Security Officer and Fraud Prevention Workshop 2019
Total Page:16
File Type:pdf, Size:1020Kb
Security Officer and Fraud Prevention Workshop 2019 Presented by: Jim Rechel, President The Rechel Group, Inc. [email protected] 513-521-1860 I thought my comments were important……. Objectives 1. To challenge how you think about the role of security (physical and financial) today, tomorrow and for the future of your bank. 2. To provide information on the risks and opportunities to address current security issues. 3. To propose a business model that sees your bank in an “advocates role for your customers” when dealing with security issues. 4. To interest you enough today that you do not “doodle”! Protecting the Bank: Convergence of Data Physical Security and Fraud and Prevention Opportunities Russian Funded Hedge Fund / Bank / Finance Co. Russian Aligned Hedge Fund Bank Loan $ 75 $ 125 Million Million Finance Company 6 Small World 7 Your Background Let’s Take Your Pulse (Rank Top 2 Issues at Your Bank in Order: ie 1st and 2nd) Our customers and/or partners lack sufficient We lack the in-house We lack the technology tools awareness to protect expertise to properly detect to properly detect and themselves from socially- and respond. respond engineered fraud schemes. The anti-fraud controls we’ve Today’s fraud schemes evolve We are mired in manual deployed have also proven to too quickly for us to keep processes. impede the online customer pace. experience. Fraudsters have too much Our employees lack sufficient valid customer information at awareness to protect their fingertips, so they get themselves from socially around our controls to engineered fraud schemes prevent account takeover and origination. Rate of Change Challenges What You See Ahead of Your Bank Fraud Detection Anomaly: Looking for abnormal behavior (Transactional) Mistake Normal Abnormal False Positive Fraud? Predictive Analytics: Using historical data patterns to predict fraud (Behavioral) Known Fraud Classify incoming data vs Predictive Model as potential fraud or Non Fraud Samples non-fraud Reported: Using Tip Lines, Cust Service, Branches, Law Enforcement etc. Fraud Reported Investigated Fed into Above Customer/LE etc. For Example: Account Takeovers • Anomaly: Your internal fraud detection system detects deviation in deposit or withdrawal activity based on established parameters. • Predictive Analytics: System establishes normal employee behavior related to customer searches, detects employee viewing abnormal number of customers, potential account takeover predictor. Reported: Customer discovers transactions and is upset when discovered and reported. Customers Higher Risk Customers for Fraud Email Addresses of All Your Customers How Many are on the List of Compromised Emails? https://haveibeenpwned.com/API/v2#AllBreaches Fraudulent Act – Opportunity Missed Debit Card Stolen What the Ripples Look Like Purse Stolen Illinois Bank Branch: Indiana Debit Card Protect the Account…. ….and the Customer! Amazon is Good! Amazon is Bad! “One of the things Amazon does better than us, they are more customer- centric than we are. They really are. And one of my takeaways is that, by God, we're gonna become as customer-centric as Amazon. We're gonna import their passion about that. ……I love the passion these guys have around the customer. They put the customer first in everything they do and think backwards. And — we — we're gonna be the same way. Customer at the Center of Your Processes • Interest of Customers • Recommendations go is Focus of Your Beyond Immediate Efforts Matter Know how Products ie: Amazon and Services Benefit Suggestions Customer Can I Trust Do You You? Care? Customer Do You Do You Know What Want Me You Are Back? Doing? • Advice and • Follow-up with Suggestions are Both Customers Accurate and Comprehensive Immediate and Long term Say What You Will Do and Do What You Say! • Interest of Customers • Recommendations go is Focus of Your Beyond Immediate CustomerEfforts at the Center of Your Processes Matter Know how Products ie: Amazon and Services Benefit Suggestions Customer Can I Trust Do You You? Care? Customer Do You Do You Know What Want Me You Are Back? Doing? • Advice and • Follow-up with Suggestions are Both Customers Accurate and Comprehensive Immediate and Long term Say What You Will Do and Do What You Say! “Can I Trust You?” Your Bank’s Products and Services Does your staff understand the difference between features and benefits of all of your products and services. Develop product and service rollouts with challenge to staff to: • Identify at least 2 features of every product and service • Identify the benefits of the features • Provide understanding of the intended benefits for your customers • Encourage staff to solicit feedback from customers and report Fraud Schemes Criminals place a wedge between the bank and the victim customer over time. Mitigation Steps Your Staff Can Take: Criminal Acts 1. Look out for customer’s best interest 2. Provide understanding of what steps they can take and “Can I 3. Encourage feedback from customers Trust You?” If the crook has compromised your customer: Steps to Take While Interacting with Customer 1. Lead with “I May be wrong, but ….. 2. Provide third party resource information • Interest of Customers • Recommendations go is Focus of Your Beyond Immediate Efforts Matter Customer at the Center of Your Processes (Including Fraud Issues) Know how Products ie: Amazon and Services Benefit Suggestions Customer Can I Trust Do You You? Care? Customer Do You Do You Know What Want Me You Are Back? Doing? • Advice and • Follow-up with Suggestions are Both Customers Accurate and Comprehensive Immediate and Long term Say What You Will Do and Do What You Say! Do You Care? • Interest of Customers • Recommendations go is Focus of Your Beyond Immediate Efforts Matter Customer at the Center of Your Processes (Including Fraud Issues) Know how Products ie: Amazon and Services Benefit Suggestions Customer Can I Trust Do You You? Care? Customer Do You Do You Know What Want Me You Are Back? Doing? • Advice and • Follow-up with Suggestions are Both Customers Accurate and Comprehensive Immediate and Long term Say What You Will Do and Do What You Say! • Interest of Customers • Recommendations go is Focus of Your Beyond Immediate Efforts Matter Customer at the Center of Your Processes (Including Fraud Issues) Know how Products ie: Amazon and Services Benefit Suggestions Customer Can I Trust Do You You? Care? Customer Do You Do You Know What Want Me You Are Back? Doing? • Advice and • Follow-up with Suggestions are Both Customers Accurate and Comprehensive Immediate and Long term Say What You Will Do and Do What You Say! Cyber Security is a Shared Responsibility 35 Fraud Rings ID Thieves Hijacked Devices Social Engineering Who are Your Adversaries? Synthetic ID Thieves In Front of Your Bank…..One of Your Adversaries Fraud Today is Like an Amoeba …a type of cell or organism which has the ability to constantly alter its shape,… Your Fraud Detection System May Be Looking for the Wrong Type of Fraud I recently came across an interesting post on one of the many underground They Know criminal websites I monitor daily. Us Better It is advice intended for fraud managers Than We but posted for fraudsters to read so Know Us they might understand what fraud managers are taught to look for in their work In other words, fraudsters read what the good guys are looking for to stop fraud and adjust their techniques accordingly. View of Fraud in 2018 *SMG 2018 Faces of Fraud Survey Cyber Crimes & Email Compromises: Consumer and Business Imperative 44 What is Cybercrime? …crime that involves the internet, a computer system or computer technology. The computer may have been used in the commission of a crime, or it may be the target. Source: https://en.wikipedia.org/wiki/Cybercrime 45 The Cost of Cybercrime Cyber-crime Costs are Unprecedented @ $22 Million per Year Organized criminals are exceptionally well- 90,909 NFL Quarterbacks funded; the cost of cybercrime 48,000 miles cost $499B in 2016 dollars is expected to reach $2 trillion this year. Could replicate 4x over with cyber losses Source: http://www.gartner.com/newsroom/id/2828722; https://www.forbes.com/sites/stevemorgan/2016/01/17/cyber-crime-costs-projected-to-reach-2-trillion-by-2019/#47a242633a91 Photo: sportingnews.com By SPUI - National Atlas, Public Domain, https://commons.wikimedia.org/w/index.php?curid=945257 46 Who is Behind Cybercrime? ....What are Their Motivations? Org Crime/Fraudsters Hacktivists Nation-States Theft Disruption Destruction 47 Social Media 48 Issues You Face Online Identity Threats are More Regulations Education Theft Sophisticated 49 50 Identity Fraud Reached an All-time High in 2017… Continued in 2018 16.7 8% # of identity fraud victims in the U.S. MILLION For the first time ever, SSNs (35%) were compromised more 35% than credit card numbers (30%) in breaches $16.8 Amount stolen from U.S. consumers due to identity fraud BILLION Business Wire - Identity Fraud Hits All Time High With 16.7 Million U.S. Victims in 2017, According to New Javelin Strategy & Research Study: https://www.businesswire.com/news/home/20180206005363/en/Identity-Fraud-Hits-Time-High-16.7-Million This Photo by Unknown Author is licensed under CC BY-NC-ND This Photo by Unknown Author is licensed under CC BY-SA-NC 51 2017 Cybersecurity Timeline Yahoo! reveals breach impacted all 3 billion of its users NotPetya Equifax credit ransomware attack bureau announces Uber disclosed 2016 Apache Struts emerges globally; data breach impacting breach and payment to remote code execution total losses could 143 million consumers; hackers to delete vulnerability reported exceed $1B Apache Struts is cause stolen data JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC WannaCry Honda motor plant Blueborne KRACK WiFi ransomware worm first shutdown due to Bluetooth vulnerabilities $600 billion struck; most notably WannaCry vulnerabilities first disclosed; enables forcing some UK disclosed; exposed attackers to bypass lost to cybercrime hospitals to shut down.