SlideShare a Scribd company logo
1 of 44
Download to read offline
OPERATIONAL
RISK MANAGEMENT
& COMPLIANCE
© 2012 – PROPRIETARY AND CONFIDENTIAL INFORMATION OF CVIDYA
Fraud Management
Industry Update
Webinar, March 2015
Jason Lane-Sellers
Fraud Expert – cVidya Networks
Director – CFCA
Co Chair – TMF Fraud Management Group
Agenda
 Latest fraud Surveys and issues
– CFCA
– TM Forum
 Fraud on the rise
 Cyber Threats?
– Intelligence
2
CFCA Survey
CFCA – Communications Fraud Control Assoc
 The only real industry benchmark
– Running for over 12 years
 Survey Details
– Last survey 2013
– Every 2 years
– 100+ participants, more wanted
– GSMA, FIINA & CFCA members (range of services)
– Next survey due for launch in next few days
4
CFCA Fraud Survey - Respondents
5
CFCA Survey – Fraud Growth
Global fraud loss survey trend – based on previous surveys
Global fraud losses
showing a 15%
increase in 2013
CFCA Fraud Survey - Staffing
7
CFCA Fraud Survey - Coverage
8
CFCA Fraud Survey – Fraud Methods
Subscription & Dealer Issues?
Risk
Reward
In house and own retail checks
increased and developed but
impact limited by risk appetite
Sales
Pressure
Fraud risks driven by agent
circumvention or manipulation to
meet demands
Technology
New technology drives fraud
levels – e.g. iphone 6
Web
Sales
Internet sales on rise, increasing
automation, allowing remote
attack from fraudsters
Third Party
Third party channels developing
& Margins decreasing –
increasing the risk of dealer
related fraud
Why the Rise of ATO
Issues and Causes
 Pressure points in your organisation and market allowing ATO;
– Focus on Customer retention & Churn reduction
– Simplifying Customer Services (CS) processes – online self service
– Push for reductions in CS costs and ACHT
– Reliance on simplistic Knowledge Based Authentication (KBA)
 Fraudsters manipulate these pressure points
– KBA, can be weak (ease of use) and simply compromised via social engineering
– Self service solutions – simple social engineering to compromise
– CS staff also liable to social engineering, based on sales & time pressures and
related financial incentive
– Less restrictions and checks in place on existing customer processes (compared
to new applications)
– Greater profit value for fraudsters (top offers for existing customers)
Typical Flow & Pressure Points
LOGISTICSAGENT
CRM
WWW
IVR
Social engineering, Screen process
scraping, IP attacks
Data Misuse
Process Abuse
Logistics Manipulation
CFCA Fraud Survey – Fraud Types
14
These
responses
highlight issues
with the survey
and
classification
CFCA Fraud Survey – Usage Fraud Destinations
15
IRSF - Numbering Misuse
• Unallocated numbers in national numbering plan are
‘hijacked’ by a transit carrier and routed to content service
• Common/recent examples: Somalia, Guinea
Hijacked
Unallocated
Ranges
• Numbers allocated to network operators are ‘hijacked’ by a
transit carrier as above
• Common/recent example: Bulgaria
Hijacked
Allocated ranges
• Number ranges sold by organisations or operators to third
parties for international content services
• Common/recent examples: Austria, Carribean
Allocated ranges
that are sold
Numbering Plan Issues – UK Example
+440XXXX
+441XXXX
+442XXXX
+443XXXX
+444XXXX
+446XXXX
+445XXXX
+447XXXX
+448XXXX
+449XXXX
unallocated
Fixed line – regional allocation
Fixed line – regional allocation
Fixed line & non geographic – not all active
unallocated
Special-Non geographic not all active
unallocated
Wireless – exceptions – e.g 4470XXX special PNS
Special - Free Phone – some rev share (870,875 etc)
Premium Rev share – PPM & PPC
International (Premium Rate) Number Providers
CFCA Fraud Survey - % Fraud Loss
19
Fraud Classification Model –
TM Forum
Fraud Classification Model – TM Forum
• Why do we need an effective FM Classification Model?
Fraud Scenario Referred Fraud Types Statistics
“Fraudster generates a high volume of calls to a PRS number
range that he owns in another country with no intention to
pay.”
• PRS
• IRSF
• PRS/IRSF
• Bypass/SIMBOX
• PABX Hacking
• Clip-on
• Stolen Line
• Subscription
• Dealer
• Payment
• PBX / Voicemail
• Roaming out
Unique: 39%
Multiple: 44%
Structured: 17%
An example from the 2012 TMForum Fraud Survey
Fraud Classification Model - Challenges
• Distinct names for the same Fraud Type
• Distinct interpretation depending on the core service (Mobile,
Fixed, Cable, etc.)
• Multiple Frauds perpetrated in the same Fraud Case
• Fast changing nature of Fraud
• Need for a multi-dimensional analysis
• Need for different levels of abstraction
• Existence of several similar Ad hoc “Fraud Type” lists
Classification Model - TM Forum
Summary of Relations Between
Enablers – Fraud Types
Subscription Fraud
Hacking of Network Elements
Arbitrage
Mobile Malware
ENABLERS
(Vulnerabilities)
FRAUD TYPE
(Fraudulent Scheme)
TELECOMSSERVICEFRAUD
Cloning of SIM Card/Equipment
Protocol/Signalling Manipulation
Tariff Rates/Pricing Plan Abuse
False Base Station Attack
Misconfiguration of
Network/Service Platforms
International Revenue Share Fraud
Reselling of Calls
Wholesale Fraud
Private Use
Commissions Fraud
Traffic Inflation for Credits/Bonus
Charging Bypass
Interconnect Bypass
SIMBox Gateway
OBJECTIVE
(Scope)
 Make Money/Profit
 Obtain Free
Services/Goods
 Obtain Credits/Bonuses
 Obtain Commissions
 Obtain Money
 Access User Bank Account
 Pretending to Be the
Operator
 ……….
BA - Related Fields
Fraud
Management
Security
Management
Revenue
Assurance
- Revision of Internal Procedures, Processes
and Products/Services
- Implementation of Technical Solutions at
Network and Service Platforms
Development, Enhancement and Reconfiguration of
Fraud Management Systems (FMS)
Classification Model - TM Forum
Summary of Relations Between
Enablers – Fraud Types
Subscription Fraud
Hacking of Network Elements
Arbitrage
Mobile Malware
ENABLERS
(Vulnerabilities)
FRAUD TYPE
(Fraudulent Scheme)
TELECOMSSERVICEFRAUD
Cloning of SIM Card/Equipment
Protocol/Signalling Manipulation
Tariff Rates/Pricing Plan Abuse
False Base Station Attack
Misconfiguration of
Network/Service Platforms
International Revenue Share Fraud
Reselling of Calls
Wholesale Fraud
Private Use
Commissions Fraud
Traffic Inflation for Credits/Bonus
Charging Bypass
Interconnect Bypass
SIMBox Gateway
OBJECTIVE
(Scope)
 Make Money/Profit
 Obtain Free
Services/Goods
 Obtain Credits/Bonuses
 Obtain Commissions
 Obtain Money
 Access User Bank Account
 Pretending to Be the
Operator
 ……….
BA - Related Fields
Fraud
Management
Security
Management
Revenue
Assurance
- Revision of Internal Procedures, Processes
and Products/Services
- Implementation of Technical Solutions at
Network and Service Platforms
Development, Enhancement and Reconfiguration of
Fraud Management Systems (FMS)
Enabler - How they get on the
Network or service access
Fraud Type - How they generate the
revenue from the fraud
TMF Survey 2014 - Excerpts
25
Fraud Survey 2014 - Classification
Ad Hoc definition
Internal
Classification Model
Industry
Classification Model
Fraud Survey 2014 – Short Term Improvement
27
The New Trend – “Cyber”
28
Market Perception
Cyber Issues… In the Media…
Consumer
Protection
Cyber Issues… In the Media…
31
Integrity
Cyber Issues… In the Media…
32
Data
Security &
Privacy
Cyber Issues… In the Media…
33
Fraud
Cyber Issues in fraud….
Public
Web
• “How to” blogs and forums
• Information Sites
• Source information (Self
Service)
Dark-Net
• Underground Markets –
Information resale
• Underground Forums –
Tutorials and methods
Examples…..
 Online User groups and information exchanges
– Fraud Techniques
– How to guides for hacking, and social engineering
 Data purchase & Provision services
– Credit Card Numbers
– Subscriber Information
– Passwords
 Technical Compromise Data
– Online self service hacks
– Equipment compromise
?
? ?
Fraudsters Guides
Hand Picked Set of Guides for Beginner
Fraudsters – Premium. Including fraud
method of how to get your own SIM cards
from anywhere.
How to steal people's information
Example - PBX hacking techniques
Example - Account Take Over Guide
Link*: http://agorahooawayyfoe.onion/p/jddd9FyUs2
The Reaction - Organizational
Change
 GSMA
– Instigated a combination of working
groups to address the perceived
issues
– Fraud Forum, Security Group
– Now joined as one working group
– Fraud & Security Group
– Initiative designed to address the
perceived threat of new
technologies and methods
 TMF
– Moved its Revenue Management
Group under Security
– RM includes, Fraud & RA
 Operators / CSPs
– Movement of Fraud Operations
under Security Functions
– 8% move in 2013 survey…
– Will we see this increase in
the new fraud survey?
Organisations are changing….
The Fraud Management Progression?
Security trained
individuals involved
Real Time, InBand
signalling
Use of SS7 probes and
DTMF Analysis
Event focused analysis
& investigation
Fraud as Part of
Security
Past
Finance trained
individuals (audit)
Non Real Time Usage
analysis
Payments, process and
product risk analysis
Revenue Focused
Fraud as part of
Finance and RA
Present
Security expertise in
Fraud (IT & Network)?
Real Time Big Data
Analytics?
Content Analysis – DPI
& probes?
Analytics Focused,
Commercial Nous?
Fraud & Security?
Future?
So is it time to review our approach?
 Does the growth of Data, IP and “cyber” threats mean we we have to
reanalyze our fraud approach?
– Many situations hidden from view
 Do we need to go back to in-depth analysis?
– Need to know what is happening in the data channel
 Is NOW the Time to use DPI in fraud and consumer protection….?
– Network & marketing departs are using DPI for QoS & Marketing
Analytics
 Are we ready for the amount and complexity of the data that we are
going to need?
– Many organisations investing in “Big Data Solutions”
?
? ?
Questions?
Jason.lane-sellers@cVidya.com
THANK YOU!
www.cvidya.com
44

More Related Content

What's hot

Revenue assurance in telecom
Revenue assurance in telecomRevenue assurance in telecom
Revenue assurance in telecomcVidya Networks
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeAlan Percy
 
Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...
Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...
Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...cVidya Networks
 
Telecom reporting training
Telecom reporting trainingTelecom reporting training
Telecom reporting trainingntel
 
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms ConferenceRevenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms ConferenceArena International
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
 
Big Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to ExternalBig Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to ExternalcVidya Networks
 
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssuranceHow to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssurancecVidya Networks
 
Zen Infographic - Revenue Assurance Automation
Zen Infographic - Revenue Assurance AutomationZen Infographic - Revenue Assurance Automation
Zen Infographic - Revenue Assurance AutomationSubex
 
Revenue Assurance & Fraud Management
Revenue Assurance & Fraud ManagementRevenue Assurance & Fraud Management
Revenue Assurance & Fraud ManagementAnnaline Lottering
 
Telecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopTelecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopParcus Group
 
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...John Owens
 
Detecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networksDetecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networksJamal Meselmani
 
MVNO Market
MVNO MarketMVNO Market
MVNO Marketjrinaudo
 
TenderSearch - Services
TenderSearch - ServicesTenderSearch - Services
TenderSearch - ServicesPatrick Harris
 
The New Role of Billing & Charging Systems In The Face Of IoT Challenges
The New Role of Billing & Charging Systems In The Face Of IoT ChallengesThe New Role of Billing & Charging Systems In The Face Of IoT Challenges
The New Role of Billing & Charging Systems In The Face Of IoT ChallengesComarch
 
Pricing and commissions Webinar English
Pricing and commissions Webinar EnglishPricing and commissions Webinar English
Pricing and commissions Webinar EnglishCamilo Tellez
 
C level revenue assurance
C level revenue assuranceC level revenue assurance
C level revenue assurancemarukanda
 

What's hot (20)

Revenue assurance in telecom
Revenue assurance in telecomRevenue assurance in telecom
Revenue assurance in telecom
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...
Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...
Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...
 
Telecom reporting training
Telecom reporting trainingTelecom reporting training
Telecom reporting training
 
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms ConferenceRevenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
 
Big Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to ExternalBig Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to External
 
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssuranceHow to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
 
Zen Infographic - Revenue Assurance Automation
Zen Infographic - Revenue Assurance AutomationZen Infographic - Revenue Assurance Automation
Zen Infographic - Revenue Assurance Automation
 
Revenue Assurance & Fraud Management
Revenue Assurance & Fraud ManagementRevenue Assurance & Fraud Management
Revenue Assurance & Fraud Management
 
Telecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopTelecom Revenue Assurance Workshop
Telecom Revenue Assurance Workshop
 
CRMS_Project-JF-edits
CRMS_Project-JF-editsCRMS_Project-JF-edits
CRMS_Project-JF-edits
 
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
 
Detecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networksDetecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networks
 
MVNO Market
MVNO MarketMVNO Market
MVNO Market
 
TenderSearch - Services
TenderSearch - ServicesTenderSearch - Services
TenderSearch - Services
 
The New Role of Billing & Charging Systems In The Face Of IoT Challenges
The New Role of Billing & Charging Systems In The Face Of IoT ChallengesThe New Role of Billing & Charging Systems In The Face Of IoT Challenges
The New Role of Billing & Charging Systems In The Face Of IoT Challenges
 
Pricing and commissions Webinar English
Pricing and commissions Webinar EnglishPricing and commissions Webinar English
Pricing and commissions Webinar English
 
C level revenue assurance
C level revenue assuranceC level revenue assurance
C level revenue assurance
 

Viewers also liked

Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...cVidya Networks
 
Revenue assurance 101
Revenue assurance 101Revenue assurance 101
Revenue assurance 101ntel
 
Subscription fraud analytics using classification
Subscription fraud analytics using classificationSubscription fraud analytics using classification
Subscription fraud analytics using classificationSomdeep Sen
 
Tech M White Paper Revenue Assurance D0 9 180612 (1)
Tech M White Paper Revenue Assurance D0 9 180612 (1)Tech M White Paper Revenue Assurance D0 9 180612 (1)
Tech M White Paper Revenue Assurance D0 9 180612 (1)aprasoon
 
When revenue intelligence meets the cloud
When revenue intelligence meets the cloudWhen revenue intelligence meets the cloud
When revenue intelligence meets the cloudcVidya Networks
 
Telco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growthTelco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growthcVidya Networks
 
cVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum ConferencecVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum ConferencecVidya Networks
 
Telecom Fraud Detection
Telecom Fraud DetectionTelecom Fraud Detection
Telecom Fraud DetectionPunit Kishore
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudcVidya Networks
 
TM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and AlltelTM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and AlltelcVidya Networks
 
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssuranceSmart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssurancecVidya Networks
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sectorsksahu099
 
Training Report at Mobitel
Training Report at MobitelTraining Report at Mobitel
Training Report at MobitelDinusha Dilanka
 

Viewers also liked (14)

Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
 
Revenue assurance 101
Revenue assurance 101Revenue assurance 101
Revenue assurance 101
 
Subscription fraud analytics using classification
Subscription fraud analytics using classificationSubscription fraud analytics using classification
Subscription fraud analytics using classification
 
Tech M White Paper Revenue Assurance D0 9 180612 (1)
Tech M White Paper Revenue Assurance D0 9 180612 (1)Tech M White Paper Revenue Assurance D0 9 180612 (1)
Tech M White Paper Revenue Assurance D0 9 180612 (1)
 
When revenue intelligence meets the cloud
When revenue intelligence meets the cloudWhen revenue intelligence meets the cloud
When revenue intelligence meets the cloud
 
Telco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growthTelco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growth
 
cVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum ConferencecVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum Conference
 
Telecom Fraud Detection
Telecom Fraud DetectionTelecom Fraud Detection
Telecom Fraud Detection
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraud
 
TM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and AlltelTM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and Alltel
 
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssuranceSmart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 
revenue assurance
revenue assurancerevenue assurance
revenue assurance
 
Training Report at Mobitel
Training Report at MobitelTraining Report at Mobitel
Training Report at Mobitel
 

Similar to Fraud Management Industry Update Webinar by cVidya

Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label IssuersChristopher Uriarte
 
Shift at work of Fraud Management
Shift at work of Fraud ManagementShift at work of Fraud Management
Shift at work of Fraud ManagementcVidya Networks
 
Shift at work of fraud management
Shift at work of fraud managementShift at work of fraud management
Shift at work of fraud managementcVidya Networks
 
Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy European Merchant Services
 
Demograft for telecoms - benefits from location-based analytics
Demograft for telecoms - benefits from location-based analyticsDemograft for telecoms - benefits from location-based analytics
Demograft for telecoms - benefits from location-based analyticsReach-U
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseLaurent Pacalin
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom FraudJeraSoft
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeTelcoBridges Inc.
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Krupin kirill (fraud) research proposal
Krupin kirill (fraud) research proposalKrupin kirill (fraud) research proposal
Krupin kirill (fraud) research proposalKirill Krupin
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fmskkvences
 
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEYFortuneCMO, LLC
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Anil Jain
 
Insurance digital transformation - key challenges
Insurance   digital transformation - key challengesInsurance   digital transformation - key challenges
Insurance digital transformation - key challengesArif Mohammed
 
Robotic Process Automation (RPA) Webinar - By Matrix-IFS
Robotic Process Automation (RPA) Webinar - By Matrix-IFSRobotic Process Automation (RPA) Webinar - By Matrix-IFS
Robotic Process Automation (RPA) Webinar - By Matrix-IFSIdan Tohami
 
Fraud Analytics - Discussion
Fraud Analytics - DiscussionFraud Analytics - Discussion
Fraud Analytics - DiscussionAditya Madiraju
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Tim Bass
 

Similar to Fraud Management Industry Update Webinar by cVidya (20)

Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
Shift at work of Fraud Management
Shift at work of Fraud ManagementShift at work of Fraud Management
Shift at work of Fraud Management
 
Shift at work of fraud management
Shift at work of fraud managementShift at work of fraud management
Shift at work of fraud management
 
Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy
 
Demograft for telecoms - benefits from location-based analytics
Demograft for telecoms - benefits from location-based analyticsDemograft for telecoms - benefits from location-based analytics
Demograft for telecoms - benefits from location-based analytics
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Merging fraud in a full IP environment
Merging fraud in a full IP environmentMerging fraud in a full IP environment
Merging fraud in a full IP environment
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Krupin kirill (fraud) research proposal
Krupin kirill (fraud) research proposalKrupin kirill (fraud) research proposal
Krupin kirill (fraud) research proposal
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fms
 
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
Insurance digital transformation - key challenges
Insurance   digital transformation - key challengesInsurance   digital transformation - key challenges
Insurance digital transformation - key challenges
 
Robotic Process Automation (RPA) Webinar - By Matrix-IFS
Robotic Process Automation (RPA) Webinar - By Matrix-IFSRobotic Process Automation (RPA) Webinar - By Matrix-IFS
Robotic Process Automation (RPA) Webinar - By Matrix-IFS
 
Fraud Analytics - Discussion
Fraud Analytics - DiscussionFraud Analytics - Discussion
Fraud Analytics - Discussion
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...
 

More from cVidya Networks

Utilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management StrategiesUtilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management StrategiescVidya Networks
 
“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...cVidya Networks
 
Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?cVidya Networks
 
TM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidyaTM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidyacVidya Networks
 
The Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssuranceThe Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssurancecVidya Networks
 
Enterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New OpportunitiesEnterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New OpportunitiescVidya Networks
 
Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012cVidya Networks
 
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & OpportunitiesJoint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & OpportunitiescVidya Networks
 
Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...cVidya Networks
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxcVidya Networks
 
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategyBringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategycVidya Networks
 
Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012cVidya Networks
 
Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...
Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...
Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...cVidya Networks
 

More from cVidya Networks (13)

Utilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management StrategiesUtilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management Strategies
 
“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...
 
Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?
 
TM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidyaTM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidya
 
The Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssuranceThe Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue Assurance
 
Enterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New OpportunitiesEnterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New Opportunities
 
Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012
 
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & OpportunitiesJoint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
 
Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake Paradox
 
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategyBringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
 
Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012
 
Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...
Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...
Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...
 

Recently uploaded

UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Anthony Dahanne
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencessuser9e7c64
 
VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profileakrivarotava
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 

Recently uploaded (20)

UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conference
 
VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profile
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 

Fraud Management Industry Update Webinar by cVidya

  • 1. OPERATIONAL RISK MANAGEMENT & COMPLIANCE © 2012 – PROPRIETARY AND CONFIDENTIAL INFORMATION OF CVIDYA Fraud Management Industry Update Webinar, March 2015 Jason Lane-Sellers Fraud Expert – cVidya Networks Director – CFCA Co Chair – TMF Fraud Management Group
  • 2. Agenda  Latest fraud Surveys and issues – CFCA – TM Forum  Fraud on the rise  Cyber Threats? – Intelligence 2
  • 4. CFCA – Communications Fraud Control Assoc  The only real industry benchmark – Running for over 12 years  Survey Details – Last survey 2013 – Every 2 years – 100+ participants, more wanted – GSMA, FIINA & CFCA members (range of services) – Next survey due for launch in next few days 4
  • 5. CFCA Fraud Survey - Respondents 5
  • 6. CFCA Survey – Fraud Growth Global fraud loss survey trend – based on previous surveys Global fraud losses showing a 15% increase in 2013
  • 7. CFCA Fraud Survey - Staffing 7
  • 8. CFCA Fraud Survey - Coverage 8
  • 9. CFCA Fraud Survey – Fraud Methods
  • 10. Subscription & Dealer Issues? Risk Reward In house and own retail checks increased and developed but impact limited by risk appetite Sales Pressure Fraud risks driven by agent circumvention or manipulation to meet demands Technology New technology drives fraud levels – e.g. iphone 6 Web Sales Internet sales on rise, increasing automation, allowing remote attack from fraudsters Third Party Third party channels developing & Margins decreasing – increasing the risk of dealer related fraud
  • 11. Why the Rise of ATO
  • 12. Issues and Causes  Pressure points in your organisation and market allowing ATO; – Focus on Customer retention & Churn reduction – Simplifying Customer Services (CS) processes – online self service – Push for reductions in CS costs and ACHT – Reliance on simplistic Knowledge Based Authentication (KBA)  Fraudsters manipulate these pressure points – KBA, can be weak (ease of use) and simply compromised via social engineering – Self service solutions – simple social engineering to compromise – CS staff also liable to social engineering, based on sales & time pressures and related financial incentive – Less restrictions and checks in place on existing customer processes (compared to new applications) – Greater profit value for fraudsters (top offers for existing customers)
  • 13. Typical Flow & Pressure Points LOGISTICSAGENT CRM WWW IVR Social engineering, Screen process scraping, IP attacks Data Misuse Process Abuse Logistics Manipulation
  • 14. CFCA Fraud Survey – Fraud Types 14 These responses highlight issues with the survey and classification
  • 15. CFCA Fraud Survey – Usage Fraud Destinations 15
  • 16. IRSF - Numbering Misuse • Unallocated numbers in national numbering plan are ‘hijacked’ by a transit carrier and routed to content service • Common/recent examples: Somalia, Guinea Hijacked Unallocated Ranges • Numbers allocated to network operators are ‘hijacked’ by a transit carrier as above • Common/recent example: Bulgaria Hijacked Allocated ranges • Number ranges sold by organisations or operators to third parties for international content services • Common/recent examples: Austria, Carribean Allocated ranges that are sold
  • 17. Numbering Plan Issues – UK Example +440XXXX +441XXXX +442XXXX +443XXXX +444XXXX +446XXXX +445XXXX +447XXXX +448XXXX +449XXXX unallocated Fixed line – regional allocation Fixed line – regional allocation Fixed line & non geographic – not all active unallocated Special-Non geographic not all active unallocated Wireless – exceptions – e.g 4470XXX special PNS Special - Free Phone – some rev share (870,875 etc) Premium Rev share – PPM & PPC
  • 18. International (Premium Rate) Number Providers
  • 19. CFCA Fraud Survey - % Fraud Loss 19
  • 21. Fraud Classification Model – TM Forum • Why do we need an effective FM Classification Model? Fraud Scenario Referred Fraud Types Statistics “Fraudster generates a high volume of calls to a PRS number range that he owns in another country with no intention to pay.” • PRS • IRSF • PRS/IRSF • Bypass/SIMBOX • PABX Hacking • Clip-on • Stolen Line • Subscription • Dealer • Payment • PBX / Voicemail • Roaming out Unique: 39% Multiple: 44% Structured: 17% An example from the 2012 TMForum Fraud Survey
  • 22. Fraud Classification Model - Challenges • Distinct names for the same Fraud Type • Distinct interpretation depending on the core service (Mobile, Fixed, Cable, etc.) • Multiple Frauds perpetrated in the same Fraud Case • Fast changing nature of Fraud • Need for a multi-dimensional analysis • Need for different levels of abstraction • Existence of several similar Ad hoc “Fraud Type” lists
  • 23. Classification Model - TM Forum Summary of Relations Between Enablers – Fraud Types Subscription Fraud Hacking of Network Elements Arbitrage Mobile Malware ENABLERS (Vulnerabilities) FRAUD TYPE (Fraudulent Scheme) TELECOMSSERVICEFRAUD Cloning of SIM Card/Equipment Protocol/Signalling Manipulation Tariff Rates/Pricing Plan Abuse False Base Station Attack Misconfiguration of Network/Service Platforms International Revenue Share Fraud Reselling of Calls Wholesale Fraud Private Use Commissions Fraud Traffic Inflation for Credits/Bonus Charging Bypass Interconnect Bypass SIMBox Gateway OBJECTIVE (Scope)  Make Money/Profit  Obtain Free Services/Goods  Obtain Credits/Bonuses  Obtain Commissions  Obtain Money  Access User Bank Account  Pretending to Be the Operator  ………. BA - Related Fields Fraud Management Security Management Revenue Assurance - Revision of Internal Procedures, Processes and Products/Services - Implementation of Technical Solutions at Network and Service Platforms Development, Enhancement and Reconfiguration of Fraud Management Systems (FMS)
  • 24. Classification Model - TM Forum Summary of Relations Between Enablers – Fraud Types Subscription Fraud Hacking of Network Elements Arbitrage Mobile Malware ENABLERS (Vulnerabilities) FRAUD TYPE (Fraudulent Scheme) TELECOMSSERVICEFRAUD Cloning of SIM Card/Equipment Protocol/Signalling Manipulation Tariff Rates/Pricing Plan Abuse False Base Station Attack Misconfiguration of Network/Service Platforms International Revenue Share Fraud Reselling of Calls Wholesale Fraud Private Use Commissions Fraud Traffic Inflation for Credits/Bonus Charging Bypass Interconnect Bypass SIMBox Gateway OBJECTIVE (Scope)  Make Money/Profit  Obtain Free Services/Goods  Obtain Credits/Bonuses  Obtain Commissions  Obtain Money  Access User Bank Account  Pretending to Be the Operator  ………. BA - Related Fields Fraud Management Security Management Revenue Assurance - Revision of Internal Procedures, Processes and Products/Services - Implementation of Technical Solutions at Network and Service Platforms Development, Enhancement and Reconfiguration of Fraud Management Systems (FMS) Enabler - How they get on the Network or service access Fraud Type - How they generate the revenue from the fraud
  • 25. TMF Survey 2014 - Excerpts 25
  • 26. Fraud Survey 2014 - Classification Ad Hoc definition Internal Classification Model Industry Classification Model
  • 27. Fraud Survey 2014 – Short Term Improvement 27
  • 28. The New Trend – “Cyber” 28
  • 30. Cyber Issues… In the Media… Consumer Protection
  • 31. Cyber Issues… In the Media… 31 Integrity
  • 32. Cyber Issues… In the Media… 32 Data Security & Privacy
  • 33. Cyber Issues… In the Media… 33 Fraud
  • 34. Cyber Issues in fraud…. Public Web • “How to” blogs and forums • Information Sites • Source information (Self Service) Dark-Net • Underground Markets – Information resale • Underground Forums – Tutorials and methods
  • 35. Examples…..  Online User groups and information exchanges – Fraud Techniques – How to guides for hacking, and social engineering  Data purchase & Provision services – Credit Card Numbers – Subscriber Information – Passwords  Technical Compromise Data – Online self service hacks – Equipment compromise ? ? ?
  • 36. Fraudsters Guides Hand Picked Set of Guides for Beginner Fraudsters – Premium. Including fraud method of how to get your own SIM cards from anywhere. How to steal people's information
  • 37. Example - PBX hacking techniques
  • 38. Example - Account Take Over Guide Link*: http://agorahooawayyfoe.onion/p/jddd9FyUs2
  • 39. The Reaction - Organizational Change
  • 40.  GSMA – Instigated a combination of working groups to address the perceived issues – Fraud Forum, Security Group – Now joined as one working group – Fraud & Security Group – Initiative designed to address the perceived threat of new technologies and methods  TMF – Moved its Revenue Management Group under Security – RM includes, Fraud & RA  Operators / CSPs – Movement of Fraud Operations under Security Functions – 8% move in 2013 survey… – Will we see this increase in the new fraud survey? Organisations are changing….
  • 41. The Fraud Management Progression? Security trained individuals involved Real Time, InBand signalling Use of SS7 probes and DTMF Analysis Event focused analysis & investigation Fraud as Part of Security Past Finance trained individuals (audit) Non Real Time Usage analysis Payments, process and product risk analysis Revenue Focused Fraud as part of Finance and RA Present Security expertise in Fraud (IT & Network)? Real Time Big Data Analytics? Content Analysis – DPI & probes? Analytics Focused, Commercial Nous? Fraud & Security? Future?
  • 42. So is it time to review our approach?  Does the growth of Data, IP and “cyber” threats mean we we have to reanalyze our fraud approach? – Many situations hidden from view  Do we need to go back to in-depth analysis? – Need to know what is happening in the data channel  Is NOW the Time to use DPI in fraud and consumer protection….? – Network & marketing departs are using DPI for QoS & Marketing Analytics  Are we ready for the amount and complexity of the data that we are going to need? – Many organisations investing in “Big Data Solutions” ? ? ?