Alternative Payments FICO World 2014 Jason Malo CEB TowerGroup © 2014 Fair Isaac Corporation. Confidential. This presentation is provided for the recipient only and cannot be reproduced or shared without Fair Isaac Corporation’s express consent. Change is headed your way whether you’re prepared or not. Emerging technologies like mobile and contactless payments continue to grow in adoption and consumers demand more convenience and more protection. 2 © 2014 Fair Isaac Corporation. Confidential. What Do Consumers Want? 3 © 2014 Fair Isaac Corporation. Confidential. WHAT DO CUSTOMERS WANT FROM THEIR BANKS? Consumers want transparency, simplicity and 24/7 secure access to their finances. Financial Service Provider Attributes Most Valued By Consumers Top 3 Attributes n~1600 Price (example: fees/rates) 48.7% Security and reliability of transactions 41.4% Convenience of access and hours (example: branches, online) Safety of customer savings and investments 33.2% Competence and helpfulness of employees 26.1% Ease of products to understand and use 17.2% Speed and effectiveness of problem resolution 11.8% Fit of products and services with my lifestyle 11.8% Guidance on how to better manage my finances 9.2% Unsure 9.2% Guidance on purchasing products or services © 2014 The Corporate Executive Board Company. All Rights Reserved. 4 © 2014 Fair Isaac Corporation. Confidential. 15.5% Simplicity and ease of purchase process Guidance on how to best use my financial products or services Security 39.4% 8.0% 6.1% Source: 2014 Unisys Security Index, N=1,005 Ease of Use MOBILE MUST EVOLVE INTO A BUYING CHANNEL Financial institutions and payment providers must transition users from shopping to buying in order to drive revenue Would you Like to Use your Mobile Phone for the Following Purposes? Respondents Could Select Multiple Answers None of the above 41% To compare prices 39% To receive discount offers & coupons 27% To receive location-based offers 26% As a membership card 23% To buy things at POS 22% Store gift cards, loyalty/rewards points 21% Purchase event tickets 18% Purchase bus/train/subway tickets 17% As a key to enter the house 17% As a form of photo ID No answer 16% 1% © 2014 The Corporate Executive Board Company. All Rights Reserved. 5 © 2014 Fair Isaac Corporation. Confidential. Source: US Federal Reserve IDENTITY THEFT TOPS LIST OF CONSUMER FEARS Greatest concerns for consumers relate to the security of their finances and personal information. How concerned are you about the following risks? Respondents answering “extremely” or “very” concerned Other people obtaining and using your credit or debit card details 59% Unauthorized access to or misuse of your personal information 57% The U.S.'s national security in relation to war or terrorism 47% The security of shopping or banking online 37% Computer security in relation to viruses or unsolicited emails 36% A serious health epidemic occurring in the U.S. Ability to meet essential financial obligations Overall personal safety over the next six months © 2014 The Corporate Executive Board Company. All Rights Reserved. 6 © 2014 Fair Isaac Corporation. Confidential. 34% 30% 25% Source: 2014 Unisys Security Index, N=1,005 MOBILE USERS CARE ABOUT PAYMENTS & SECURITY Most Desired Mobile Banking Features by Segment “Unusual account activity alerts” rely on mature, transaction fraud evaluation processes. Real-time alerts on unusual account activity Alerts must include an opportunity for customers to respond if necessary, but not drive contact center costs Liberal Users Ardent Affluents Aspiring Bloomers Real-time mobile alerts for unusual account activity is more important than remote deposit capture 10% Reward points just like in debit/credit card… N=59 11% Remote Check Deposit Making payments using smartphones 16% N=51 8% Real-time alerts on unusual account activity 11% Remote Check Deposit 14% Making payments using smartphones N=122 10% Remote Check Deposit 12% Cautious Seniors Real-time alerts on unusual account activity Making payments using smartphones Remote Check Deposit 14% N=64 10% 13% Real-time alerts on unusual account activity Source: Segment Based Strategies for Mobile Banking, Cognizant, April 2014, N = 296 © 2014 The Corporate Executive Board Company. All Rights Reserved. 7 © 2014 Fair Isaac Corporation. Confidential. 18% What are “Alternative Payments” 8 © 2014 Fair Isaac Corporation. Confidential. THE EVOLUTION OF PAYMENTS TECHNOLOGY Card Transaction Forms 1955 2014 Paper Card Stock Embossed Card Magnetic Stripe Chip Card Mobile/NFC Data Transcription Impress Card Information Stream of Data Real-Time Validation Device Integration 9 © 2014 Fair Isaac Corporation. Confidential. MAJOR 2014 EVENTS (THROUGH OCTOBER) Competitive Landscape Product Features Data Security Non-Financial Players are entering the market CFPB Transparency Warnings Major Data Breaches Revolving Debt Digital Prepaid Threats Increasing use of Internet Cards Partnerships with Tech Companies Opportunities 10 © 2014 Fair Isaac Corporation. Confidential. +50% of total market Evolving Security Technology EMV Rollout in United States Biometrics — enabled smart devices HOW DO WE ASSESS ALTERNATIVE PAYMENTS? Although seemingly impossible to predict what will take hold with consumers, we can assess the capability of solutions. Attributes of a Best-in-Class Mobile Wallet/Payments Application Card Storage • Store any credit or debit card regardless of issuer • Store gift cards, rewards cards, loyalty cards • Enable flexible card management POS Payments • Accepted at a variety of merchants • Quick and easy to access • QR, NFC, etc. Merchant Network Market Ready Non-POS Transaction • • • • P2P ACH Bill pay Cardless ATM withdrawal Loyalty Program • Network of national merchants • Network of local merchants • Flexibility to allow FIs to add merchants • Flexible rewards system: e.g. points based, per-dollar, percentage, amount spend, etc. • Merchant-funded rewards • Financial Discounts Up & Coming Needs Development Non Existent Coupons/Discounts • Targeted offering based on customer and transaction data • Joint marketing campaigns • Location-based offers Wallet Data • Data on customer wallet usage – including issuer and non-issuer cards • Benchmarking and network statistics • Segmentation analysis © 2014 The Corporate Executive Board Company. All Rights Reserved. 11 © 2014 Fair Isaac Corporation. Confidential. Data Security • Meet regulatory standards • Business continuity plan • Balance between security and convenience / access • Remote wipe or lock PAYPAL PayPal could be viewed as the original alternative payment. With its recent spinoff from eBay, evolving partnerships, and significant customer base, there are a lot of open roads. Attributes of a Best-in-Class Mobile Wallet/Payments Application Card Storage POS Payments* Merchant Network Loyalty Program Coupons/Discounts Wallet Data P2P Transaction Volumes (in millions USD) Market Ready Up & Coming $700 $468 Needs Development $314 $194 Non Existent $59 $81 $105 $141 Q4 2013 Q1 2013 Q2 2013 Q3 2013 Q4 2012 Q1 2014 Q2 2014 Q3 2014 © 2014 The Corporate Executive Board Company. All Rights Reserved. 12 © 2014 Fair Isaac Corporation. Confidential. Non-POS Transaction Data Security POS Payment Partners Challenges • *Low POS customer adoption • Lower penetration in younger user segments • Expanding P2P success from Venmo acquisition to POS payments traction STARBUCKS MOBILE APP Starbucks is the leading example of how mobile payments can be successful with a tight integration to rewards, free offers, and marketing Attributes of a Best-in-Class Mobile Wallet/Payments Application Card Storage POS Payments Merchant Network Loyalty Program Coupons/Discounts Wallet Data Transaction Volumes (in millions USD) Market Ready $517 $454 Up & Coming $380 $414 $302 Needs Development $263 $224 $159 Non Existent Q4 2013 Q1 2013 Q2 2013 Q3 2013 Q4 2012 Q1 2014 Q2 2014 Q3 2014 © 2014 The Corporate Executive Board Company. All Rights Reserved. 13 © 2014 Fair Isaac Corporation. Confidential. Non-POS Transaction Data Security Challenges • Only accepted at Starbucks • Participating merchants are limited • More expensive to deploy (barcode scanners) • Static barcode MOBILE WALLETS Mobile wallets haven’t yet gained widespread adoption as technology, market, and consumer readiness are all under development. Attributes of a Best-in-Class Mobile Wallet/Payments Application Card Storage POS Payments Merchant Network Coupons/Discounts Institution-Led Market Ready Providers1 Up & Coming Needs Development 1 Partial List Non Existent © 2014 The Corporate Executive Board Company. All Rights Reserved. 14 © 2014 Fair Isaac Corporation. Confidential. Non-POS Transaction Loyalty Program Wallet Data Provider-Led Data Security Challenges • Strategic mix of wallets to be supported • Security • Evolving standards & market readiness • Customer replacement value MOBILE BANKING APPS Mobile banking applications are beginning to incorporate payment mechanisms for P2P as well as POS Attributes of a Best-in-Class Mobile Wallet/Payments Application Card Storage POS Payments Merchant Network Coupons/Discounts Up & Coming Needs Development Non Existent © 2014 The Corporate Executive Board Company. All Rights Reserved. © 2014 Fair Isaac Corporation. Confidential. Loyalty Program Wallet Data Data Security Challenges • Evolving standards & market readiness • Limited capabilities to import other cards • Competition Market Ready 15 Non-POS Transaction APPLE PAY Apple has made a big splash with Apple Pay, but still has room to improve. Attributes of a Best-in-Class Mobile Wallet/Payments Application Card Storage POS Payments Merchant Network Coupons/Discounts Up & Coming Needs Development Non Existent © 2014 The Corporate Executive Board Company. All Rights Reserved. © 2014 Fair Isaac Corporation. Confidential. Loyalty Program Wallet Data Data Security Challenges • Enabled consumer base is limited • Participating merchants are limited • Replacement value is security, not ease of use • Pricing Market Ready 16 Non-POS Transaction MCX / CURRENTC (EXPECTED AT TIME OF LAUNCH) CurrentC promises secure transactions, and faster checkouts but rewards and coupons pose the biggest customer opportunity. Attributes of a Best-in-Class Mobile Wallet/Payments Application Card Storage POS Payments Merchant Network Coupons/Discounts Up & Coming Needs Development Non Existent © 2014 The Corporate Executive Board Company. All Rights Reserved. © 2014 Fair Isaac Corporation. Confidential. Loyalty Program Wallet Data Data Security Challenges • More expensive to deploy (barcode readers) • Security & privacy concerns • Value proposition & customerfriendly challenge • Giving bank account information not card information • ACH & Debit only Market Ready 17 Non-POS Transaction Keeping Pace With the Evolution 18 © 2014 Fair Isaac Corporation. Confidential. NOT EVERYTHING IS CHANGING What’s Changing Merchant Driven Programs Multichannel Access Specialized Non-Bank Players 19 © 2014 Fair Isaac Corporation. Confidential. What’s Not Changing Only Banks Can Take Deposits and Issue Network Cards Top Ten Issuers= 85% of Market 10–12% Growth in a $26 Trillion Market BANKS ARE LOOKED TO FOR SECURITY, BUT INCENTIVES LAG 20 © 2014 Fair Isaac Corporation. Confidential. BANKS DETECT MORE, BUT CONSUMERS HEAVILY INVOLVED Most common ways victims discovered identity theft, by type of theft, 2014 Percentage of Information Risk Executives, September 2014, n=37 50% Existing Account misuse 40% 30% Other identity theft 20% 10% 0% Contacted by financial Noticed fraudulent charges institution about suspicious on account account activity Noticed money missing from account Contacted by company or agency Contacted financial Credit card declined, check Received a bill or contacted institution to report a theft bounced, or account closed about an unpaid bill due to insufficient funds Source: US Dept. of Justice, 2014 Victims of Identity Theft,, Dec 2014 How is fraud typically detected? Percentage of banks responding, multiple responses accepted, 2014, n~200 When a customer notifies us 62% Through automated data analysis or transaction monitoring software 57% At the point of transaction 53% During account audit/reconciliation 41% Third-party notification 36% At the point of origination Third-party investigation Internal whistleblower 29% 21% 18% Source: 2014 Faces of Fraud Survey, Information Security Media Group 21 © 2014 Fair Isaac Corporation. Confidential. TWO-FACTOR AUTHENTICATION HAS COME TO PAYMENTS IN MANY FORMS First Authentication Factor Standard Card Swipe Something Someone Has + Something Someone Has EMV (Chip and Pin) Apple Pay (Biometric) CurrentC (Device and Pin) Second Authentication Factor Something Someone Knows + Something Someone Has Something Someone Is + Something Someone Has Something Someone Knows + Source: CEB analysis. 22 © 2014 Fair Isaac Corporation. Confidential. 22 3 NEW PRINCIPLES FOR CONSUMER AUTHENTICATION Risk-based security doesn’t always mean ADDING locks, but it does mean considering the transaction, user, and capabilities at hand. 1. Align Authentication Strategy to Transactional Risk • • 2. Don’t Hide Security, but Make it Easy • • • 3. • © 2014 Fair Isaac Corporation. Confidential. “Frictionless” doesn’t mean invisible Reassure customers and involve them only when necessary Example: Fraud notifications, transaction verification Apps Consider Your Distribution and Support Channels • 23 Incorporate “Step-up” authentication for risky transactions Remove security measures where the risk is low, or easier authentication methods are available. Understand impact that security will have on support Work to supplement other channels through cross-channel processes DEVICE LOSS AND REPLACEMENT PROCESSES MUST EVOLVE Card Transaction Forms 1955 Paper Card Stock 1. Notify 2. Change Account # 3. Replace Card 24 Embossed Card 1. Notify 2. Change Account # 3. Replace Card © 2014 Fair Isaac Corporation. Confidential. Magnetic Stripe 1. Notify 2. Change Account # 3. Replace Card 2014 Chip Card 1. Notify 2. Change Account # 3. Replace Card Mobile/NFC 1. Disable 2. Locate device 3. Authenticate on new device CONCLUSION ► The best way to predict success in payments is to test them against customer value ► Security is now more than just an imperative, it’s a differentiator ► Even in cases where banks are disintermediated they are not absolved of responsibility of fraud ► Opportunities to secure consumer data and finances are greater than the risks posed by alternative payments 25 © 2014 Fair Isaac Corporation. Confidential. Please rate this session online! Jason Malo jmalo@executiveboard.com 26 © 2014 Fair Isaac Corporation. Confidential.