Payment card fraud remains a top challenge for financial institutions. The latest wrinkle: Breached retailers such as Target and Home Depot, whose compromises led to wholesale card fraud. Card issuers absorb increasing losses linked to debit and credit fraud, yet they have little control over the third-party points of...
Mobile banking is growing out of its infancy and experts predict it will soon be the dominant banking and payments channel. With the vast array of endpoints being utilized, and multiple threat vectors being introduced, how are the threats of rogue mobile apps, mobile malware and SMiShing evolving? What vectors are...
Traditionally, big data, analytics and visualization tools have been used after the fact to analyze fraud and security breaches. In this session, we will demonstrate the proactive use of these technologies to help prevent these attacks from occurring in the first place.
Leveraging findings from massive scale,...
Public sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect," but equally as important is that the private sector organizations reciprocate and understand the how, what and why of the law enforcement/public body process.
This mutual...
Part 1 - Leveraging Global Threat Intelligence to Secure Mobile Banking
To secure our growing dependence on mobile devices, it is critical that we keep a constant eye on the current threat landscape. Only by continuously monitoring and analyzing malicious activity can an appropriate defense be crafted. There are...
Recent large-scale data compromises have undoubtedly captured the attention of executives and policymakers alike. Beyond the financial consequences, one positive outcome has been a renewed focus by financial institutions and retailers to advance payment system security. From EMV to tokenization and encryption, the...
ATM skimming attack sophistication, and recent global upticks in ATM cash-out schemes, have put a spotlight on ATM-related fraud. Banking institutions, in particular, have struggled to keep up with some of these emerging ATM fraud schemes. One challenge banks and credit unions face is that their ATM networks are often...
The last five years have seen an explosion of technological innovation which brought many opportunities for business growth. Combined with the associated changes in socio-economic behaviours, the pace of change has also brought new risks and opportunities for criminals to become even more innovative.
Whilst providing...
This session provides a detailed review of BankInfoSecurity's "Faces of Fraud" survey focused on the European market. Receive insights and expert analysis on topics such as:
How are the areas of retail, payment card, in person, insider and mobile fraud evolving?
Which aspects of the new Canadian legislation are...
Session Preview:
Contact centers increasingly are the key "soft" targets for fraudsters who impersonate legitimate customers to alter or obtain information. This information is then used to facilitate direct and cross-channel fraud, which can be very difficult to tie back to the call-center entry point. How do...
See how the detailed analysis of millions of voice-based transactions has produced a "signal in the noise." From large-scale analysis, clear patterns emerge of how stolen payment card information is actually qualified, updated and adapted for monetization. This process is most often carried out by social engineering...
Part1: Creating Actionable Intelligence, the Advances in Threat Information Exchange
Collecting security- and fraud-related data from multiple sources can often just result in creating a very large pool of unrelated facts. But begin to add context to that data and you now have information. Triangulate multiple pieces...
We'll start the 2014 Fraud Summit Toronto with a detailed review of BankInfoSecurity's latest "Faces of Fraud" survey, focused on the Canadian market. Receive insights and expert analysis on such topics as:
How are the areas of retail, payment card, in person, insider and mobile fraud evolving?
Which aspects of...
Contact centers increasingly are the key "soft" targets for fraudsters who impersonate legitimate customers to alter or obtain information. This information is then used to facilitate direct and cross-channel fraud, which can be very difficult to tie back to the call-center entry point. How do fraudsters conduct these...
Identity theft - or impersonation - is a well-established form of identity risk but first party fraud, and synthetic identities in particular are fast growing and insidious threats that bring with them economic loss for financial institutions, as well as risks of regulatory censure when synthetic identities pass Know...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.