NOT FOR UNAUTHORISED DISTRIBUTION www.Alt3.co.uk 1 CYBER THEFT: 2014 – and beyond. The wholesale organised theft and use of credit card details www.alt3.co.uk.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Combating Fraud Risk in Payment Systems. 2 Defining Fraud..a deliberate act of omission or commission by any person, carried out in the course of a banking.
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Payments and Loyalty Program Issues for the Game Industry Veronica McGregor November 2008.
Background Credit reporting agencies are a key player, helping facilitate modern commerce Credit records help predict the risk of a transaction Credit.
Let’s Get Financially Focused! Objectives Students will be able to: 1. Define credit. 2. Explain the negative impact that counterfeiting, forgery, fraud,
Chapter 14 Managing Your Money Chapter 14 Managing Your Money Lesson 14.2 You, the Consumer Lesson 14.2 You, the Consumer.
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
NOT FOR UNAUTHORISED DISTRIBUTION 1 CYBER THREAT: 2015 and beyond – the age of stealth terror and crime.
Future trends in Retail Payments Ayse Zoodsma-Sungur and Rui Pimentel Sixth Macedonian Financial Sector Conference on Payments and Securities Settlement.
Blackberry(RIM) Research In Motion Limited Group Members 韋榮威 張睿宏 王奕心.
CyberSource Strengths
Confidential. This presentation is provided for the recipient only and cannot be reproduced or shared without Fair Isaac Corporation's express consent.
Anti Money Laundering (AML) An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
The Third SIPR Annual Conference Communities and Policing: evidence and innovation in Scotland Police Organisation – Tackling Business Crime in Partnership.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Breaking Trust On The Internet
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
Quatro MPN - Introduction Save with profit Start.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Electronic Banking Outline Retail payments and financial services
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Cyber Resilience Simon Onyons Financial Stability – Resilience Team.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Anti-Fraud Committee ICT Symposium. “ To play a core role in the growth and stability of the financial sector, through advocacy and representation; and.
Copyright  2009 McGraw-Hill Australia Pty Ltd PPTs t/a International Marketing by Cateora Slides prepared by Kate Mizerski, Edith Cowan University 5-1.
Electronic Transaction Use & Risk of Identity Theft.
Duncan Woodhouse – Assistant Registrar for Information Security, Risk Management and Business Continuity Helen Wollerton – Administrative Officer (Legal.
Travillon Consultants
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
De Nederlandsche Bank Eurosysteem Card Payments and Internet Banking Thijs Kettenis 2nd Conference of the Macedonian Financial Sector on Payments and Securities.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Grupo Santander Competition policy and financial market integration European Parliament Financial Services Forum Brussels – 15 June 2005.
De Nederlandsche Bank Eurosysteem Actual Developments of Payments and Securities Settlement Systems Michael van Doeveren 2nd Conference of the Macedonian.
Visa Europe Confidential PCI DSS Protecting your business Lara Fiorani, Visa Europe Basel 25 April, 2006.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
New transactional technology and exclusion? Scottish Executive financial inclusion conference October 2007.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
Company factsheet May 2010 Experian is the leading global information services company, providing data and analytical tools. The company helps businesses.
The next generation of payments is here. Is your business ready?
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Fraud and Risk in the Electronic Payment Space Michelle Marshall-Thompson VP, Fraud/Risk Officer FirstMerit Merchant Bankcard.
Get Safe Online Expert advice for everyone In association with.
Execute sales transactions. Sales transactions include: Cash or check Debit card sales Credit card sales Layaway sales On approval sale Cash-on-delivery.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
ICT & Crime Introduction. Homework read THREE stories from ict.com/news/news_stories/news_crime.htm & produce a 3-fold leaflet describing/discussing.
Adam Shields Sarah Purdy. What is PayPal? PayPal is an online payment service that allows individuals and businesses to transfer funds electronically.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Protecting Your Assets By Preventing Identity Theft 1.
Payment systems. Debit or Credit cards  Let the customers pay by taking money directly form their account  Allow the money to borrow the money and the.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?
CRIMINAL LAW 1. Ahmed T. Ghandour.. CRIME TODAY.
A Brief Introduction Radiant Pay, a global provider of payment processing services to all kinds of business, Radiant Pay Services.
Protecting Your Assets By Preventing Identity Theft
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
Anti Money Laundering (AML)
Association of Integrated Schools Bursars Conference
What is economies of scale?
When you get caught for Identity Theft
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Presentation transcript:

NOT FOR UNAUTHORISED DISTRIBUTION 1 CYBER THEFT: 2014 – and beyond. The wholesale organised theft and use of credit card details Alt3 understanding future risks and opportunities

NOT FOR UNAUTHORISED DISTRIBUTION 2 BACKGROUND Pre-2012: mostly small scale theft of credit card details widespread increasing large scale organised crime involvement more value than drugs and arms trade increasing sophistication “cat and mouse” between security and theft increasing sophistication of security some sectors / countries lacking sophistication of security

NOT FOR UNAUTHORISED DISTRIBUTION 3 BACKGROUND : small scale, widespread theft continues notable prevalence of theft by large scale organised crime overall value of theft increasing major input into other areas of organised crime increasing incursions into big business and high profile IP increasing scrutiny from police and security services greater sophistication of card / data security some countries continuing to lag behind - therefore targets

NOT FOR UNAUTHORISED DISTRIBUTION 4 MAIN TARGET 2014: United States Sector:retail Volumes:millions of individual card details - data How:till payment systems Value:$hundreds of millions Route:malware Reason:a lack of sophisticated security and a lack of data standards (PCI DSS) making “whole” data easy to recognise and steal UPSIDE: US companies have a statutory obligation to “go public” as soon as they discover a data breach

NOT FOR UNAUTHORISED DISTRIBUTION 5 EUROPE 2014 – obscuring data... The growth of Near Field Communication (NFC): “contactless” technology that does not leave the CVV or the card holders name The widespread use of chip and pin The widespread use of data standards including separating key data fields Increasing bank and credit card company alerts and exchange of information FUTURE: increasing smartphone contactless enablement increasing following the US lead in reporting data breaches

NOT FOR UNAUTHORISED DISTRIBUTION 6 THE FUTURE New security measures: do not eliminate fraud makes it more difficult to obtain “whole” card data and more difficult to obtain “bulk” data – therefore less value and less attractive to organised crime European Regulators will be able to bestow fines up to 5% of the WORLDWIDE revenue of companies that lose data. some companies investigating “insurance” to help pay for potential fines. increasing strict data standards and identification / security around the data pathways the new targeting of the core data of financial companies and data repositories new security measures required around core data

NOT FOR UNAUTHORISED DISTRIBUTION 7 WHAT NEEDS TO BE DONE Retailers need to: be more aware of the entire payment lifecycle analyse in detail the data pathways and determine / mitigate the inherent weaknesses including technology weakness, internet transactions AND cross border data movement determine future weaknesses and assess technology / process to mitigate share security information / advances with others in the same position – there is no point “re-inventing the wheel”. Shared security means greater security encourage greater responsibility from customers greater targeting of organised crime by national / international security services

NOT FOR UNAUTHORISED DISTRIBUTION 8 WHAT NEEDS TO BE UNDERSTOOD Bad things don’t just happen to someone else. Security is important. Don’t be the next victim and lose hard won customer confidence.

NOT FOR UNAUTHORISED DISTRIBUTION 9 Thank you. If you don't understand the risks, how can you prepare? Can you afford to let the issues be blurred?