraudulent and Questioned Documents. Top 5 Countries Originating Fraud.
U.S. Department of Agriculture eGovernment Program eAuthentication Initiative eAuthentication Solution Screens Review Meeting October 7, 2003.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
© 2009 Experian Limited. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
Identity Management Overview
Nick Mothershaw - Experian
Sandy Porter - Strategy Director Avoco Secure
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Authentication Interact Cloud.
Data and Applications Security Developments and Directions
Authentication.
Tokens & Proofing De-Mystified
Protect yourself from Fraud
Who Uses Encryption? Module 7 Section 3.
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Laws for Secure Credentialing
Legal Framework for Civil Registration, Vital Statistics
ITU Telecommunication Development Bureau (BDT)
Introduction of ISO/IEC Identity Proofing
Copyright © Texas Education Agency, All rights reserved.
Presentation transcript:

Chris Farmer Director of Fraud Strategy Increase use of data and trusted third parties Taking the risk out of the system Chris Farmer Director of Fraud Strategy

The formula for fighting fraud Fraud prevention Identifying the parties Establishing trust

Who do you trust? Fraud Prevention Organisations Government Law Enforcement Fraud Prevention Organisations Credit Reference Agencies Consumers It depends on the question!

Existing Organisation-centric identity model Registration Identity Verification Service Provider Is this Amy? I’m Amy Yes, it’s Amy Issue and manage credentials Password Token

Existing Organisation-centric identity model Interaction I’m Amy and here are my credentials Phishing / Pharming I’m pretending to be Amy and here are her credentials Mr F.R.Audster

How some identity providers will change Identity Verification Service Provider Identity Management Service Provider Identity Verification Data Identities Attributes Trusted Credentials Voice Digital certificate Token

Tomorrow’s Customer-centric identity model Registration I’m Amy Register Amy Voice Token Password Issue and manage credentials Check that Amy is Amy

Tomorrow’s Customer-centric identity model Interaction It’s Amy again Is it really Amy? It’s Amy and here is her information Password Prove it is Amy Token Voice

It’s Amy and here is her information Tomorrow’s Customer-centric identity model Re-using my established identity I’m Amy Do you know about Amy? It’s Amy and here is her information Password Prove it is Amy Token Voice

What’s in it for Amy? Less time spent filling in forms and better data accuracy Easier to prove who she is = Easier to get organisations to trust information provided Confidence in protection from identity fraud ≠

What’s in it for the organisation? Better data accuracy means more informed decision making Faster sign-up process means less abandonment Higher confidence in who you are dealing with at EVERY interaction

The challenge for the Identity Management Service Provider Young People New to Country Older People Documents Identity Thieves

The drivers to make this happen The UK Government Identity Assurance Programme National Identity Card Scheme Private Sector Identity Assurance Providers Universal Credit

…so what does the future hold

Thank you for your attention Chris Farmer chris.farmer@experian.com 07791 340886 © 2012 Experian Limited. All rights reserved.