Training

2018 New York Security Summit , Events , Multi-factor & Risk-based Authentication

Fight Fraud and Improve Customer Experience

Fight Fraud and Improve Customer Experience

Traditional Authentication is not a standalone fraud killer. One Time Passwords, Biometrics, Mobile Authentication via PUSH or SMS, these technologies by themselves are being subverted by new attacks. 15 years ago, with FFIEC guidance, One Time Passwords reduced fraud by themselves by over half. Today, new forms of front end user authentication are being adopted by more users than ever, but yet Fraud is still increasing.

See Also: Digital Evolution and Fraud Evolution: How to Keep Up with the Changing Times

Risk Based Authentication is not a standalone fraud killer. Leveraging risk engines to identify fraudulent activity is only as good as the data being given to the engine and the rules applied to the data. In some banks there are risk engines with hundreds of rules, making it a nightmare to manage and impossible to adjust for new attacks. Manually adjusting these rules has to come to an end and users are requiring real-time decisions and real-time protection from fraud and attacks.

Combining the appropriate level of authentication at the right time is key to new authentication needs. Artificial Intelligence and Machine Learning combined with data gathers on multiple end-points for multiple channels increases the overall visibility of fraud happening at a user level. Adding in the ability to challenge and address the attacks and fraud in real-time by asking users to provide the correct level of authentication when a problem is detected is paramount.

This session will look at the past technologies of authentication and risk analysis and offer a new perspective on where these technologies are headed and how to make use of them immediately.

Slide Previews

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.