SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
© 2012 NACHA — The Electronic Payments Association. All rights reserved.
No part of this material may be used without the prior written permission of NACHA.
This material is not intended to provide any warranties, legal advice, or professional
assistance of any kind.
Making	
  voice	
  biometrics	
  work	
  
in	
  real	
  world	
  implementa5ons	
  	
  
	
  
AKA,	
  Beyond	
  the	
  bullet	
  point	
  
	
  
	
  
Mark	
  Lazar	
  
CEO,	
  Victrio	
  
2Proprietary © 2013 Victrio, Inc.
Victrio	
  Intro	
  
•  Emerging leader in passive voice biometrics
•  Team expertise in voice recognition and call center
–  Ex-Nuance, BeVocal, Tuvox
•  Industry acclaim
–  Gartner Cool Vendor 2013 for Security:
Identity and Access Management
–  RSA Most Innovative Company 2013 - Finalist
3Proprietary © 2013 Victrio, Inc.
Deep	
  Experience	
  in	
  Voice	
  Biometric	
  
ImplementaAons	
  for	
  Financial	
  Firms	
  
•  3 years of implementation experience
•  Clients include 3 of top 5 financial firms
•  Screening 100M calls in 2013
•  Largest global fraudster database in world
4Proprietary © 2013 Victrio, Inc.
History	
  of	
  Industry’s	
  Voice	
  Biometric	
  Efforts	
  
1990’s	
  
Schwab	
  
Early	
  
2000’s	
  
Mid	
  
2000’s	
  
Late	
  
2000’s	
  
HSN	
  
HarOord	
  
Insurance	
  
MarrioP	
  
US	
  Bank	
  
AT&T	
  
Visa	
  
Bank	
  of	
  
America	
  
First	
  Horizon	
  
Bell	
  Canada	
  
Bank	
  of	
  America	
  
ABN/AMRO	
  
Santander	
  
American	
  Express	
  
5Proprietary © 2013 Victrio, Inc.
1990’s	
  
Schwab	
  
Early	
  
2000’s	
  
Mid	
  
2000’s	
  
Late	
  
2000’s	
  
HSN	
  
HarOord	
  
Insurance	
  
MarrioP	
  
US	
  Bank	
  
Visa	
  
AT&T	
  
Bank	
  of	
  
America	
  
First	
  Horizon	
  
TERMINATED
TERMINATED
UNKNOWN
INTERNAL ONLY
INTERNAL ONLY
TERMINATED
INTERNAL ONLY
TERMINATED
TERMINATED
TERMINATING
Bell	
  Canada	
  
Bank	
  of	
  America	
  
ABN/AMRO	
  
Santander	
  
American	
  Express	
  
Gap	
  Between	
  Theory	
  and	
  PracAce	
  
6Proprietary © 2013 Victrio, Inc.
Today:	
  Even	
  More	
  ImperaAve	
  
to	
  rescue	
  call	
  center	
  
Customers are
increasingly frustrated…
Web Attacks vs. Phone Attacks
While professional
fraudsters aren’t stopped
65%: Frustrated
Source: Opus Research 2012 Survey Source: RSA Client Study
50%: Too time-
consuming
7Proprietary © 2013 Victrio, Inc.
Passive	
  Voice	
  Biometrics:	
  Promising	
  Theory	
  
•  No customer interruption
•  Passive enrollment
•  Passive authentication
•  Alerts agent in real time
–  Shorter call and AHT
–  Happier customer
–  Stronger fraud detection
8Proprietary © 2013 Victrio, Inc.
Victrio ID Confidence Cloud
Voice
Biometric
Analysis
Account
Data
Call &
Behavioral
Data
Voiceprint
Match
ID Confidence
Reported to
Agent
High
Fraud
?
Low
Caller Voice
Call Center
/ IVR
Mobile
Passive
Customer
Voiceprints
Shared
Fraudster
Voiceprints
Signal
Analysis
Ideal	
  System	
  Overview	
  
9Proprietary © 2013 Victrio, Inc.
Life	
  in	
  the	
  Trenches:	
  Fraud	
  DetecAon	
  
•  Call center infrastructure is never ready on Day 1
–  Call recording system poorly configured
•  Association with accounts not always available
•  Relevant metadata not available
–  Clients have to assert ownership of data
•  Need new people processes to support solution
•  Poor flagging and capture of fraud interactions
•  Poor understanding of call center “big data”
10Proprietary © 2013 Victrio, Inc.
Life	
  in	
  the	
  Trenches:	
  Fraud	
  DetecAon	
  
•  Business Model?
–  Licensed product?
–  Managed service?
•  Evolve system to anticipate evolving fraudster behavior
•  Track changing impact of factors in multi-factor scoring
•  Example: Growing usage of using $8 burner phones weakens
device detection; adjust weighting
11Proprietary © 2013 Victrio, Inc.
Field	
  Results:	
  High	
  Repeat	
  Fraud	
  Rate	
  
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
BROKERAGE	
  
71% 89%
BANK	
  ACCOUNT	
  FRAUD	
  
42% 76%
CREDIT	
  CARD	
  FRAUD	
  
72% 95%
12Proprietary © 2013 Victrio, Inc.
0 20 40 60 80 100 120 140 160 180 200
Duke Kobayashi
Jeffrey Johns
Tyler Miresh
Charles Davis
Robert Albert
Bill Koflin
Josh Dumas
Greg Barker
Sally Davino
Michael Lee
Shauna Koshik
Alexandra Laurel
Patrick Donally
Elizabeth Wright
Jerry Lucent
Carla Gonzalez
Francis Montgomery
Michael Henley
Shauni Mccoy
Mark Martigas
Brian Reed
Recurring	
  PaPern:	
  DramaAc	
  Fraudster	
  AcAvity	
  
ConcentraAon	
  
TOP	
  20	
  FRAUDSTERS	
  
~ Half of fraud activity perpetrated
by top 10 Fraudsters
Calling > 30 times per month
C A L L S
13Proprietary © 2013 Victrio, Inc.
Average Number of Attacks From “Sharks”
Drops (Study of Top 10)
17
20
21
10.5
12
5.5
6.5
1.5 2
1 1
0
5
10
15
20
25
Jul-11 Aug-11 Sep-11 Oct-11 Nov-11 Dec-11 Jan-12 Feb-12 Mar-12 Apr-12 May-12
Average Fraud Events Per “Shark" Per Month
Fraud Events
Trial and error
period
Churn/abandonment
period (fraudster frustration)
19 calls on
average
Previously
successful
fraudsters give up
after Victrio is in
place
14Proprietary © 2013 Victrio, Inc.
Case Study: Dramatic Impact of
Voice Biometric Fraud Detection
•  3:1 false positive ratio
exceeds industry
standards
•  82% reduction in
baseline fraud since
Victrio launch
•  Strong endorsement
from fraud operations
15Proprietary © 2013 Victrio, Inc.
Life	
  in	
  the	
  Trenches:	
  AuthenAcaAon	
  
•  Affirm the need and business case
–  What are the authentication metrics today?
–  Translate differential into hard costs
–  How to value soft benefits?
•  Better customer experience
•  Top of wallet
•  Churn and new customer acquisition cost
•  Resolve privacy considerations
–  Engage legal and security early
–  Design optimal “consent” strategy
16Proprietary © 2013 Victrio, Inc.
Life	
  in	
  the	
  Trenches:	
  AuthenAcaAon	
  
•  “Dual screening” maximizes accuracy and speed to answer
–  3X accuracy with combined blacklist & whitelist vs. whitelist alone
•  Multi-factor approach
–  Voice biometric, call and behavioral, account data, signal analysis
•  Deliberate “graylist” process
–  When do you trust a newly enrolled voiceprint?
•  Prepare organization with fraud detection first
–  Low customer exposure while you address the above
17Proprietary © 2013 Victrio, Inc.
Field	
  Results:	
  AuthenAcaAon	
  
•  Over 28M calls analyzed
•  Range of AHT reduction metrics
•  Leverage historical call recordings to kickstart
process
•  Full customer base coverage over time
18Proprietary © 2013 Victrio, Inc.
AuthenAcaAon	
  Accuracy:	
  
Integrated	
  Approach	
  Drives	
  Performance
•  Whitelist: 3X accuracy with combined blacklist
and whitelist versus whitelist alone
•  Whitelist: Additional 25% improvement in
accuracy when combined with metadata
•  Blacklist: 2X lift in accuracy for blacklist when
combining with metadata
19Proprietary © 2013 Victrio, Inc.
Business	
  Impact	
  and	
  Customer	
  Experience	
  
?
2,000 calls
Legitimate Callers
9,998,000 calls
Screen2:
FraudsterVoiceprintScreen
Screen1:
CustomerVoiceprintMatch
97%
Legitimate Callers
3% Legitimate Callers
~15 -25 Seconds
Faster Authentication:
$60M savings
Current
Authentication
Caught Fraud
1,992 calls
Uncaught Fraud
8 calls
Greater Fraud
Detection:
$40M savings
Fraudsters
Live Agent Calls
10M per Month
20Proprietary © 2013 Victrio, Inc.
Further	
  materials	
  and	
  informaAon	
  
•  Web access to demos
•  White paper
•  Industry data
Mark Lazar,
Victrio CEO
mlazar@victrio.com

Más contenido relacionado

La actualidad más candente

Neira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf ready
Neira Jones
 

La actualidad más candente (19)

Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach World
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take Over
 
BREACHED! Implementing Incident Response for a Compromised Credential
BREACHED! Implementing Incident Response for a Compromised CredentialBREACHED! Implementing Incident Response for a Compromised Credential
BREACHED! Implementing Incident Response for a Compromised Credential
 
Automate Lawsuit Filing? The Brave New World of "Anti Robocall Apps
Automate Lawsuit Filing?  The Brave New World of "Anti Robocall AppsAutomate Lawsuit Filing?  The Brave New World of "Anti Robocall Apps
Automate Lawsuit Filing? The Brave New World of "Anti Robocall Apps
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
New Requirements of Fraud Prevention
New Requirements of Fraud PreventionNew Requirements of Fraud Prevention
New Requirements of Fraud Prevention
 
New fraud protection solutions
New fraud protection solutionsNew fraud protection solutions
New fraud protection solutions
 
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
 
Comply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed AuditsComply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed Audits
 
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
The Digital Battleground - Protecting the Customer Experience in the midst of...
The Digital Battleground - Protecting the Customer Experience in the midst of...The Digital Battleground - Protecting the Customer Experience in the midst of...
The Digital Battleground - Protecting the Customer Experience in the midst of...
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study
 
Neira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf ready
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security Guarantees
 

Similar a The Power of a Black List, the Promise of a White List

Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 

Similar a The Power of a Black List, the Promise of a White List (20)

Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cyber security
Cyber securityCyber security
Cyber security
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Fraud Investigation Case study
Fraud Investigation Case studyFraud Investigation Case study
Fraud Investigation Case study
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Navigating the Worker Shortage in the Contact Center
Navigating the Worker Shortage in the Contact CenterNavigating the Worker Shortage in the Contact Center
Navigating the Worker Shortage in the Contact Center
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services Experience
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
CyberArk Stock Pitch
CyberArk Stock PitchCyberArk Stock Pitch
CyberArk Stock Pitch
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Challenge Accepted
Challenge AcceptedChallenge Accepted
Challenge Accepted
 
A Lack of IT Controls= Fraud Opportunities
A Lack of IT Controls= Fraud OpportunitiesA Lack of IT Controls= Fraud Opportunities
A Lack of IT Controls= Fraud Opportunities
 
Early Stage Fintech Investment Thesis (Sept 2016)
Early Stage Fintech Investment Thesis (Sept 2016)Early Stage Fintech Investment Thesis (Sept 2016)
Early Stage Fintech Investment Thesis (Sept 2016)
 
Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 

Más de derektop

Más de derektop (12)

Operationalizing Voice Biometrics
Operationalizing Voice BiometricsOperationalizing Voice Biometrics
Operationalizing Voice Biometrics
 
Introduction to Truly Handsfree 3.0
Introduction to Truly Handsfree 3.0Introduction to Truly Handsfree 3.0
Introduction to Truly Handsfree 3.0
 
e-Government Applications for Voice Authentication
e-Government Applications for Voice Authenticatione-Government Applications for Voice Authentication
e-Government Applications for Voice Authentication
 
Mobile Voice Authentication
Mobile Voice AuthenticationMobile Voice Authentication
Mobile Voice Authentication
 
Future of Mobile Authentication
Future of Mobile AuthenticationFuture of Mobile Authentication
Future of Mobile Authentication
 
The Future of Secure, Mobile Authentication
The Future of Secure, Mobile AuthenticationThe Future of Secure, Mobile Authentication
The Future of Secure, Mobile Authentication
 
The Case for Voice + Face Recognition
The Case for Voice + Face RecognitionThe Case for Voice + Face Recognition
The Case for Voice + Face Recognition
 
Case Study: Passive Authentication at Barclays
Case Study: Passive Authentication at BarclaysCase Study: Passive Authentication at Barclays
Case Study: Passive Authentication at Barclays
 
Powering Security and Easy Authentication in a Multi-Channel World
Powering Security and Easy Authentication in a Multi-Channel WorldPowering Security and Easy Authentication in a Multi-Channel World
Powering Security and Easy Authentication in a Multi-Channel World
 
Natural Interaction in the Connected Home
Natural Interaction in the Connected HomeNatural Interaction in the Connected Home
Natural Interaction in the Connected Home
 
Case Study: Voice Verification by Mobile Operator Avea
Case Study: Voice Verification by Mobile Operator AveaCase Study: Voice Verification by Mobile Operator Avea
Case Study: Voice Verification by Mobile Operator Avea
 
Voice Biometrics: The Big Picture Gets Bigger
Voice Biometrics: The Big Picture Gets BiggerVoice Biometrics: The Big Picture Gets Bigger
Voice Biometrics: The Big Picture Gets Bigger
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

The Power of a Black List, the Promise of a White List

  • 1. © 2012 NACHA — The Electronic Payments Association. All rights reserved. No part of this material may be used without the prior written permission of NACHA. This material is not intended to provide any warranties, legal advice, or professional assistance of any kind. Making  voice  biometrics  work   in  real  world  implementa5ons       AKA,  Beyond  the  bullet  point       Mark  Lazar   CEO,  Victrio  
  • 2. 2Proprietary © 2013 Victrio, Inc. Victrio  Intro   •  Emerging leader in passive voice biometrics •  Team expertise in voice recognition and call center –  Ex-Nuance, BeVocal, Tuvox •  Industry acclaim –  Gartner Cool Vendor 2013 for Security: Identity and Access Management –  RSA Most Innovative Company 2013 - Finalist
  • 3. 3Proprietary © 2013 Victrio, Inc. Deep  Experience  in  Voice  Biometric   ImplementaAons  for  Financial  Firms   •  3 years of implementation experience •  Clients include 3 of top 5 financial firms •  Screening 100M calls in 2013 •  Largest global fraudster database in world
  • 4. 4Proprietary © 2013 Victrio, Inc. History  of  Industry’s  Voice  Biometric  Efforts   1990’s   Schwab   Early   2000’s   Mid   2000’s   Late   2000’s   HSN   HarOord   Insurance   MarrioP   US  Bank   AT&T   Visa   Bank  of   America   First  Horizon   Bell  Canada   Bank  of  America   ABN/AMRO   Santander   American  Express  
  • 5. 5Proprietary © 2013 Victrio, Inc. 1990’s   Schwab   Early   2000’s   Mid   2000’s   Late   2000’s   HSN   HarOord   Insurance   MarrioP   US  Bank   Visa   AT&T   Bank  of   America   First  Horizon   TERMINATED TERMINATED UNKNOWN INTERNAL ONLY INTERNAL ONLY TERMINATED INTERNAL ONLY TERMINATED TERMINATED TERMINATING Bell  Canada   Bank  of  America   ABN/AMRO   Santander   American  Express   Gap  Between  Theory  and  PracAce  
  • 6. 6Proprietary © 2013 Victrio, Inc. Today:  Even  More  ImperaAve   to  rescue  call  center   Customers are increasingly frustrated… Web Attacks vs. Phone Attacks While professional fraudsters aren’t stopped 65%: Frustrated Source: Opus Research 2012 Survey Source: RSA Client Study 50%: Too time- consuming
  • 7. 7Proprietary © 2013 Victrio, Inc. Passive  Voice  Biometrics:  Promising  Theory   •  No customer interruption •  Passive enrollment •  Passive authentication •  Alerts agent in real time –  Shorter call and AHT –  Happier customer –  Stronger fraud detection
  • 8. 8Proprietary © 2013 Victrio, Inc. Victrio ID Confidence Cloud Voice Biometric Analysis Account Data Call & Behavioral Data Voiceprint Match ID Confidence Reported to Agent High Fraud ? Low Caller Voice Call Center / IVR Mobile Passive Customer Voiceprints Shared Fraudster Voiceprints Signal Analysis Ideal  System  Overview  
  • 9. 9Proprietary © 2013 Victrio, Inc. Life  in  the  Trenches:  Fraud  DetecAon   •  Call center infrastructure is never ready on Day 1 –  Call recording system poorly configured •  Association with accounts not always available •  Relevant metadata not available –  Clients have to assert ownership of data •  Need new people processes to support solution •  Poor flagging and capture of fraud interactions •  Poor understanding of call center “big data”
  • 10. 10Proprietary © 2013 Victrio, Inc. Life  in  the  Trenches:  Fraud  DetecAon   •  Business Model? –  Licensed product? –  Managed service? •  Evolve system to anticipate evolving fraudster behavior •  Track changing impact of factors in multi-factor scoring •  Example: Growing usage of using $8 burner phones weakens device detection; adjust weighting
  • 11. 11Proprietary © 2013 Victrio, Inc. Field  Results:  High  Repeat  Fraud  Rate   0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% BROKERAGE   71% 89% BANK  ACCOUNT  FRAUD   42% 76% CREDIT  CARD  FRAUD   72% 95%
  • 12. 12Proprietary © 2013 Victrio, Inc. 0 20 40 60 80 100 120 140 160 180 200 Duke Kobayashi Jeffrey Johns Tyler Miresh Charles Davis Robert Albert Bill Koflin Josh Dumas Greg Barker Sally Davino Michael Lee Shauna Koshik Alexandra Laurel Patrick Donally Elizabeth Wright Jerry Lucent Carla Gonzalez Francis Montgomery Michael Henley Shauni Mccoy Mark Martigas Brian Reed Recurring  PaPern:  DramaAc  Fraudster  AcAvity   ConcentraAon   TOP  20  FRAUDSTERS   ~ Half of fraud activity perpetrated by top 10 Fraudsters Calling > 30 times per month C A L L S
  • 13. 13Proprietary © 2013 Victrio, Inc. Average Number of Attacks From “Sharks” Drops (Study of Top 10) 17 20 21 10.5 12 5.5 6.5 1.5 2 1 1 0 5 10 15 20 25 Jul-11 Aug-11 Sep-11 Oct-11 Nov-11 Dec-11 Jan-12 Feb-12 Mar-12 Apr-12 May-12 Average Fraud Events Per “Shark" Per Month Fraud Events Trial and error period Churn/abandonment period (fraudster frustration) 19 calls on average Previously successful fraudsters give up after Victrio is in place
  • 14. 14Proprietary © 2013 Victrio, Inc. Case Study: Dramatic Impact of Voice Biometric Fraud Detection •  3:1 false positive ratio exceeds industry standards •  82% reduction in baseline fraud since Victrio launch •  Strong endorsement from fraud operations
  • 15. 15Proprietary © 2013 Victrio, Inc. Life  in  the  Trenches:  AuthenAcaAon   •  Affirm the need and business case –  What are the authentication metrics today? –  Translate differential into hard costs –  How to value soft benefits? •  Better customer experience •  Top of wallet •  Churn and new customer acquisition cost •  Resolve privacy considerations –  Engage legal and security early –  Design optimal “consent” strategy
  • 16. 16Proprietary © 2013 Victrio, Inc. Life  in  the  Trenches:  AuthenAcaAon   •  “Dual screening” maximizes accuracy and speed to answer –  3X accuracy with combined blacklist & whitelist vs. whitelist alone •  Multi-factor approach –  Voice biometric, call and behavioral, account data, signal analysis •  Deliberate “graylist” process –  When do you trust a newly enrolled voiceprint? •  Prepare organization with fraud detection first –  Low customer exposure while you address the above
  • 17. 17Proprietary © 2013 Victrio, Inc. Field  Results:  AuthenAcaAon   •  Over 28M calls analyzed •  Range of AHT reduction metrics •  Leverage historical call recordings to kickstart process •  Full customer base coverage over time
  • 18. 18Proprietary © 2013 Victrio, Inc. AuthenAcaAon  Accuracy:   Integrated  Approach  Drives  Performance •  Whitelist: 3X accuracy with combined blacklist and whitelist versus whitelist alone •  Whitelist: Additional 25% improvement in accuracy when combined with metadata •  Blacklist: 2X lift in accuracy for blacklist when combining with metadata
  • 19. 19Proprietary © 2013 Victrio, Inc. Business  Impact  and  Customer  Experience   ? 2,000 calls Legitimate Callers 9,998,000 calls Screen2: FraudsterVoiceprintScreen Screen1: CustomerVoiceprintMatch 97% Legitimate Callers 3% Legitimate Callers ~15 -25 Seconds Faster Authentication: $60M savings Current Authentication Caught Fraud 1,992 calls Uncaught Fraud 8 calls Greater Fraud Detection: $40M savings Fraudsters Live Agent Calls 10M per Month
  • 20. 20Proprietary © 2013 Victrio, Inc. Further  materials  and  informaAon   •  Web access to demos •  White paper •  Industry data Mark Lazar, Victrio CEO mlazar@victrio.com