Training

Fraud Management & Cybercrime , ID Fraud

Identity Theft and Detecting Organized Fraud Ring Activity in Real Time

Identity Theft and Detecting Organized Fraud Ring Activity in Real Time

How do Organized Fraud Rings (OFR's) monetize the personal information made widely available from the growing number of data breaches? How can we detect and disrupt this activity?

See Also: OnDemand | Combatting Rogue URL Tricks: How You Can Quickly Identify and Investigate the Latest Phishing Attacks

From these breaches, fraudsters obtain just enough personal information to access user accounts or attempt to pull free credit reports on any individual they target. These reports contain a wealth of data with which they can use to then impersonate that individual, answer "knowledge" based questions and subsequently succeed at a variety of credit application types. The resulting credit instruments are then used to purchase expensive items which can then be charged back and so on.

Historically, the fragmented organizations that unwittingly constitute this "fraud supply chain" could provide no coherent indication of suspicious activity. Each step could only be observed in isolation. However, solutions are now available to correlate events across the multiple disparate systems involved to join the dots and see the complete picture. Centralized collection of activities through every phase of the fraud process can identify and alert on suspicious patterns and stop it in its tracks, even where evasive techniques such as geographical dispersion and ISP switching are employed. In this session we'll discuss this process and a number of the supporting capabilities such as:

  • How the correlation of activity and transaction velocity can identify fraudulent behavior;
  • How tying activity to persistent device identification provides further evidence that identity theft and fraud are being perpetrated;
  • How the sharing of global fraud intelligence to provide insight into transaction risk can help law enforcement identify, investigate and prosecute fraud.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Background

Slide Previews

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.