CERIAS Security Seminar: Authentication: Behind The Scenes When You Click “Check Out”

The Center for Education and Research in Information Assurance and Security
September 16, 2020
4:30 PM - 5:30 PM


Warda Zahid Khan

Abstract: The payments ecosystem is evolving fast and making sure the cardholder’s digital payment experience is frictionless, smooth and secure has never been more important. With approval rates for digital payments at 82% compared to 97% for in-person payments, and globally digital transaction fraud currently four times higher than in-store expected to increase 68% by 2022, intelligence matters more than ever. As more transactions move to the digital world, particularly after COVID-19, on an ever-increasing array of devices, the need to keep up is vital.

To help issuers’ real-time decisioning, increasing approval quality, improving the cardholder experience and reducing fraud, Mastercard leverages the power of proprietary data, sophisticated modelling and machine learning, combined with Mastercard’s global insights and analytics to process thousands of data points and delivers authentication assessment to the cardholder’s bank real-time during the payment to help the bank make an informed and robust decision.

About: Warda Khan is Director of Product at Mastercard, working in payments authentication space focusing on Smart Authentication, a machine learning based global service aimed at providing authentication intelligence to banks. She has been at Mastercard for 8 years and worked at the intersection of technology and business gaining experience across launching digital products to creating risk programs that help financial institutions mitigate payments risk. In her free time, Warda likes to spend time with her family, volunteer in the community, read books and, of course, watch Netflix.

The weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics. More info

Contact Details

Add to calendar