Beruflich Dokumente
Kultur Dokumente
Martin is the Director of our Asia Pacific Identity and Fraud business,
leading a team of Identity and Fraud specialists across the region
working closely with customers and partners advising them on the
latest fraud management strategies and technology implementations.
Based in Singapore for the past 6 years, he has experience running
regional product portfolios across Asia Pacific.
He was part of the core team at Experian India which built the Credit
Bureau and National Fraud Consortium businesses for over 7 years.
He has extensive experience of managing large projects panning
across software and analytics side of business.
Overview:
Global and Asia Pacific Fraud Landscape
Consumers are confronted daily by the spectre of fraud
© Experian
Who did we survey?
© Experian
Key Themes for Indonesia
8
© Experian
Spotlight on Indonesia
SURGE IN CREDIT IN INDONESIA
231% increase in Lending to Households from 2006 – 2014
CREDIT APPLICATION
VIEW ON DATA FRAUD
BREACHES 86% of Indonesian financial Indonesia
62% of Indonesians agree that firms are citing credit Facebook-CA data breach
data breaches are bound to application fraud as no. 1
happen regardless of what
1 Million Indonesian
growth area
they do to try and prevent it Facebook users
INDONESIA
FRAUD
LANDSCAPE
DIGITAL CUSTOMER
EXPERIENCE
Receiving a better online
experience for 92% of
LARGEST ONLINE
Indonesians is the most PRESENCE
Indonesian consumers have Sephora data breach 2019:
focused on protecting them Indonesia, Singapore,
from online fraud / identity the largest number of online
accounts in APAC region Malaysia, Thailand, the
theft’ – highest in APAC region Philippines, Hong Kong,
Australia and New Zealand
PRIVACY- THE PRICE FOR CONVENIENCE
77% of consumers agree that ‘privacy is the price they
pay for the convenience of their digital lives’ – highest
© Experian in APAC region
What’s happening at a
global level?
© Experian
Managing a shifting and ever growing fraud risk
Here’s what we’re fighting:
MILLION
$54 $6.3
BLACK MARKET
AVERAGE
PRICE FOR
STOLEN UK VISA
AND USER DATA
ARE AS LIKELY TO BE
ATTACKED BY
FRAUDSTERS
8x COST
OF A DATA BREACH
UP 6% ANNUALLY
BILLION
© Experian
Attack Vectors
INDUSTRIALIZATION OF CYBER FRAUD DATA BREACHES
6x 78%
The value of cyber crime compared to
Increase in the number of Mobile Phone
the global drug trade
Account Takeovers (from 2016-2017)
71% 32,700,000
Number of cyber attacks originating from
Spear Phishing each year - not including Strains of IOT MALWARE detected in 2018
Vishing, SMShing, etc
© Experian
Attack Types
How do fraudsters obtain personal data?
▪ Data Breaches
▪ Phishing – Spear phishing/smishing/vishing
▪ Lottery scams
▪ “Black Hat” chat rooms
▪ Hacking
▪ Malware - Viruses/spyware/trojans
▪ Account Takeovers
© Experian
Attackers have evolved
© Experian
Attackers have evolved
Opportunist
© Experian
Attackers have evolved
Carder
© Experian
Attackers have evolved
Hacktivist
© Experian
Attackers have evolved
Organized Ring
© Experian
Attackers have evolved
State-Sponsored
© Experian
We now live in a world
where attackers seem
to have the advantage
#DataIsGold
(and they have a ton of it)
© Experian
Recent Data Breach Activity
© Experian
A sobering statistic
2X the total
global
population
© Experian
Shifting fraud trends
Accounts rather
“Fraud-as-a-Service”
than cards
! Access to compromised organisations
$6.43 ! For Rent
- Call center
- Botnets
$3.78 - Ransomware
! Guarantees
Consumers have
Stealing just one Stolen identities
100s of online
set of credentials are used to
profiles and
compromises create new
frequently re-use
multiple accounts accounts
credentials
The result
More difficult than ever to distinguish attackers from true customers.
You must now assume that every identity, account and card is compromised.
© Experian
Fraud Is NOT A Single Event
© Experian
The Fraud Paradox
4. Technology
5. Expertise and
X 3. Decisioning
Best Practice ✓
2. Advanced Analytics
1. Data
© Experian
A balanced approach to fraud is critical to business
© Experian
Consider the entire customer journey - across the enterprise
Access and
Origination
Maintenance
Identity Authentication
Proofing & Identity
Management Authentication
Identity & Identity
Confidence Authentication Management
Acquisition Login Transaction
© Experian
Experian Fraud Management Platform
“The nature of war is constant change…”
Sun Tzu: The Art of War
Attacks Prevention measures
Credential harvesting Strong authentication
2005
• Phishing • OTP
• Basic Trojans • Device intelligence
Man-in-the-browser Anti-malware
2010
• Automated transfers • Client-side detection
• HTML manipulation • Server-side baiting
NOW New acct & ATO fraud – trusted info Biometrics and behaviors
• Device Emulation • Evolved Robust Device Intelligence
• Credential Stuffing • Digital device behavior
• Synthetic ID Fraud • Layered Identity solutions/Authenticated
• Remote access Consumer Data
© Experian
Common challenges for most businesses
Challenges Solutions
• Use data creatively to increase accuracy – reduce false positives
Separate fraudsters from good • Use a layered strategy via a single/comprehensive risk engine
customers • Analyze digital behaviors, device insights, phone porting, etc.
© Experian
One Fraud and Identity Platform to manage it all
- CrossCore
Access and
Origination Maintenance
Identity Authentication
and Identity Authentication and
Proofing Management Identity
Identity Management
Confidence Authentication
CrossCore API
© Experian
How CrossCoreTM works
Strategies
Informed by Machine
Learning
© Experian
Where ML fits within CrossCore decision flow
Machine learning in a sample CrossCore process
© Experian
100,000,000
transactions processed
in CrossCore TM
© Experian
CrossCore Propositions in Indonesia
Device Intelligence | Risk Engine Behavioral Biometrics Email Risk Scoring
© Experian