Tag: Vision 2016

Loading...

Part four in our series on Insights from Vision 2016 fraud and identity track It was a true honor to present alongside Experian fraud consultant Chris Danese and Barbara Simcox of Turnkey Risk Solutions in the synthetic and first-party fraud session at Vision 2016. Chris and Barbara, two individuals who have been fighting fraud for more than 25 years, kicked off the session with their definition of first-party versus third-party fraud trends and shared an actual case study of a first-party fraud scheme. The combination of the qualitative case study overlaid with quantitative data mining and link analysis debunked many myths surrounding the identification of first-party fraud and emphasized best practices for confidently differentiating first-party, first-pay-default and synthetic fraud schemes. Following these two passionate fraud fighters was a bit intimidating, but I was excited to discuss the different attributes included in first-party fraud models and how they can be impacted by the types of data going into the specific model. There were two big “takeaways” from this session for me and many others in the room. First, it is essential to use the correct analytical tools to find and manage true first-party fraud risk successfully. Using a credit score to identify true fraud risk categorically underperforms. BustOut ScoreSM or other fraud risk scores have a much higher ability to assess true fraud risk. Second is the need to for a uniform first-party fraud bust-out definition so information can be better shared. By the end of the session, I was struck by how much diversity there is among institutions and their approach to combating fraud. From capturing losses to working cases, the approaches were as unique as the individuals in attendance This session was both educational and inspirational. I am optimistic about the future and look forward to seeing how our clients continue to fight first-party fraud.

Published: June 14, 2016 by Guest Contributor

Whether its new regulations and enforcement actions from the Consumer Financial Protection Bureau or emerging legislation in Congress, the public policy environment for consumer and commercial credit is dynamic and increasingly complex. If you are interested to learn more about how to navigate an increasingly choppy regulatory environment, consider joining a breakout session at Experian’s Vision 2016 Conference that I will be moderating. I’ll be joined by several experts and practitioners, including: John Bottega, Enterprise Data Management Conor French, Funding Circle Troy Dennis, TD Bank Don Taylor, President, Automated Collection Services During our session, you’ll learn about some of the most trying regulatory issues confronting the consumer and commercial credit ecosystem. Most importantly, the session will look at how to turn potential challenges into opportunities. This includes learning how to incorporate new alternative data sets into credit scoring models while still ensuring compliance with existing fair lending laws. We’ll also take a deep dive into some of the coming changes to debt collection practices as a result of the CFPB’s highly anticipated rulemaking. Finally, the panel will take a close look at the challenges of online marketplace lenders and some of the mounting regulations facing small business lenders. Learn more about Vision 2016 and how to register for the May conference.

Published: April 19, 2016 by Guest Contributor

Ensuring the quality of reported consumer credit data is a top priority for regulators, credit bureaus and consumers, and has increasingly become a frequent headline in press outlets when consumers find their data is not accurate. Think of any big financial milestone moment – securing a mortgage loan, auto loan, student loan, obtaining low-interest rate interest credit cards or even getting a job. These important transactions can all be derailed with an unfavorable and inaccurate credit report, causing consumers to hit social media, the press and regulatory entities to vent it out. Add in the laws and increased scrutiny from the Consumer Financial Protection Bureau (CFPB), and Federal Trade Commission (FTC) and it is clear data furnishers are seeking ways to manage their data in more effective ways. At Vision 2016, I am hosting a session, Achievements in data reporting accuracy – maximizing data quality across your organization, with several panel guests willing to share their journeys and learnings attached to the topic of data accuracy. Our diverse panel features leaders from varying industries: Jodi Cook, DriveTime Alissa Hess, USAA Bank Tom Danchik, Citi Julie Moroschan, Experian Each will speak to how they’ve overcome challenges to introduce a data quality program into their respective organizations, as well as best practices around assessing, monitoring and correcting credit reporting issues. One speaker will even touch on the challenging topic of securing funding for a data quality program, considering budgets are most often allocated to strategies, products and marketing directly tied to driving revenue. All lenders are advised to maintain a full 360-degree view of data reporting, from raw data submissions to the consumer credit profile. Better data input equals fewer inaccuracies, and an overarching data integrity program, can deliver  a comprehensive view that satisfies regulators, improves the customer experience and provides better insight for internal decision making. To learn more about implementing a data quality plan for your organization, check out Vision 2016.

Published: April 14, 2016 by Ashley Knight

Device emulators — wolves in sheep’s clothing Despite all the fraud prevention systems and resources in the public and private sectors, online fraud continues to grow at an alarming rate, offering a low-risk, high-reward proposition for fraudsters. Unfortunately, the Web houses a number of easily accessible tools that criminals can use to perpetrate fraud and avoid detection. The device emulator is one of these tools. Simply put, a device emulator is one device that pretends to be another. What began as innovative technology to enable easy site testing for Web developers quickly evolved into a universally available tool that attackers can exploit to wreak havoc across all industry verticals. While it’s not new technology, there has been a significant increase in its use by criminals to deceive simple device identification and automated risk-management solutions to carry out fraudulent activities. Suspected device emulation (or spoofing) traffic historically has been difficult to identify because fraud solutions rely heavily on reputation databases or negative lists. Detecting and defeating these criminals in sheep’s clothing is possible, however. Leveraging Experian’s collective fraud intelligence and data modeling expertise, our fraud research team has isolated several device attributes that can identify the presence of an emulator being used to submit multiple transactions. Thanks to these latest FraudNet rule sets, financial institutions, ecommerce merchants, airlines, insurers and government entities alike now can uncloak and protect against many of these cybercriminals. Unfortunately, device emulators are just one of many tools available to criminals on the Dark Web. Join me at Vision 2016, where U.S. Secret Service and I will share more tales from the Dark Web. We will explore the scale of the global cybercrime problem, walk through the anatomy of a typical hack, explain how hackers exploit browser plug-ins, and describe how enhanced device intelligence and visibility across all channels can stop fraudsters in their tracks. Listen to Mike Gross as he shares a short overview of his Vision 2016 breakout session in this short video. Don’t miss this innovative Vision 2016 session! See you there.

Published: April 11, 2016 by Guest Contributor

In today’s interconnected world, reaching consumers should be as simple as sending a text or calling their cell phone. However, complying with the Telephone Consumer Protection Act (TCPA) can create an almost insurmountable mountain. While the law has been in place since 1991, TCPA litigation continues to be a considerable source of potential legal and compliance risk for companies communicating with consumers.  There were 1,908 TCPA lawsuits in 2014, an increase of 30 percent over the previous year, and a 231 percent increase in the last four years. Is your business facing challenges in complying with TCPA? Do you want to learn more about the changing and challenging TCPA legal and regulatory framework? Are you looking for best practices on how to win the battle of right party contact? Then you should join us for a breakout session solely focused on TCPA at Experian’s Vision 2016 Conference. The panel features a number of subject matter experts who will be able to provide attendees with a look at this law and some of the best practices to manage risk and ensure compliance. Panelists include: Mary Anne Gorman, Experian Tony Hadley, Experian Tom Gilbertson, Venable LLC   To learn more more about TCPA best practices, check out Experian’s annual Vision Conference in May.

Published: April 6, 2016 by Guest Contributor

Small business trade payment delinquencies can signal the beginning of business financial duress.  However, sometimes these delinquencies are isolated events.  Understanding the trade payment priorities of a business can lead to better business risk assessment. Experian understands commercial payment behaviors and can help clients more accurately interpret the risk of payment delinquencies for different kinds of trades. In his Vision 2016 breakout session “Which creditors get priority when businesses face a financial burden”, Sung Park, Analytics Consultant with Experian’s Decision Sciences discusses the types of trades or financial obligations that become delinquent first, and the conditions that most commonly signal overall business stress. What the audience will learn: The audience will have a better understanding of which type of trade delinquencies are likely isolated incidents and which ones are precursors of businesses facing a financial burden, and what actions can be taken proactively to mitigate risk. Don't miss your opportunity to catch these informative breakout sessions during Vision 2016.

Published: March 28, 2016 by Gary Stockton

Identity management traditionally has been made up of creating rigid verification processes that are applied to any access scenario. But the market is evolving and requiring an enhanced Identity Relationship Management strategy and framework. Simply knowing who a person is at one point in time is not enough. The need exists to identify risks associated with the entire identity profile, including devices, and the context in which consumers interact with businesses, as well as to manage those risks throughout the consumer journey. The reasoning for this evolution in identity management is threefold: size and scope, flexible credentialing and adaptable verification. First, deploying a heavy identity and credentialing process across all access scenarios is unnecessarily costly for an organization. While stringent verification is necessary to protect highly sensitive information, it may not be cost-effective to protect less-valuable data with the same means. A user shouldn’t have to go through an extensive and, in some cases, invasive form of identity verification just to access basic information. Second, high-friction verification processes can impede users from accessing services. Consumers do not want to consistently answer multiple, intrusive questions in order to access basic information. Similarly, asking for personal information that already may have been compromised elsewhere limits the effectiveness of the process and the perceived strength in the protection. Finally, an inflexible verification process for all users will detract from a successful customer relationship. It is imperative to evolve your security interactions as confidence and routines are built. Otherwise, you risk severing trust and making your organization appear detached from consumer needs and preferences. This can be used across all types of organizations — from government agencies and online retailers to financial institutions. Identity Relationship Management has three unique functions delivered across the Customer Life Cycle: Identity proofing Authentication Identity management Join me at Vision 2016 for a deeper analysis of Identity Relationship Management and how clients can benefit from these new capabilities to manage risk throughout the Customer Life Cycle. I look forward to seeing you there!

Published: March 16, 2016 by Guest Contributor

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe