May
05
2014

Vision 2014: Know your enemy

Posted on May 05 2014 by

Gone are the days when news of a data breach was shocking. Today they have become all too common an occurrence.  One of the most concerning issues around breaches is that many consumers’ digital identities are based on a single email address or username/password.With stolen identity data in hand, criminals can submit fraudulent mortgages, credit card applications, even create fake credit cards, in the names of thousands of unsuspecting victims. Regardless of how the data is used, one thing is certain: breaches pose serious dangers to consumers, retailers and financial institutions.

The need for customer-friendly fraud management is stronger than ever. A single layer of protection is simply ineffective as criminals are more efficient than ever in obtaining consumer identification details and compromising simple access credentials. While mobile technologies and the Internet itself have enabled consumers to have anytime access to their financial data, these advances are the very means by which criminals perpetrate fraud.  And customer-friendly technologies and policies continue to outpace the controls and risk management.

What controls does your organization have in place to ensure that a fraudster in Malaysia isn’t using a legitimate identity and an anonymous proxy to submit credit card applications? Or to alert when a long-standing offline banking relationship suddenly enrolls online?

The days and weeks following a breach are a time of heightened risk. Even after a breach has occurred, the risk can be managed.  In “Know Your Enemy”, a fraud prevention focused break out session at Experian’s 2014 Vision conference (#vision2014), Ori Eisen @orieisen and Matt Ehrlich @ehrlichmatters cover current trends and practices for taking on the growing industrialization of fraud.  Together with a risk executive from a leading bank, the team discusses several themes and emerging tactics, including: the cost of single channel fraud prevention strategies, the necessity of a layered security strategy that includes device and identity intelligence, and true real time, point of contact risk-scoring.


  1. No comments yet.

  1. No trackbacks yet.