How to Use Splunk To Detect and Defeat Fraud, TheK And Abuse



Similar documents
How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More

Incident Response Using Splunk for State and Local Governments

Splunk for Networking and SDN

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas

Real World Big Data Architecture - Splunk, Hadoop, RDBMS

Leveraging Machine Data to Deliver New Insights for Business Analytics

BENCHMARKING V ISUALIZATION TOOL

Architec;ng Splunk for High Availability and Disaster Recovery

/Endpoint Security and More Rondi Jamison

Splunk: Using Big Data for Cybersecurity

Solving today's challenges with Oracle SOA Suite, and Oracle Coherence

Pu?ng B2B Research to the Legal Test

Telemetry: The Customer Experience

Splunk and Big Data for Insider Threats

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

UNIFIED, END- TO- END EDISCOVERY

ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps

ORION Retail Systems. Orion Digital Integration Inc. Point of Sale Reinvented for a Mobile World

Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training

Big Data Unlock the mystery and see what the future holds. Philip Sow SE Manager, SEA

Fixed Scope Offering (FSO) for Oracle SRM

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

Blue Medora VMware vcenter Opera3ons Manager Management Pack for Oracle Enterprise Manager

Website Design. A Crash Course. Monique Sherre, monique@boxcarmarke4ng.com

Splunk Company Overview

How To Protect Virtualized Data From Security Threats

BIG DATA FOR SECURITY: HOW CAN I PUT BIG DATA TO WORK FOR ME? Joe Goldberg. Splunk. Session ID: HT-T08 Session Classification: Intermediate

Cloudian The Storage Evolution to the Cloud.. Cloudian Inc. Pre Sales Engineering

HOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons

The Data Reservoir. 10 th September Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan

Project Por)olio Management

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

Overview of SOTI.

Hortonworks & SAS. Analytics everywhere. Page 1. Hortonworks Inc All Rights Reserved

Privileged Administra0on Best Prac0ces :: September 1, 2015

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook

Unified Monitoring with AppDynamics

Developing a successful Big Data strategy. Using Big Data to improve business outcomes

Enterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory.

Phone Systems Buyer s Guide

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Splunk Enterprise in the Cloud Vision and Roadmap

Using Splunk to Protect Pa=ent Privacy and Achieve Meaningful Use

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Payments Cards and Mobile Consul3ng Overview 2013

Building your cloud porbolio APS Connect

ENERGY EFFICIENCY THROUGH ENERGY DATA ANALYTICS BRIAN BOWEN MICHIGAN EO COLLABORATIVE SEPTEMBER 15, 2015

The Real Score of Cloud

UAB Cyber Security Ini1a1ve

Copyright 2013 Splunk Inc. Introducing Splunk 6

Texas Digital Government Summit. Data Analysis Structured vs. Unstructured Data. Presented By: Dave Larson

BIG DATA AND INVESTIGATIVE ANALYTICS

An Econocom Group company. Your partner in the transi4on towards Mobile IT

Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements

Chapter 3. Database Architectures and the Web Transparencies

Using Mobile to Capture In- the- Moment Insights

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

An to Big Data, Apache Hadoop, and Cloudera

Accelera'ng Your Solu'on Development with Splunk Reference Apps

Transcription:

Copyright 2015 Splunk Inc. How to Use Splunk To Detect and Defeat Fraud, TheK And Abuse Joe Goldberg Product Marke@ng, Splunk Young Cho Technical Product Marke@ng, Splunk

Disclaimer During the course of this presenta@on, we may make forward looking statements regarding future events or the expected performance of the company. We cau@on you that such statements reflect our current expecta@ons and es@mates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward- looking statements, please review our filings with the SEC. The forward- looking statements made in the this presenta@on are being made as of the @me and date of its live presenta@on. If reviewed aker its live presenta@on, this presenta@on may not contain current or accurate informa@on. We do not assume any obliga@on to update any forward looking statements we may make. In addi@on, any informa@on about our roadmap outlines our general product direc@on and is subject to change at any @me without no@ce. It is for informa@onal purposes only and shall not, be incorporated into any contract or other commitment. Splunk undertakes no obliga@on either to develop the features or func@onality described or to include any such feature or func@onality in a future release. 2

Personal introduc@on Joe Goldberg 3.5 years at Splunk Product Marke@ng for an@- fraud/thek/abuse. Also security and compliance Previously Symantec Data Loss Preven@on (Vontu) Young Cho 2 years at Splunk Technical Product Marke@ng for an@- fraud/thek/abuse. Also security and compliance. Formerly Solu@ons Architect in APAC for 1.5 years Previously Splunk Partner in APAC, MOS 3

Agenda Splunk for Fraud, TheK, & Abuse Detailed bank fraud use case Demo (@me permi`ng) 4

Splunk for An@- Fraud, TheK, Abuse ( Fraud )

Why You Should Care: Fraud is Costly - Associa'on of Cer'fied Fraud Examiners High annual costs & growing: Merchants $200-250 billion; banks and financial ins@tu@ons $12-15 billion 1 Reputa@on/brand damage Labor costs from manual inves@ga@ons and review 1. Forrester Feb 2013 6

Business Moving Online Has Increased Fraud Data breaches Lead to downstream iden@fy thek and credit card fraud No boundaries Fraudsters are able to act from con@nents away with impunity Creden2al the4 Account takeovers are easier due to phishing and malware More sophis2ca2on Fraudsters use new tac@cs and change behavior to evade detec@on 7

Machine Data Contains Cri@cal Fraud Insights Sources Card Payment System [2013-09- 04-14.45.54.608000] proc_source="b24a", tmst_target="2013-09- 04-14.45.54.724000", serv_id="iss", proc_input="mast", proc_target="b24h", Card interface_acq="bnet_1", ID Amount interface_iss="02008", cod_msg="1110", oper_rrn="090448764439", card_id="526430vs350y2992", oper_amount="000000008000", oper_ currency="978", Merchant oper_country="380", ID term_id="00599307", circuito="", seu_merc="4722", bin_acq="002111", id_merc="329017246168", prcode="003000", ac@on_code="000", approval_code ="H8H766", oper_ mod_input="1", channel="o", flag_dupl="y", flag_onus="n", Client ID auth_rout_dst="intfhi93", auth_ rout_id="hiso_auth", msg_subst="", ndg="0000000078507391", sta@on_acq="sta- BNET- MI1", acceptor = TRAWEL SPA\\MILANO\ 380", tmst_ins="2013-09- 04-14.48.56.277466", lpar="b" Web Proxy 2013-08- 09 16:21:38 10.11.36.29 98483 148 TCP_HIT 200 200 0 622 - - OBSERVED GET HTTP/1.1 0 "Mozilla/4.0 (compa@ble; MSIE 6.0; Windows NT 5.1; SV1;.NET CLR 2.0.50727; www.neverbeenseenbefore.com InfoPath.1; MS- Source IP RTC LM 8;.NET CLR 1.1.4322;.NET CLR 3.0.4506.2152; ) User John Doe," Referring URL Authen2ca2on 20130806041221.000000 Cap@on=ACME- 2975EB\JohnDoe Descrip@on=User account Built- in account for administering the computer/domaindo\n=acme- 2975EB InstallDate=NULLLocalAccount = IP: 10.11.36.20 TrueName=Administrator SID =S- 1-5- 21-1715567821- 926492609-725345543 User Name 500SIDType=1 Source IP Status=Degradedwmi_ type=useraccounts 8

Example Pauerns of Fraud in Machine Data There are Hundreds of Pa9erns of Internal/External Fraud! Industry Financial Services Healthcare E- tailing Telecoms Online educa@on Type of Fraud Account takeover Physician billing Account takeover Roaming abuse Student loan fraud 9 PaAern of fraud High velocity of transac@ons under $10k Physician billing for drugs outside their exper@se area Many accounts accessed from one IP or user agent string Unlimited use customers doing excessive roaming on partner networks Student IP in high- risk country and student absent from classes & assignments

Splunk: Machine Data Plaworm for Fraud Use Cases Machine Data: Any Loca2on, Type, Volume Answer Any Ques2on On- Premises Private Cloud Public Cloud Mobile Servers Storage Online Shopping Cart Online Services Smartphones and Devices Malware Desktops Badge records GPS Loca@on Web server Networks Call Detail Records Fraud tools Authen@ca@ons Packaged Applica@ons Messaging Databases/ transac@ons Payment Systems Custom Applica@ons Ad hoc search Monitor and alert Asset Info Report and analyze External Lookups Employee Info Threat feeds Custom dashboards Data stores Developer PlaJorm 10

Supports Many Needs of An@- Fraud Teams Fraud Monitoring and Detec@on Fraud Inves@ga@ons Fraud Analy@cs and Repor@ng Enhance Exis@ng Fraud Tools

Why Splunk for Fraud Detec@on? Exis,ng Fraud Tools Splunk for Fraud RIGID AND INFLEXIBLE FLEXIBLE NARROW VIEW OF FRAUD BROAD VIEW SCALE AND SPEED ISSUES DIFFICULT TO DEPLOY; LIMITED ROI SCALE & SPEED FAST VALUE; COMPELLING ROI 1

Splunk For Fraud Detec@on Across Ver@cals Financial Services Mobile/Telecom ecommerce Health Care Online Educa2on Government 1 3

Leading Online Retailer Challenge: Fraud inves@ga@ons were too slow with no unified logging Inves@ga@on took 12 hours using 10 resources 90 minutes from alert to inves@ga@on Enter Splunk: Big data, flexible plaworm to accelerate inves@ga@ons Sample pauerns of fraud Splunk looks for: ê One referrer string or IP logging into mul@ple user accounts ê One referrer string or IP crea@ng many new accounts to get account opening incen@ves OR opening new account to fast to be human ê Single IP excessively selec@ng the I forgot my password op@on for several accounts ê User traffic coming from rent a VM, cloud- based services ê Brute force password guessing ê Customer info that should be stable changing oken: email/physical address, payment card, etc Splunk unites all context around possible fraud on single dashboard Splunk adds together point fraud tool scores to give a consolidated transac@on score Many fraud visualiza@ons, including geo- IP mapping Inves@ga@on takes 0.2 hours using 2 resources Under 10 minutes from alert to inves@ga@on Use Splunk for fraud, security, compliance, IT Ops, and App Mgmt 14

Top 5 Online University Challenge: Needed solu@on to detect fraudulent student loans Difficult to iden@fy fraudulent loans and auendance ac@vity Enter Splunk: Significant cost savings in reduced loan fraud Cross- check students with loans against classroom ac@vity to iden@fy fraudsters Stopped $10s of millions of fraudulent funds from distribu@on Reputa@on and Dept of Educa@on accredita@on maintained Single tool for fraud, compliance, cybersecurity, IT Opera@ons, and Classroom Ops 15

Bank Fraud Use Case

Successful Tier 1 Bank Real- Time Wire Blocking Reference Based a Korean financial news in 2014 : (Money Today 2014 12-16) On the 16 th of December 2014, financial community revealed that Hana Bank (A @er 1 bank in Korea) overall bank s fraud detec2on rate has risen to 71.7%. It means that Hana Bank were able to block 70% above all bank s fraudulent transac@ons. Hana Bank has deployed next genera@on fraud detec@on last October 2014. AKer they deployed the next genera@on fraud detec@on plaworm, there were significant increase of fraud detec@on rate, originally from 24.8% in January of 2014. AKer Hana Bank started deploying the FDS, their fraud detec@on rate immediately increase to 66.8, star@ng from last September.

Sorted by the size of asset Top Korean Tier 1 Banks, Splunk Based FDS Adop@on Splunk Based Real-time Fraud Adoption Status 1 W Finance Holdings Splunk based FDS 2 S Financial Group Not Decided 3 H Financial Group Splunk based FDS 4 K Financial Group Local Compe@tor 5 I Bank Splunk based FDS 6 K Bank Local Compe@tor 7 E Bank Splunk based FDS 8 S Bank Splunk based FDS Out of eight tier 1 banks, five banks (63%) have selected Splunk as real-time fraud detection platform, including the largest bank in Korea.

High Impact Customer Values Created Various Major Financial Institutions Detec@on Rate of a @er 1 Bank Asset Blocked Amount Incident Inves@ga@on @me Financial Credibility Long term Biz Impact 71% 24% $X0,000 Daily Fast Effec@ve J Sa@sfac@on Rapid Increase Turning all financial transac@ons to cri@cal Intelligence

Finance Service Industry Needs > What are some of the technical challenges in managing data? Ability to process transactions in " real-time for detection of fraud Ability to process large volumes of transactional data for long period of time. Ability to analyze complex patterns " of transactions and be able to profile user objects

MISSION : Advanced fraud detection platform that COLLECT / PROCESS / ANALYZE Financial transactions in real-time Sensitive Data High Entrance Barrier Mission Critical Real-time Impact

The Jargon Channels Tier 1 banks offer many different channels to access their services: BANKING SERVICE CHANNELS ATMs Tellers Online Banking Core Service Plaworm BUS Banking Plaworm Service Telephone Banking Mobile Banking Highest Value Servers / OS Applica@on / Database Network Security

Splunk For Core Financial Transac@ons ATMs Tellers Online Banking Telephone Banking Mobile Banking Core Service Platform BUS (Message Queue) IBM MQ / Oracle Weblogic / Core Database Each transac@ons as separate files in AIX server file system 200 G Daily Volume Real- 2me collec2on of core banking transac@ons 32,000+ Types of different transac@on formats

Why Is This Such A Big Deal? Reason 1 Tradi@onal 6~12 Hour Batch Collec@on Limited Amount Data Processed Core Banking System Batch Data Collec@on System Processing RDBMS Data Analysis System Splunk Core Banking System Real@me Data Collec@on Real- @me Data Collec@on Ability Process big data (200G + per day) Big Data Plaworm High Performance Complying customer s 30 seconds fraud detec@on and blocking requirement

Why Is This Such A Big Deal? Reason 2 Ability to process 32,000 types of different transac@on types 32,000 Types of different transac@ons RDBMS RDMBS Can t model 32,000 types of different formats Because of that, can t " query/ search 32,000 Types of different transac@ons As a No-SQL database process all 32,000 types Able to search all data based on value-pairs matching

How Do Transac@ons Look Like? Format example 1 00230223002342093240032129123420312. Bank Code Branch Code Service Code Ac@on Code Account Code Validate Code Format example 2 Change Position New 00230223002342093240023003212912342. Bank Code Service Code Sub Ac@on Code Branch Code Ac@on Code Account Code v 32,000 types of these formats

New Breed Of Bank Robbers Today s bank robbers know you more than you know yourself. Your Human Network Your Bank Info Your Personal Info Your Card Info Your Bank Login Your Financials Your Computer

Banking Fraud Example : Phase 1 Internet Bank Network Internet Banking Customer Channels Mul@ Channel Applica@on Customer Account Transac@on Flows Internet Banking Normal Transfer 1 Hacking / Phishing / Pharming Customer PC Teller ATM Normal Transfer 2 Issue a new Cer@ficate Acquire accounts info Phone Banking Mobile Banking With in 60 Sec Fraudulent Transfer 1 Fraudulent Transfer 2 Hacker

Characteris@c Of Financial Fraud And Abuse 1011111010101000001111 0111110110111110101001 0001011110111110101001 10 1011111010101000001111 0111110110111110101001 0001011110111110101001 10 Fast Knows what to do, fast transfers to a temporary accounts Intelligent Highly technical, access the target accounts with proper creden@als and cer@ficates Structured Works as in teams for different roles

Banking Fraud Example : Phase 2 Exposed Customer Bank Accounts Bank Network Hacker Target Intermediate Account ATM Hacker ATM Account Cancella@on

How Can Fraud Be Stopped? Internet Banking Customer Channel Multi Channel Application Commit Bank Service Plaworm Customer Account Transaction Status Access Terminal ALLOW TRANSFER ATM Customer Allow STOP TRANSFER ATM Suspicious Transaction FRAUD DETECTION PLATFORM Risk Management (Automated / Manual )

Success Factor : Real-time MCA Server Forwarder Splunk Cluster Pre Processing Server Uncooked Data Profile DB Internet Banking Service Plaworm Results Forwarder Search Head LBF Real-time Real- @me collec@on of raw data send for pre processing 32 2015 Splunk Inc. Turning banking format data into Key Value format (Cust Mod) Processing Structure Splunk Cluster Processing of ingests Key marts and Value format applying data into complex Fraud Indexers Rules Results of Fraud detec@on results send over to Internet banking server The fraudsters are warned with warning and aborts wire transfer

How Does Splunk Make It Possible? Online Banking Customer Account Transac@ons Normal Transfer 1 > Fraudulent PaAerns / Condi2ons Combo Normal Transfer 2 1. 2. 3. 4. 5. Issue a new Cer@ficate Acquire accounts info Fraudulent Transfer 1 Hacker Fraudulent Transfer 2 Different Channel Different MAC Address with no prior history Issue a new cer@ficate Target wire account with no prior history Create new cert and wire transfer happens in 5 minutes Index=mul@_access check_hist_mac mac check_hist_wire target_account FRAUD DETECTION PLATFORM 33 2015 Splunk Inc. Real- @me Transac@ons Account history Summary MAC history Summary Wire history Summary

Concept of Profiling Extrapolation of information about something, based on known qualities. Request Committed Wire Request / Ac@on Good Customer Laura Compare the transactions with previous trending Update the transactions so the profile is updated to reflect as new behavior Profiling Database 34 2015 Splunk Inc.

Concept of Entity Profiling Purpose Profiling Database Baseline customer behaviors Design analysis model CUST_ID : Laura DEVICE : xx:xx:xx:01 xx:xx:xx:03 IP ADDR : 12.11.11.3 12.11.11.23 TARGET ACCT : HB092831 HB726383..Other user specific profiling info. Normal Transfer 1 : Target ACCT HB092831 Good Customer Laura 35 2015 Splunk Inc. Normal Transfer 2 : Target ACCT HB726383 The target account exists already in profiling DB

Concept of Entity Profiling Purpose Profiling Database Baseline customer behaviors Design analysis model CUST_ID : Laura DEVICE : xx:xx:xx:01 xx:xx:xx:03 IP ADDR : 12.11.11.3 12.11.11.23 TARGET ACCT : HB092831 HB726383.. Other user specific profiling info. Normal Transfer 1 : Target ACCT HB092831 Fraudster 36 2015 Splunk Inc. Normal Transfer 2 : Target ACCT HB726383 Fraudulent Transfer 3 : Target ACCT AB239242? Since this is a unknown account, is this legi@mate?

Detecting Based on Profiled Info: Profiling Search Profiling Database Search Data CUST_ID(:(Laura( DEVICE(:(xx:xx:xx:01(xx:xx:xx:3( IP(ADDR(:(12.11.11.3((12.11.11.23( TARGET(ACCT(:((HB092831((HB726383(..(More(user(specific(profiling(info(.( Insert / Update new profiling attributes Search 1 : Profiling Search!!!CUST_ID(:(Laura(!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!xx:xx:xx:03! DEVICE(:(xx:xx:xx:01( IP(ADDR(:(12.11.11.3(!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!12.11.11.23! TARGET(ACCT(:(!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!HB726383!!!..(Other(user(specific(profiling(info(.( CUST_ID(:(Laura( DEVICE(:(xx:xx:xx:01( IP(ADDR(:(12.11.11.3( TARGET(ACCT(:(..(Other(user(specific(profiling(info(.( Create New Customer Profile (Scheduled -2m@m ~ -1m@m) Create new customer profiles Update atributes of profiles based on analysis criteria 37 2015 Splunk Inc.

Detecting Based on Profiled Info: Detecting Search Profiling Database Realtime Data CUST_ID(:(Laura( DEVICE(:(xx:xx:xx:01(xx:xx:xx:3( IP(ADDR(:(12.11.11.3((12.11.11.23( TARGET(ACCT(:((HB092831((HB726383(..(More(user(specific(profiling(info(.( Lookup / Join Profiled Data CUST_ID(:(Laura( DEVICE(:(xx:xx:xx:01(xx:xx:xx:3( IP(ADDR(:(12.11.11.3((12.11.11.23( TARGET(ACCT(:((HB092831((HB726383(..(More(user(specific(profiling(info(.( Match rule alerts With profile DB CUST_ID(:(Laura( DEVICE(:(xx:xx:xx:01(xx:xx:xx:3( IP(ADDR(:(12.11.11.3((12.11.11.23( TARGET(ACCT(:((HB092831((HB726383(..(More(user(specific(profiling(info(.( Kick off an event / send signal to banking system Wire Fraud Alert Search 2 : Pattern Detection Search (Real-time RT) Real-time searching, Joining lookups and other verification Match the status in profile DB for condition verification 38 2015 Splunk Inc.

Processing Logic Machine Learning (Anomaly detec@on) Fraudulent Pauern Normal Pauern Fraudulent Pauern

Importance Of Being Transac@ons Data Store Enterprise Adop@on Big Data, Opera@onal Intelligence Transac@on Fraud Detec@on An@ Money Laundry Internal/ External Compliance FSI Big Data Analy@cs

Why is This So Significant? These transaction data is at the heart of all financial service analysis FDS Fraud Detection System Government Regulations Big Data Target Marketing IT OPS Business Analytics Security Expects various financial service Innova@ons Future Data Projects

Synergy Factors of Splunk (To Joe) Near Realtime CEP Real-time Collection > Storage > Query Big Data Platform Storing and Summarization of BIG DATA Analysis / Integrations Analyze, Visualize and extend to Service 1 2 3 Integrated Real-time Fraud Detection/ Prevention Platform

Demo

Take- Aways Pauerns of fraud are in machine data Splunk can harness machine data to detect, inves@gate, and report on a wide range of fraud Splunk can address the more demanding and technical fraud use cases (financial services, etc) 44

What Now? Go the Compliance & Fraud booth at the App Showcase Other sessions: Exposing Fraud and Risk for Health Agencies, Tues, 3-3:45 Orrstown Bank, Tues, 5-5:45 From Zero to Preuy Robust Fraud Detec@on Tool, Wed, 10-10:45 Detec@ng Bank Account Takeover and Fraud Auacks with Splunk, Wed, 2-2:45 Info, case study at: Ø Splunk.com > Solu@ons > Security & Fraud > Fraud Contact sales team at Splunk.com > Contact Us 45

Ques@ons? 46

THANK YOU