Survey Results: 2013 Faces of Fraud
From the growth of mobile malware to the refinement of sophisticated banking Trojans and the proliferation of point-of-sale and retail breaches, the fraud landscape continues to evolve for banking institutions globally.
See Also: Live Webinar | Why is the CISO Role the Most Difficult Job in the World?
But so, too, do the anti-fraud technology solutions institutions use to detect, prevent and analyze the impact of myriad fraud schemes.
How are organizations addressing fraud and cyberthreats? Register for this webinar for an early look at survey results, as well as expert analysis of:
- Today's most predominant and damaging fraud incidents impacting banking institutions and their customers;
- New anti-fraud investments institutions are making to thwart the fraudsters and satisfy the demands of regulatory agencies.
What are today's top fraud schemes, and how are banking institutions responding to them?
These are among the questions to be answered by this latest study, 2013 Faces of Fraud: The Threat Evolution. A follow-up to ISMG's 2010 and 2011 Faces of Fraud surveys, this new research looks not only at the latest fraud trends and how institutions are fighting back, but also at how they are affected by the impact of ever-evolving threats.
This web-based research study, created by ISMG with the counsel of top fraud experts, covers:
- Malware - How are institutions faring against today's leading banking Trojans, including Zeus, Gozi Prinimalka, Eurograbber and others?
- Mobile Attacks - How do escalating mobile malware attacks impact strategies for mobile banking and payments?
- Account Takeover - Are banks succeeding at reducing the number of successful takeover attempts? And are fraud losses also being reduced?
- DDoS - Are these attacks, as regulators warn, merely a diversion to distract institutions from fraud behind-the-scenes?
- POS and Retail Breaches - Recent months have brought a steady stream of network breaches at retailers and payments processors, as well as point-of-sale device and system attacks, resulting in payment card fraud and replacement. How are card issuers and acquirers tracking and responding to these attacks?
- Anti-Fraud Investments - What new investments are institutions making in layered security controls - particularly in the U.S., where institutions now are responding to the findings of their first exams for conformance to the FFIEC Authentication Guidance?
The 2013 study will also benchmark the most common fraud schemes, including payment cards, checks and phishing; the ongoing impact of account takeover resulting from ACH/wire fraud; the detection and prevention of insider crimes; and whether institutions see significant fraud reductions resulting from new investments in employee and customer education.
You might also be interested in …