About ERM
About The Speaker Safe Browsing, Monitoring Services Product Manager, Easy Solutions Inc. 8+ years anti-fraud, fraud risk, and security intelligence programs Previously licensed Securities Principle and Stock Broker Designed anti-fraud trading practices Strategic and Tactical fraud program deployments for both Bank and Brokerage entities
Phishing Fraud scam conducted for the purposes of information or identity theft Pharming Fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one Malware Short for malicious software - computer programs designed to infiltrate or cause damage without the users consent Malicious Apps Mobile adoption rates have created a new source for fraud scams
Opportunities Banks and Financial institutions only 20% of fraud threat targets Credential re-use has allowed for non-brand specific harvesters Adoption of Social Media and Mobile technologies has outpaced security ecommerce use has grown and is prime for fraud
Underground Organized crime has more resources Identifying directed attacks early gives you the advantage Capture harvested credentials before they are sold Undermine their attempts to infiltrate you
Next-gen Mobile adoption is growing Customers are comfortable downloading apps Security on mobiles devices is less than desirable Malicious apps are abundant Becoming preferred form factor
Chatter Bad guys talk to each other Harvest information and use it to your advantage Knowing where to look is just as important as knowing what to look for Prevent damage to your reputation
Recon Establish honeypots, gather Intel on fraudster Put security into existing apps with SDK s (Software Developer Kits) Information Sharing with peer groups, network Identify domain registrations proactively Use and refer to law enforcement agencies Test yourself, perform fraud vulnerability checks
Advanced Tools Deploy tools that are proactive Use technology to gain the advantage Reduce manual processes Be transparent, keep them guessing Be aggressive, acceptable losses does not mean accept a loss Use multiple layers of protection integrate and federate data
Detect ID Complex Device Authentication Detect Safe Browsing (DSB) Malware, Pharming, and Phishing protection Detect Monitoring Services (DMS) Proactive Brand Threat Intelligence Detect TA Transaction Anomaly and behavior analysis
Your go to advisors for all matters in information security. 800 S Douglas Road #940 Coral Gables, FL 33134 Phone: 305-447-6750 Email: info@emrisk.com www.emrisk.com