SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
1© Copyright 2014 EMC Corporation. All rights reserved.
Julie Conroy
Research Director
Aite Group
Rueben Rodriguez
Principal Product Marketing Manager
RSA
2014 Card and
Payments Fraud
Forecast
2© Copyright 2014 EMC Corporation. All rights reserved.
Agenda
• EMV: Coming soon to a card near you
• E-commerce fraud trends
• Best practices for securing payment cards
• Case studies in financial and retail
3© Copyright 2013 EMC Corporation. All rights reserved.
EMV: Coming Soon to a
Card Near You
©2014 Aite Group LLC.
Page 4
The last G-20 country to embrace the EMV standard
©2014 Aite Group LLC.
Page 5
EMV: Why now?
• Interoperability
• Mobile payments
• Increasing fraud
• Decreasing costs
©2014 Aite Group LLC.
Page 6
Important milestones
PCI annual assessment forgivenessOctober 2012
Acquirer processing updates in placeApril 2013
Maestro liability shiftApril 2013
POS liability shiftOctober 2015
ATM liability shift (MC)October 2016
ATM liability shift (Visa)October 2017
Fuel dispenser liability shiftOctober 2017
©2014 Aite Group LLC.
Page 7
EMV: Coming Soon
Source: Aite Group interviews with payment networks and 18 large U.S. issuers,
April to May 2014
0.4%
4%
25%
70%
91%
98%
2012 2013 e2014 e2015 e2016 e2017
Percentage of U.S. Credit Cards with EMVCapability
©2014 Aite Group LLC.
Page 8
EMV’s impact in other countries
$245.4
$199.6
$171.5
$152.6 $145.3
$111.5
$128.4
$140.4
$176.1
$259.5 $268.6
$299.4
2008 2009 2010 2011 2012 2013
Changes in Canadian Credit Card Fraud Losses, 2008 to 2013 (In millions
of CAD)
Source: Canadian Bankers Association
©2014 Aite Group LLC.
Page 9
The U.S. will not be an exception
$2.1
$2.6
$2.8 $2.9 $3.1
$3.8
$5.2
$6.4
2011 2012 2013 e2014 e2015 e2016 e2017 e2018
U.S. CNP Credit Card Fraud Losses,
2011 to e2018 (In US$ Billions)
Source: Aite Group interviews with payment networks and 18 large U.S. issuers,
April to May 2014
10© Copyright 2013 EMC Corporation. All rights reserved.
E-Commerce Fraud
Trends
11© Copyright 2014 EMC Corporation. All rights reserved.
Mobile Is The New “Web”
• Sky rocketing usage of mobile devices creates a new
opportunity for fraudsters
• Mobile OS malware and phishing scams on the rise
• Criminal underground is all pointing to mobile with
web variants
– CitMo, ZitMo, Perkele
Banking
App
12© Copyright 2014 EMC Corporation. All rights reserved.
Bank Mobile Traffic is on the Rise
~25% of confirmed fraud is from the mobile channel
13© Copyright 2014 EMC Corporation. All rights reserved.
Citadel – RSA Underground Analysis
Mobile Malware & HTML Injection
14© Copyright 2014 EMC Corporation. All rights reserved.
Citadel
15© Copyright 2014 EMC Corporation. All rights reserved.
Citadel
16© Copyright 2014 EMC Corporation. All rights reserved.
Citadel
17© Copyright 2014 EMC Corporation. All rights reserved.
ZitMO
18© Copyright 2014 EMC Corporation. All rights reserved.
CNP Is Getting The “Squeeze”
• Customers don’t just want but demand ability to shop
on-line at anytime
• Fraud liability and customer convenience are at odds
• Fraud is being pushed to the path of least resistance
• Ecommerce sites are being manipulated
– Stolen card testing – validate card before selling
– Buy physical/digital goods with stolen cards
• EMV is now in full effect or at least underway
19© Copyright 2014 EMC Corporation. All rights reserved.
• Attacks on ecommerce sites is becoming the norm
• Threats come in various forms
– Botnet – DDOS
– Business logic abuse
– Competitive intel & scraping
– eCoupons abuse
• Very hard to detect or prevent
• Impacts to sales and brand are significant
Ecommerce Website Attacks
On The Rise
20© Copyright 2014 EMC Corporation. All rights reserved.
RSA Survey: Financial & Brand Revenue
Impact
Average of 5% of total on-line revenues impacted by fraud
21© Copyright 2014 EMC Corporation. All rights reserved.
3DS Is Evolving….
For both Issuers & Merchants
• RSA 3DS card transaction volume has grown 19% YoY
• Fraudsters targeting username/password deployments
• RSA analysis shows top 3DS fraud focus:
– Travel in Europe
– “Mail Order” in US
• Merchants have significant flexibility
– Implications vary based upon which side of the coin you represent
• Risk-based authentication is now preferred method
• RSA risk-based issuers prevent fraud on average ~$3M+/month
22© Copyright 2014 EMC Corporation. All rights reserved.
Best Practices for
Securing Payment Cards
©2014 Aite Group LLC.
Page 23
Technology to the rescue
• Application layer
• Behavioral analytics
• 3-D Secure
• Behind the scenes
• Tokenization
o Issuer
o Merchant
©2014 Aite Group LLC.
Page 24
Merchants are embracing these solutions
3%
13%
6%
13%
13%
19%
13%
9%
31%
31%
19%
19%
31%
25%
9%
47%
Tokenization
Behavioral
analytics
3-D Secure
Q: Please indicate the effectiveness of each of these technologies at
reducing card fraud and data security issues. (n=32)
Very low impact Low impact Moderate impact
High impact Very high impact No opinion/Don't know
Source: Aite Group survey of fraud executives at 36 large merchants, March to May
2014
©2014 Aite Group LLC.
Page 25
Many merchants and FIs are actively
deploying technology to mitigate CNP fraud
44%
22%
22%
16%
3%
3%
13%
22%
Tokenization
(n=26)
3-D Secure (n=20)
Q: What is your plan to deploy the following technologies?
Using today
On the 1- to 2-
year roadmap
Plan to use, but
not in the next 2
years
No plansto use
Source: Aite Group survey of fraud executives at 36 large merchants, March to May
2014
26© Copyright 2014 EMC Corporation. All rights reserved.
Case Studies
27© Copyright 2014 EMC Corporation. All rights reserved.
3DS is REAL!! - Case Study For A Card Issuer
Protecting Transactions Without The Cardholder Hassle
28© Copyright 2013 EMC Corporation. All rights reserved.
29© Copyright 2011 EMC Corporation. All rights reserved.
~400,000
30© Copyright 2014 EMC Corporation. All rights reserved.
Questions and Additional Resources
 Join the fraud conversation in the
RSA Fraud & Risk Intelligence
Community!
– https://community.emc.com/co
mmunity/connect/rsaxchange/fr
aud
 Follow the RSA Fraud Research
team on Twitter
– @RSAFraudAction
 Visit the RSA Online Fraud
Resource Center
– www.emc.com/onlinefraud

Mais conteúdo relacionado

Mais procurados

2015 IAD Survey Report, FINAL
2015 IAD Survey Report, FINAL2015 IAD Survey Report, FINAL
2015 IAD Survey Report, FINAL
Bryan Bauer
 
Huge And Smart Progressive Case
Huge And Smart   Progressive CaseHuge And Smart   Progressive Case
Huge And Smart Progressive Case
smehro
 
Progressive Case Study.Scm
Progressive Case Study.ScmProgressive Case Study.Scm
Progressive Case Study.Scm
smehro
 
Progressive Corporation.Sssg
Progressive Corporation.SssgProgressive Corporation.Sssg
Progressive Corporation.Sssg
smehro
 
Mastergard vsib-2011
Mastergard vsib-2011Mastergard vsib-2011
Mastergard vsib-2011
itiint
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINAL
Chris Evans
 
Progressive Corp..Ashky
Progressive Corp..AshkyProgressive Corp..Ashky
Progressive Corp..Ashky
smehro
 

Mais procurados (20)

2015 IAD Survey Report, FINAL
2015 IAD Survey Report, FINAL2015 IAD Survey Report, FINAL
2015 IAD Survey Report, FINAL
 
Villiger Book Section #1
Villiger Book Section #1Villiger Book Section #1
Villiger Book Section #1
 
Huge And Smart Progressive Case
Huge And Smart   Progressive CaseHuge And Smart   Progressive Case
Huge And Smart Progressive Case
 
Villiger Book Section #2
Villiger Book Section #2 Villiger Book Section #2
Villiger Book Section #2
 
Tentacles of fraud
Tentacles of fraud Tentacles of fraud
Tentacles of fraud
 
Will Usage Based Insurance (UBI) disrupt the insurance industry?
Will Usage Based Insurance (UBI) disrupt the insurance industry?Will Usage Based Insurance (UBI) disrupt the insurance industry?
Will Usage Based Insurance (UBI) disrupt the insurance industry?
 
ITL insurtech 5 value levers for auto telematics
ITL insurtech 5 value levers for auto telematicsITL insurtech 5 value levers for auto telematics
ITL insurtech 5 value levers for auto telematics
 
Progressive Case Study.Scm
Progressive Case Study.ScmProgressive Case Study.Scm
Progressive Case Study.Scm
 
Progressive Corporation.Sssg
Progressive Corporation.SssgProgressive Corporation.Sssg
Progressive Corporation.Sssg
 
Mastergard vsib-2011
Mastergard vsib-2011Mastergard vsib-2011
Mastergard vsib-2011
 
Enigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel AvivEnigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel Aviv
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINAL
 
"Light Rises from the East" - Opportunities in the Orient for Payments
"Light Rises from the East" - Opportunities in the Orient for Payments"Light Rises from the East" - Opportunities in the Orient for Payments
"Light Rises from the East" - Opportunities in the Orient for Payments
 
Top 10 Ubi Myths
Top 10 Ubi MythsTop 10 Ubi Myths
Top 10 Ubi Myths
 
Progressive Corp..Ashky
Progressive Corp..AshkyProgressive Corp..Ashky
Progressive Corp..Ashky
 
Connected cars and insurance claims - a new paradigm
Connected cars and insurance claims  - a new paradigmConnected cars and insurance claims  - a new paradigm
Connected cars and insurance claims - a new paradigm
 
Connected Insurance Observatory InsurTech
Connected Insurance Observatory InsurTechConnected Insurance Observatory InsurTech
Connected Insurance Observatory InsurTech
 
Oseven at Open Coffee Athens LXXXII
Oseven at Open Coffee Athens LXXXIIOseven at Open Coffee Athens LXXXII
Oseven at Open Coffee Athens LXXXII
 
Connected car slides
Connected car slidesConnected car slides
Connected car slides
 
IBM Telematics for Insurance
IBM Telematics for InsuranceIBM Telematics for Insurance
IBM Telematics for Insurance
 

Destaque

ISAC constitution
ISAC constitution ISAC constitution
ISAC constitution
Anuj Ramaiya
 
4 things you_cannot_recover
4 things you_cannot_recover4 things you_cannot_recover
4 things you_cannot_recover
Chandan Dubey
 
Digipak research
Digipak researchDigipak research
Digipak research
loousmith
 
система профориентации и основные её направления
система профориентации и основные её направлениясистема профориентации и основные её направления
система профориентации и основные её направления
Татьяна Глинская
 
4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)
Khendle Christie
 

Destaque (20)

Jose esteves 1
Jose esteves 1Jose esteves 1
Jose esteves 1
 
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
 
ISAC constitution
ISAC constitution ISAC constitution
ISAC constitution
 
Designing API for mobile apps (MobileWarsaw 19.01.2015)
Designing API for mobile apps (MobileWarsaw 19.01.2015)Designing API for mobile apps (MobileWarsaw 19.01.2015)
Designing API for mobile apps (MobileWarsaw 19.01.2015)
 
Provisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of ProvisioningProvisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of Provisioning
 
4 things you_cannot_recover
4 things you_cannot_recover4 things you_cannot_recover
4 things you_cannot_recover
 
Digipak research
Digipak researchDigipak research
Digipak research
 
Webinar Tracker ABCs
Webinar Tracker ABCsWebinar Tracker ABCs
Webinar Tracker ABCs
 
Windows Server 2012 Disk Dedupe
Windows Server 2012 Disk DedupeWindows Server 2012 Disk Dedupe
Windows Server 2012 Disk Dedupe
 
Day 2 rebellion
Day 2 rebellionDay 2 rebellion
Day 2 rebellion
 
Flash Implications in Enterprise Storage Array Designs
Flash Implications in Enterprise Storage Array DesignsFlash Implications in Enterprise Storage Array Designs
Flash Implications in Enterprise Storage Array Designs
 
система профориентации и основные её направления
система профориентации и основные её направлениясистема профориентации и основные её направления
система профориентации и основные её направления
 
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגונית
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגוניתמנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגונית
מנהלי אחריות תאגידית בישראל - סקר קריירה והשפעה ארגונית
 
4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)
 
Friday japan
Friday japanFriday japan
Friday japan
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Clientes2
Clientes2Clientes2
Clientes2
 
Formulario ventas
Formulario ventasFormulario ventas
Formulario ventas
 
Math Orientation Summer 2015
Math Orientation Summer 2015Math Orientation Summer 2015
Math Orientation Summer 2015
 
01 monday factors of production
01 monday factors of production01 monday factors of production
01 monday factors of production
 

Semelhante a 2014 Card and Payments Fraud Forecast

key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-security
Kerri Lorch
 

Semelhante a 2014 Card and Payments Fraud Forecast (20)

Get Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present FraudGet Ready for EMV and Card Not Present Fraud
Get Ready for EMV and Card Not Present Fraud
 
SBMS EMV Doc
SBMS EMV Doc SBMS EMV Doc
SBMS EMV Doc
 
Emv for f_is_webinar
Emv for f_is_webinarEmv for f_is_webinar
Emv for f_is_webinar
 
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...
Rising Above Uncertainty: Opportunities and Challenges for Credit Unions in P...
 
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
 
Emv for merchants 031715
Emv for merchants 031715Emv for merchants 031715
Emv for merchants 031715
 
EMV for Merchants
EMV for MerchantsEMV for Merchants
EMV for Merchants
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”
etailment WIEN 2015 – David Dechamps (MasterCard) “Die Welt des Bezahlens”
 
EMV and Parking - 6 Months on
EMV and Parking - 6 Months onEMV and Parking - 6 Months on
EMV and Parking - 6 Months on
 
Aviso EMV webinar
Aviso EMV webinarAviso EMV webinar
Aviso EMV webinar
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Mobile Payment Security Trends for the Future
Mobile Payment Security Trends for the FutureMobile Payment Security Trends for the Future
Mobile Payment Security Trends for the Future
 
Risk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechRisk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTech
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-security
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite Group
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
 
EMV: What you Need to Know
EMV: What you Need to KnowEMV: What you Need to Know
EMV: What you Need to Know
 
Mobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk ManagementMobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk Management
 
Payment Gateway by iPay88
Payment Gateway by iPay88Payment Gateway by iPay88
Payment Gateway by iPay88
 

Mais de EMC

Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
EMC
 

Mais de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

2014 Card and Payments Fraud Forecast

  • 1. 1© Copyright 2014 EMC Corporation. All rights reserved. Julie Conroy Research Director Aite Group Rueben Rodriguez Principal Product Marketing Manager RSA 2014 Card and Payments Fraud Forecast
  • 2. 2© Copyright 2014 EMC Corporation. All rights reserved. Agenda • EMV: Coming soon to a card near you • E-commerce fraud trends • Best practices for securing payment cards • Case studies in financial and retail
  • 3. 3© Copyright 2013 EMC Corporation. All rights reserved. EMV: Coming Soon to a Card Near You
  • 4. ©2014 Aite Group LLC. Page 4 The last G-20 country to embrace the EMV standard
  • 5. ©2014 Aite Group LLC. Page 5 EMV: Why now? • Interoperability • Mobile payments • Increasing fraud • Decreasing costs
  • 6. ©2014 Aite Group LLC. Page 6 Important milestones PCI annual assessment forgivenessOctober 2012 Acquirer processing updates in placeApril 2013 Maestro liability shiftApril 2013 POS liability shiftOctober 2015 ATM liability shift (MC)October 2016 ATM liability shift (Visa)October 2017 Fuel dispenser liability shiftOctober 2017
  • 7. ©2014 Aite Group LLC. Page 7 EMV: Coming Soon Source: Aite Group interviews with payment networks and 18 large U.S. issuers, April to May 2014 0.4% 4% 25% 70% 91% 98% 2012 2013 e2014 e2015 e2016 e2017 Percentage of U.S. Credit Cards with EMVCapability
  • 8. ©2014 Aite Group LLC. Page 8 EMV’s impact in other countries $245.4 $199.6 $171.5 $152.6 $145.3 $111.5 $128.4 $140.4 $176.1 $259.5 $268.6 $299.4 2008 2009 2010 2011 2012 2013 Changes in Canadian Credit Card Fraud Losses, 2008 to 2013 (In millions of CAD) Source: Canadian Bankers Association
  • 9. ©2014 Aite Group LLC. Page 9 The U.S. will not be an exception $2.1 $2.6 $2.8 $2.9 $3.1 $3.8 $5.2 $6.4 2011 2012 2013 e2014 e2015 e2016 e2017 e2018 U.S. CNP Credit Card Fraud Losses, 2011 to e2018 (In US$ Billions) Source: Aite Group interviews with payment networks and 18 large U.S. issuers, April to May 2014
  • 10. 10© Copyright 2013 EMC Corporation. All rights reserved. E-Commerce Fraud Trends
  • 11. 11© Copyright 2014 EMC Corporation. All rights reserved. Mobile Is The New “Web” • Sky rocketing usage of mobile devices creates a new opportunity for fraudsters • Mobile OS malware and phishing scams on the rise • Criminal underground is all pointing to mobile with web variants – CitMo, ZitMo, Perkele Banking App
  • 12. 12© Copyright 2014 EMC Corporation. All rights reserved. Bank Mobile Traffic is on the Rise ~25% of confirmed fraud is from the mobile channel
  • 13. 13© Copyright 2014 EMC Corporation. All rights reserved. Citadel – RSA Underground Analysis Mobile Malware & HTML Injection
  • 14. 14© Copyright 2014 EMC Corporation. All rights reserved. Citadel
  • 15. 15© Copyright 2014 EMC Corporation. All rights reserved. Citadel
  • 16. 16© Copyright 2014 EMC Corporation. All rights reserved. Citadel
  • 17. 17© Copyright 2014 EMC Corporation. All rights reserved. ZitMO
  • 18. 18© Copyright 2014 EMC Corporation. All rights reserved. CNP Is Getting The “Squeeze” • Customers don’t just want but demand ability to shop on-line at anytime • Fraud liability and customer convenience are at odds • Fraud is being pushed to the path of least resistance • Ecommerce sites are being manipulated – Stolen card testing – validate card before selling – Buy physical/digital goods with stolen cards • EMV is now in full effect or at least underway
  • 19. 19© Copyright 2014 EMC Corporation. All rights reserved. • Attacks on ecommerce sites is becoming the norm • Threats come in various forms – Botnet – DDOS – Business logic abuse – Competitive intel & scraping – eCoupons abuse • Very hard to detect or prevent • Impacts to sales and brand are significant Ecommerce Website Attacks On The Rise
  • 20. 20© Copyright 2014 EMC Corporation. All rights reserved. RSA Survey: Financial & Brand Revenue Impact Average of 5% of total on-line revenues impacted by fraud
  • 21. 21© Copyright 2014 EMC Corporation. All rights reserved. 3DS Is Evolving…. For both Issuers & Merchants • RSA 3DS card transaction volume has grown 19% YoY • Fraudsters targeting username/password deployments • RSA analysis shows top 3DS fraud focus: – Travel in Europe – “Mail Order” in US • Merchants have significant flexibility – Implications vary based upon which side of the coin you represent • Risk-based authentication is now preferred method • RSA risk-based issuers prevent fraud on average ~$3M+/month
  • 22. 22© Copyright 2014 EMC Corporation. All rights reserved. Best Practices for Securing Payment Cards
  • 23. ©2014 Aite Group LLC. Page 23 Technology to the rescue • Application layer • Behavioral analytics • 3-D Secure • Behind the scenes • Tokenization o Issuer o Merchant
  • 24. ©2014 Aite Group LLC. Page 24 Merchants are embracing these solutions 3% 13% 6% 13% 13% 19% 13% 9% 31% 31% 19% 19% 31% 25% 9% 47% Tokenization Behavioral analytics 3-D Secure Q: Please indicate the effectiveness of each of these technologies at reducing card fraud and data security issues. (n=32) Very low impact Low impact Moderate impact High impact Very high impact No opinion/Don't know Source: Aite Group survey of fraud executives at 36 large merchants, March to May 2014
  • 25. ©2014 Aite Group LLC. Page 25 Many merchants and FIs are actively deploying technology to mitigate CNP fraud 44% 22% 22% 16% 3% 3% 13% 22% Tokenization (n=26) 3-D Secure (n=20) Q: What is your plan to deploy the following technologies? Using today On the 1- to 2- year roadmap Plan to use, but not in the next 2 years No plansto use Source: Aite Group survey of fraud executives at 36 large merchants, March to May 2014
  • 26. 26© Copyright 2014 EMC Corporation. All rights reserved. Case Studies
  • 27. 27© Copyright 2014 EMC Corporation. All rights reserved. 3DS is REAL!! - Case Study For A Card Issuer Protecting Transactions Without The Cardholder Hassle
  • 28. 28© Copyright 2013 EMC Corporation. All rights reserved.
  • 29. 29© Copyright 2011 EMC Corporation. All rights reserved. ~400,000
  • 30. 30© Copyright 2014 EMC Corporation. All rights reserved. Questions and Additional Resources  Join the fraud conversation in the RSA Fraud & Risk Intelligence Community! – https://community.emc.com/co mmunity/connect/rsaxchange/fr aud  Follow the RSA Fraud Research team on Twitter – @RSAFraudAction  Visit the RSA Online Fraud Resource Center – www.emc.com/onlinefraud