Women In Security Magazine Issue 12

Page 131

CAROL CHRIS

IDENTITY PROOFING, IDENTITY VERIFICATION AND FRAUD PREVENTION by Carol Chris, Regional General Manager for Australia and New Zealand, GBG

Identity theft and fraud cause some of the biggest

and prevention methods. Business leaders need to

business challenges and financial losses in Australia.

ensure they are getting the foundations of their fraud

According to the Australian Cyber Security Centre

prevention approaches right, and this process starts

(ACSC), cybercrime is now so commonplace that

with understanding the importance and role of each

Australians are being targeted by cybercriminals

step in the process.

every seven minutes. Fraud was the most frequently reported online crime, accounting for 27 percent of incidents.

IDENTITY PROOFING VERSUS IDENTITY VERIFICATION Identity verification is the entire process of confirming

Online fraud is often the result of a stolen online or

an identity genuinely matches the person claiming

digital identity being used to illegitimately access

to be linked to that identity. This process can involve

funds, purchase products, open accounts, connect

taking and verifying personal information such as

with someone’s network, conduct scams and more.

a name, date of birth, addresses and other relevant

Identity proofing and identity verification are critical

factors specific to the individual. This is also referred

parts of any digital onboarding process—particularly

to as ‘know your customer’. It comprises a range of

for financial institutions—to help prevent fraud and

compliance and regulatory requirements in certain

mitigate the risk of fraud.

industries, particularly the financial services industry.

However, with technology and fraud evolving rapidly,

Identity proofing is one part of the identity verification

it can be difficult to keep up with the latest solutions

process. While it was once common for a customer

I S S U E 12

WOMEN IN SECURITY MAGAZINE

131


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Saman Fatima

4min
pages 154-155

Roshni Bedi

6min
pages 148-150

Tshering Wangmo

6min
pages 152-153

Savannah Dockerty

3min
pages 146-147

Sheida Sabeti

2min
page 151

BISO – no that is not a typo

9min
pages 126-130

Different perspectives

10min
pages 136-140

Identity proofing, identity verification and fraud prevention

5min
pages 131-133

Incident response competition

6min
pages 141-145

managing risk and resilience

8min
pages 116-119

a rewarding profession

3min
pages 134-135

Taking a proactive approach to cybersecurity

3min
pages 114-115

or nothing

3min
pages 108-109

Engagement with an impersonator

8min
pages 100-103

changing career through recruitment

6min
pages 76-78

Balancing risk and productivity in a hybrid world

4min
pages 106-107

experience and professional fulfillment

3min
pages 104-105

Don’t get poor fast

3min
pages 90-91

material risk grows

3min
pages 92-93

after 12 years in finance

2min
pages 74-75

Why I became a cybersecurity expert

2min
pages 72-73

operator in the Australian Army Reserves

3min
pages 64-65

early careers

10min
pages 66-71

Cyber is not your get-rich-quick option

3min
pages 62-63

Reshmi Hariharan

4min
pages 50-51

Farah Chamseddine

4min
pages 48-49

Martina Saldi

4min
pages 46-47

Holly Wright

5min
pages 44-45

Dr Fauzia Idrees Abro

1min
page 43

Johanna Williamson

6min
pages 40-42

Get-rich-quick crypto scams

2min
pages 14-15

Lisa Ventura

3min
pages 30-31

Catherine Dawson

3min
pages 38-39

Rachael Greaves

6min
pages 35-37

Belinda Stewart

3min
pages 20-21

Kao Hansell

3min
pages 16-17

Jenna Salvesen

6min
pages 32-34

Melanie Truscott

4min
pages 18-19
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.